Every CISO’s worst nightmare

We look at the nightmares facing a Chief Information Security Officers (CISO) today.
We look at the nightmares facing a Chief Information Security Officers (CISO) today.

Click here to listen to our podcast “Is this every CIO’s worst nightmare!?”

A CISO’s main goal is to protect and maintain critical company assets. Originally, CISO’s were mostly responsible for cybersecurity response to data privacy and information security. Still, in 2021 almost all CISO’s are now responsible for all aspects of a company’s information risk management strategy.

Though office employees have welcomed hybrid work, it’s not all sunshine and roses for CISOs. Hybrid workplaces have created the perfect storm for various security and integrity risks. Here are some of the concerns haunting CISO’s nightmares and how they can ward off potential security risks.

Nightmare 1: The increasing rate of cyberattacks and data breaches.

This is by far one of the biggest concerns that CISOs must deal with daily, as they could happen in various ways. Cyberattacks have become some of the most severe security risks throughout every sector around the world. Not only is no sector safe from cyberattacks, but the level of sophistication of the threats they face is also continually increasing. Cybercrime has cost organizations more than £5mn in the past 13 months.

Companies with a lot of customer data are most vulnerable to attacks due to the value of this data on the dark web. Cyberattacks are constantly evolving, and attackers are learning new ways to infiltrate software or exploit undertrained employees. The type of data stolen through these attacks, the consequences can range from your intellectual property being compromised to your customers being exposed to identity theft, to disruptions to your ability to do business.

Completely avoiding cyberattacks and data breaches is almost impossible; however, by doing regular tests and implementing stringent systems, CISOs can avoid and combat most of them. In addition, CISOs need to take some time out to train employees to ensure they know the risks and potential attacks.

Microsoft announced that it would add a new single-click button to employees Outlook on Microsoft 365. This button will allow workers to report dodgy emails directly to the National Cyber Security Centre (NCSC) in a bid to clamp down on cyberattacks. This button could ease this nightmare slightly for CISOs as it will help decrease the possibility of a cyberattack or data breach.

Concern 2: ransomware

There is no question that a widespread ransomware attack is one of the worst nightmares for any CISO and business in general. Ransomware is one of the most destructive cyberattacks for companies and one of the most profitable for cybercriminals. Attackers can also use ransomware to distract a company from a real attack. So while companies are potentially organizing to pay the ransom, cybercriminals could be stealing further data in the background. 

According to Bitdefender’s 2020 Consumer Threat Landscape Report, ransomware increased by 485% in 2020. Bitdefenders have also estimated that ransomware attackers will attack an organization every 11 seconds in 2021, causing US$20bn worth of damage.

Another survey conducted by leading cybersecurity firm Proofpoint found that ransomware is currently considered the main cybersecurity threat to an organization. According to the report, 46% of CISOs said that ransomware and extortion is the biggest cybersecurity threat they face in 2021.

CISOs working in companies that manage critical infrastructure face an even bigger nightmare as ransomware could risk an economic or physical disaster. The recent Colonial Pipeline hack has shown how critical it is for infrastructure companies to have security systems to protect their information. Attacks on infrastructure are not only fatal to companies but human lives as well. A scenario by Forbes illustrates this:

  1. Imagine a ransomware attack against the power grid that services highly populated areas in the desert southwest.
  2. Imagine this attack takes place during the hottest part of the summer.
  3. Think about the heat-related deaths that would likely occur and the impact on medical supplies that require refrigeration.

CISOs need to ensure that they protect their cloud systems with proactive ransomware protection that will quickly identify any potential attacks. Most ransomware protection software now consists of a combination of AI-powered intelligence and behavior-based detection to fight against any ransomware and provide detailed information on those specific threats.

Nightmare 3: the denial-of-service attacks

Denial-of-service attacks have been around for over 20 years, and they continue to grow stronger while remaining one of the most predominant ways in which cybercriminals attack. Denial-of-Service attacks are a major concern for CISOs and can be difficult to deal with. Most companies in 2021 either rely on a website or a mobile app to conduct their daily business activities. When a company is in the midst of a denial-of-service attack, its websites and app maybe be unavailable for current and potential customers to use. The longer the website or app is down, the higher the chance of your customer moving onto your competitors and companies can lose business. Additionally, a denial of service attack may result in lost revenue as customers demand partial or complete refunds for their lost service time.

CISOs need to ensure a backup system is ready and waiting to take over during an attack. This will limit their risk of a complete shutdown. Cisco has suggested that companies deploy a complete and holistic IT approach that uses components capable of seamlessly working together to defend its networks.

READ MORE:

In closing, CISOs really have a tough job ahead of them as cyberattacks increase every day. Their main goal to protect and maintain company assets is becoming harder and harder and even more critical. Now, when you go to sleep tonight, think of all the CISOs out there and hope that they have a good night sleep to ensure they are ready to fight tomorrow against cyber threats.

Click here to discover more podcasts from TBT on Air!

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

How Predictive AI is Helping the Energy Sector

Colin Gault head of product at POWWR • 29th April 2024

In the past year or so, we have seen the emergence of many new and exciting applications for predictive AI in the energy industry to better maintain and optimise energy assets. In fact, the advances in the technology have been nothing short of rapid. The challenge, though, has been in supplying the ‘right’ data to...

How Predictive AI is Helping the Energy Sector

Colin Gault head of product at POWWR • 29th April 2024

In the past year or so, we have seen the emergence of many new and exciting applications for predictive AI in the energy industry to better maintain and optimise energy assets. In fact, the advances in the technology have been nothing short of rapid. The challenge, though, has been in supplying the ‘right’ data to...

Cheltenham MSP is first official local cyber advisor

Neil Smith Managing Director of ReformIT • 23rd April 2024

ReformIT, a Managed IT Service and Security provider (MSP) based in the UK’s cyber-capital, Cheltenham, has become the first MSP in the local area to be accredited as both a Cyber Advisor and a Cyber Essentials Certification Body. The Cyber Advisor scheme was launched by the Government’s official National Cyber Security Centre (NCSC) and the...

How we’re modernising BT’s UK Portfolio Businesses

Faisal Mahomed • 23rd April 2024

Nowhere is the move to a digitised society more pronounced than the evolution from the traditional phone box to our innovative digital street units. Payphone usage has dropped massively since the late 1990s/2000s, with devices and smart phones replacing not only communication access, but the central community points that the payphones once stood for. Our...

How we’re modernising BT’s UK Portfolio Businesses

Faisal Mahomed • 23rd April 2024

Nowhere is the move to a digitised society more pronounced than the evolution from the traditional phone box to our innovative digital street units. Payphone usage has dropped massively since the late 1990s/2000s, with devices and smart phones replacing not only communication access, but the central community points that the payphones once stood for. Our...

What is a User Journey

Erin Lanahan • 19th April 2024

User journey mapping is the compass guiding businesses to customer-centric success. By meticulously tracing the steps users take when interacting with products or services, businesses gain profound insights into user needs and behaviors. Understanding users’ emotions and preferences at each touchpoint enables the creation of tailored experiences that resonate deeply. Through strategic segmentation, persona-driven design,...

From Shadow IT to Shadow AI

Mark Molyneux • 16th April 2024

Mark Molyneux, EMEA CTO from Cohesity, explains the challenges this development brings with it and why, despite all the enthusiasm, companies should not repeat old mistakes from the early cloud era.

Fixing the Public Sector IT Debacle

Mark Grindey • 11th April 2024

Public sector IT services are no longer fit for purpose. Constant security breaches. Unacceptable downtime. Endemic over-spending. Delays in vital service innovation that would reduce costs and improve citizen experience.