The UK government has tightened its cybersecurity rules, your business should too
In late August, the UK government introduced new cybersecurity rules aimed at protecting telecommunication networks against cyber attacks. The rules, which allow the government to boost the security standards of the UK’s mobile and broadband networks, come at a time when attacks on critical infrastructure are becoming more frequent and more dangerous.
Earlier this year, for example, Costa Rica was thrown into crisis after a ransomware attack affected 30 government institutions, including critical ministries and its social security fund. The group behind the attack, known as Conti, threatened to overthrow the government unless the US$10 million ransom was paid. With the help of international partners -- including the United States, Israel, Spain, and Microsoft -- it was able to get all its systems back online, but it took weeks. Montenegro, meanwhile, also saw critical digital infrastructure crippled following a cyber attack blamed on state-sponsored actors. The attack effectively sent some government departments back to the analogue era and was still being wrestled with more than three weeks after it was first detected.
While the new UK government rules may provide a little extra protection against such attacks, they don’t mean that private businesses should take their foot off the pedal. Far from it. Instead, they should redouble their efforts and ensure that they have sound vulnerability management practices in place. In particular, they need to focus on ensuring that their business-critical applications are as well-protected as possible.
Costly, crippling breaches
Before digging into what those practices should ideally look like, it’s worth emphasizing just how big an impact a cyber attack can have on a business.
Today, the average cost of a data breach in the UK is US$4.35 million, up 12 percent from US$3.86 million in 2020. But fiduciary costs aren’t the only ones that organizations have to deal with when it comes to breaches. They can also cause serious reputational damage, wording customer trust in the organization.
Perhaps most worrying, however, is what happens when an organization’s business-critical applications get hit. In those instances, a business might find itself unable to operate at all. That’s especially concerning when you bear in mind that many business-critical applications contain major, undetected vulnerabilities. Most of these applications come from third-party software as a service (SaaS) providers, increasing an organization’s exposure and expanding its attack surface. The profound impact this has had can be seen in a 2021 report, which found that 70 percent of organizations’ application portfolios had become more vulnerable in the previous year.
It’s clear then that organizations need to go above and beyond the defense-in-depth security model on which they’ve traditionally relied.
Vulnerability management becomes critical
While it’s still absolutely critical that organizations practice defense-in-depth, it’s also important that they engage in thorough vulnerability management.
Vulnerability management is a continuous cybersecurity process that includes identifying, evaluating, treating, and reporting software and network vulnerabilities. Properly monitoring and responding to pressing, complex issues are essential components of vulnerability management and information security as a whole. The best place to start when it comes to vulnerability management is being able to identify and address known vulnerabilities. Cybercriminals are constantly looking for ways into an organization and failing to address vulnerabilities is tantamount to leaving a door or window open for them.
Once a vulnerability is identified it’s also critical that organizations build and release patches as quickly as possible. In an ideal world, that would be a given but it’s not. Research shows that as many as 87 percent of enterprises have experienced an attempted exploit of an existing or known vulnerability. Here, technology can help too. A good vulnerability management system can help organizations automatically identify missing patches, hidden assets, misconfigurations, and authorization issues within their IT ecosystem.
The right response plan
Even with all those defenses in place, however, no organization can guarantee that it won’t fall victim to cybercrime. As such, they should also have a comprehensive incident response plan in place.
This plan should place special emphasis on attacks against business-critical applications. As such, the organization should also have a full overview of the IT landscape and that it has a complete record of all applications, users, and data that exist within. The organization should additionally play out "what if" scenarios that prepare IT teams for as many kinds of attacks as possible. In this area, documented playbooks can be very helpful to react appropriately to certain expected scenarios.
No resting on laurels
It should be clear then that organizations cannot trust that improved cybersecurity rules and regulations will keep them safe. Instead, they need to take them as a clear signal that the threat landscape is evolving rapidly and that they need to bolster their own defenses and response plans.
Because if cybercriminals are able to cripple entire countries, there’s nothing stopping them from doing the same to organizations of all sizes.
JP Perez-Etchegoyen is CTO, Onapsis.