PAGE HEADING

5 Steps to Protect Your Organization From a Catastrophic Cyber Attack

by By Tom Kirkham, IronTech Security - September 20, 2022
5Steps_CyberAttack

All businesses are at risk for a cyber attack. And in these uncertain economic times it is expected that the risk will increase. The past has shown a correlation between recession and cybercrime. During and before the 2008-9 Great Recession, fraud on the internet increased by 33 percent. Today’s increased digitization makes data more vulnerable than ever.

The harsh reality is that the financial sector is the biggest target for cyber attacks because these firms hold large volumes of personal and financial data. They are a single access point to data from multiple organizations, which is incredibly valuable to cyber criminals.

These attacks come in many different forms. The top three threats a financial firm should worry about are ransomware, phishing attacks and loss of sensitive data. The ransomware business alone is a multi-billion-dollar business that is built on holding data from networks for ransom. All these threats open the door to impeded workflow, liability and loss of clients.

According to a report from Boston Consulting Group, cyber attacks have hit financial services firms 300 times more than other companies. Forbes reveals that 25 percent of all malware attacks are targeted at financial and accounting firms, with cyber attacks costing $18 million per firm compared to $12 million per incident in other industries. Fortunately, by being vigilant about protection, 97 percent of breaches can be prevented. 

Understand the Myths

Many myths surround cybersecurity. Consider these:

  • “I’m too small. Why would anyone want to target me?” Most ransomware and other attacks are indiscriminate. They are carried out at volume and are completely scalable. The attackers blast hundreds of thousands of emails. They think in terms of conversion rate. They don’t know, nor do they care, who it is.
  • “I can’t afford enterprise-grade security.” Cybersecurity doesn’t have to be expensive. An organization can invest only $20-30 a month per device and get some of the same technical controls, administrative procedures or administrative controls, and other tactics, techniques and procedures that the Department of Defense and Fortune 10 companies use. Considering that the average ransomware payout is more than $100,000, and victims who paid the criminals only recovered 65 percent of their data, that is a small investment.
  • “Antivirus is good enough.” The cold, hard truth is that antivirus can only react. It works by checking files against a list of known viruses and comparing the two. If a virus is new and yet unknown, there is nothing to compare it to, and the user will be infected.
  • “We’re covered because we have cybersecurity insurance.” Like all other insurance, this is the last thing you want to rely on to make your company whole. After a breach, insurance is not going to make your reputation whole. In fact, 60 percent of small businesses that are victims of a cyber attack go out of business within six months.
  • “Cybersecurity is an IT issue.” It’s not. It’s a security issue. IT and information security are two different disciplines that require two different skillsets.

By understanding that these are myths and the cyber attack risk is real, companies can adequately protect themselves and clients from harm.

5 Steps to Cybersecurity

A layered security approach with multiple best-of-breed tools and constant vigilance is the most effective line of defense. By taking the following steps, companies can put in place a comprehensive, ongoing cybersecurity program:

1.         Realize that cybersecurity is not an IT issue. There is a difference between information security and IT. IT specialists ensure that networks are safe, secure and running smoothly. A skilled team of information security specialists live and breathe cybersecurity 24/7. They keep up with the changing cyber threats. They reveal current risks and vulnerabilities and develop a plan to put security controls in place. And they orchestrate the controls, tools, plans, policies and procedures.

2.         Don't rely on antivirus. In today’s cyber environment, antivirus software is ineffective. Antivirus looks for malicious code; malicious logs must already be known, so they typically are three to six months old. Instead, enable an endpoint detection and response (EDR) tool and eliminate antivirus. EDR tools monitor, analyze and find threats for malicious activity and anomalies in real time.

3.         Learn the importance of encryption. Disk encryption is built into most mobile devices and almost all iPads and phones. This technology protects information by changing it to unreadable code and should be enabled for all devices.

4.         Multifactor authentication (MFA) is necessary. MFA is an authentication method that requires the user to provide two or more verification factors to gain access to a resource such as an application, online account or VPN. Rather than just asking for a username and password, MFA requires one or more additional verification factors, which decreases the likelihood of a successful cyberattack. MFA should be required for remote access to a desktop, server or any data. It is also good practice to use MFA wherever it is available, including bank accounts, social media and e-commerce sites.

5.         Create and foster a security-first environment from the top of the organization down. Employees are your first line of defense against a breach. Everyone who has access to any kind of computer or device on a network must have security awareness training continuously. No one is exempt.

Tying it all Together

Cyber risk is constantly evolving. As the dependence on digital technologies in the business world increases, so does the scope of cyber risk. Cyber threat actors are active adversaries, constantly adapting their tactics, techniques and procedures to cause harm.

Cyber risk can never be eliminated, so organizations need to adopt new methods of understanding, measuring and managing cyber risk on a continuous basis. A combination of cyber insurance and best-in-class cybersecurity practices can reduce this risk and provide some peace of mind for leaders.

Icon_MemberBenefits_MID
CPACharge
CPACharge was developed specifically for CPAs, enrolled agents and accountants, providing a simple, affordable online payment solution that allows you to securely accept credit, debit, and eCheck/ACH payments from anywhere. 
NJCPA_Icn_4C
On-Site Training

NJCPA on-site training programs offer the same outstanding content and expert instruction as our seminars but are led at your location.

Icon_MemberBenefits_MID
Accounting Today
Save 20 percent on an Accounting Today subscription and stay up to date on the latest issues affecting the profession.
Icon_3_people_circle_SKY-04
Join the Accounting Educators Community

Connect and share with other accounting educators about curriculum, trends and the profession. Learn about NJCPA initiatives that are valuable for your students including information on obtaining the CPA designation, student membership, scholarships, volunteer opportunities and events.

Icon_4_cube_connection_SKY-04
Earn an AICPA Robotic Process Automation Certificate
Recognize what RPA is and its business value, with specific focus on accounting and finance functions. Understand how RPA provides a significant competitive advantage.
Icon_MemberBenefits_MID
Guaranteed Rate/Marc Demetriou
Marc Demetriou of Guaranteed Rate is offering NJCPA members a “no lender fee mortgage” ($1,440 lender fee credit), competitive low rates and a dedicated team to deliver world class service.
Icon_3_people_circle_SKY-04
Join the Women's Leadership Forum

Join our online forum that enables female CPAs at all career levels and industries to make meaningful connections with each other and discuss career goals.

Icon_Monitor_magnify_SKY-04
Earn an AICPA Single Audit Certificate
Learn how to plan, perform and evaluate single audits in accordance with the latest requirements of the new Uniform Guidance.
Icon_MemberBenefits_MID
Wolters Kluwer
NJCPA members save 25 percent on CCH CPELink subscriptions, live webinars and on-demand self-study (mobile friendly) CPE courses.
Icon_MemberBenefits_MID
SMI

SMI has negotiated special discounts for the NJCPA members with all the major technology carriers and providers.

Icon_3_people_circle_SKY-04
Join the Business & Industry Professionals Interest Group

Stay connected to your peers and share knowledge on corporate finance topics.

Wolters Kluwer CCH
Save on COVID Tax Resources
NJCPA members save 25 percent on Wolters Kluwer's new book, COVID and Taxpayer Certainty Acts of 2020: Law, Explanation & Analysis.
NJCPA_Icn_4C
Shop the NJCPA store
Are you NJCPA proud? Purchase NJCPA merch to show your pride and help support our scholarship program.
Icon_Shooting_up_arrows_MID-03
Real Estate Classified Ads
View classified ad postings for office space for sale or rent.
Icon_Handshake_MID-03
Mergers & Acquisitions Classified Ads
View classified ad postings from CPA firms looking to be acquired and those looking to acquire or merge with other firms.
Icons_3_gears_midnight-03
Professional Services Classified Ads
View classified ad postings from companies providing services to CPAs.
Icon_3_people_circle_SKY-04
Join the Cannabis Interest Group
New Jerseyans have voted to legalize cannabis. Join the NJCPA's Cannabis Interest Group to gain information, insights and best practices for serving clients in this promising new industry.
NJCPA_Icn_4C
Zoom Backgrounds
Download our virtual backgrounds for Zoom meetings.
Icon_certificate_SKY-04
Earn an AICPA Certificate
When you’re ready to show your competencies, expand your career opportunities or enter new areas of practice, start by earning an AICPA certificate. Choose a certificate that matches your next career goal.
Icon_4_cube_connection_SKY-04
Earn the AICPA Blockchain Fundamentals Certificate
Build a foundation toward becoming a strategic business partner within your organization and with your clients. Learn how to anticipate potential benefits and risks of the technology, structure and functionality, and to translate them into relevant business application and value.