Think You Haven't Been Hacked? You're Wrong
-
bookmark
-
print
- Keywords:
- cybersecurity
- operations
- manage risk
This is the first part in a two-part series about helping you protect your company against cyber-threats. In this article we'll explore the basic cybersecurity principles you should know to combat the increasing threats to your company.
Companies have a greater risk of experiencing a cyber incident than ever before. Cyber criminals aren’t just looking at large corporations; companies of all sizes have information that can be valuable to a hacker. The key to stopping them is to change your thinking. Throw away the "not me" or "not yet" mindsets and instead adopt the realization that your systems have already been compromised.
A comprehensive cybersecurity program begins with understanding basic cybersecurity best practices and potential vulnerabilities. Consider the following:
- Get everyone on board. Cybersecurity isn't just the CEO or CIO's responsibility. The board, executives, employees and partners should be versed on cybersecurity policies and procedures and be accountable for protecting the company's assets.
- Identify what assets require the most protection. This is the digital equivalent of fortifying the Crown Jewels inside the Tower of London. Once you identify the company's most valuable assets, be it customer information, intellectual property or something else, you can begin to take steps to secure it.
- Perform a risk assessment to understand vulnerabilities and impacts. By performing a risk assessment, or having a third-party conduct one, you can better understand your company's specific risk exposure and potential impacts from that exposure. A risk assessment also helps determine vulnerable entry points, identify protective measures, allocate resources and develop policies to manage cyber risks.
- Realize that risks can be internal and might not always be malicious. Evil-intentioned hackers aren't the only threats to your company. Your own employees can unknowingly compromise your systems by emailing a work document to their personal email address or politely holding a secure door open for someone they assume is an employee.
- View cybersecurity as a comprehensive ecosystem. Threats aren’t limited to your company's own system. Your system could be interconnected with suppliers, vendors and clients, and an attack on one system can compromise the others. Consider that the hackers who breached Target's system to acquire data on millions of customers gained access through the company's HVAC contractor.
- Conduct tabletop exercises. You should routinely conduct tabletop exercises, a facilitator-led simulation, to test your incident response plan against real world scenarios. By understanding how your team and your approach hold up during a simulated breach, you can hone your plan to be better prepared when a real threat or breach occurs.
Knowing the basics principles of cybersecurity is the first step in protecting your company against the increasing threat of cyber attacks.
Aman Raheja
BMO U.S. Chief Information Security Officer
This is the first part in a two-part series about helping you protect your company against cyber-threats. In this article we'll explore the basic cybersecurity principles you should know to combat the increasing threats to your company.
Companies have a greater risk of experiencing a cyber incident than ever before. Cyber criminals aren’t just looking at large corporations; companies of all sizes have information that can be valuable to a hacker. The key to stopping them is to change your thinking. Throw away the "not me" or "not yet" mindsets and instead adopt the realization that your systems have already been compromised.
A comprehensive cybersecurity program begins with understanding basic cybersecurity best practices and potential vulnerabilities. Consider the following:
- Get everyone on board. Cybersecurity isn't just the CEO or CIO's responsibility. The board, executives, employees and partners should be versed on cybersecurity policies and procedures and be accountable for protecting the company's assets.
- Identify what assets require the most protection. This is the digital equivalent of fortifying the Crown Jewels inside the Tower of London. Once you identify the company's most valuable assets, be it customer information, intellectual property or something else, you can begin to take steps to secure it.
- Perform a risk assessment to understand vulnerabilities and impacts. By performing a risk assessment, or having a third-party conduct one, you can better understand your company's specific risk exposure and potential impacts from that exposure. A risk assessment also helps determine vulnerable entry points, identify protective measures, allocate resources and develop policies to manage cyber risks.
- Realize that risks can be internal and might not always be malicious. Evil-intentioned hackers aren't the only threats to your company. Your own employees can unknowingly compromise your systems by emailing a work document to their personal email address or politely holding a secure door open for someone they assume is an employee.
- View cybersecurity as a comprehensive ecosystem. Threats aren’t limited to your company's own system. Your system could be interconnected with suppliers, vendors and clients, and an attack on one system can compromise the others. Consider that the hackers who breached Target's system to acquire data on millions of customers gained access through the company's HVAC contractor.
- Conduct tabletop exercises. You should routinely conduct tabletop exercises, a facilitator-led simulation, to test your incident response plan against real world scenarios. By understanding how your team and your approach hold up during a simulated breach, you can hone your plan to be better prepared when a real threat or breach occurs.
Knowing the basics principles of cybersecurity is the first step in protecting your company against the increasing threat of cyber attacks.
This article discusses some cybersecurity best practices and potential vulnerabilities that businesses should consider to combat threats.
PART 2
How to Create a Comprehensive Cybersecurity Plan
Aman Raheja | July 16, 2018 | Business Strategy
Cybercriminals are actively trying to breach your defenses and steal your most valuable data. The best defense against cybercriminals is to have a pl…
Related Insights
Tell us three simple things to
customize your experience
Banking products are subject to approval and are provided in Canada by Bank of Montreal, a CDIC Member.
BMO Commercial Bank is a trade name used in Canada by Bank of Montreal, a CDIC member.
Please note important disclosures for content produced by BMO Capital Markets. BMO Capital Markets Regulatory | BMOCMC Fixed Income Commentary Disclosure | BMOCMC FICC Macro Strategy Commentary Disclosure | Research Disclosure Statements
BMO Capital Markets is a trade name used by BMO Financial Group for the wholesale banking businesses of Bank of Montreal, BMO Bank N.A. (member FDIC), Bank of Montreal Europe p.l.c., and Bank of Montreal (China) Co. Ltd, the institutional broker dealer business of BMO Capital Markets Corp. (Member FINRA and SIPC) and the agency broker dealer business of Clearpool Execution Services, LLC (Member FINRA and SIPC) in the U.S. , and the institutional broker dealer businesses of BMO Nesbitt Burns Inc. (Member Canadian Investment Regulatory Organization and Member Canadian Investor Protection Fund) in Canada and Asia, Bank of Montreal Europe p.l.c. (authorised and regulated by the Central Bank of Ireland) in Europe and BMO Capital Markets Limited (authorised and regulated by the Financial Conduct Authority) in the UK and Australia and carbon credit origination, sustainability advisory services and environmental solutions provided by Bank of Montreal, BMO Radicle Inc., and Carbon Farmers Australia Pty Ltd. (ACN 136 799 221 AFSL 430135) in Australia. "Nesbitt Burns" is a registered trademark of BMO Nesbitt Burns Inc, used under license. "BMO Capital Markets" is a trademark of Bank of Montreal, used under license. "BMO (M-Bar roundel symbol)" is a registered trademark of Bank of Montreal, used under license.
® Registered trademark of Bank of Montreal in the United States, Canada and elsewhere.
™ Trademark of Bank of Montreal in the United States and Canada.
The material contained in articles posted on this website is intended as a general market commentary. The opinions, estimates and projections, if any, contained in these articles are those of the authors and may differ from those of other BMO Commercial Bank employees and affiliates. BMO Commercial Bank endeavors to ensure that the contents have been compiled or derived from sources that it believes to be reliable and which it believes contain information and opinions which are accurate and complete. However, the authors and BMO Commercial Bank take no responsibility for any errors or omissions and do not guarantee their accuracy or completeness. These articles are for informational purposes only.
Bank of Montreal and its affiliates do not provide tax, legal or accounting advice. This material has been prepared for informational purposes only, and is not intended to provide, and should not be relied on for, tax, legal or accounting advice. You should consult your own tax, legal and accounting advisors before engaging in any transaction.
Third party web sites may have privacy and security policies different from BMO. Links to other web sites do not imply the endorsement or approval of such web sites. Please review the privacy and security policies of web sites reached through links from BMO web sites.
Please note important disclosures for content produced by BMO Capital Markets. BMO Capital Markets Regulatory | BMOCMC Fixed Income Commentary Disclosure | BMOCMC FICC Macro Strategy Commentary Disclosure | Research Disclosure Statements