The Sony "PR Car Crash"
As reported on the Guardian website today, the Sony Breach Saga continues with further releases of private emails, leaked film plots and the list of embarrassing revelations goes on... They certainly are getting "run through the mill" and no doubt it will be a hugely costly episode in Sony Pictures' life. In fact the journalist from the Guardian even goes as far as suggesting that they may never recover.
What a terrible situation for Sony - the brand, the company and for all the people implicated in this. None of us is immune from data compromise - in fact most organisations are likely to be successfully hacked and compromised to some degree - even security businesses like ourselves and others who deal with this threat daily.
Defence, mitigation and survival in this online, everything-available-all-the-time-world comes down to how well prepared your business is:
Of course this is a little simplistic, but the four points above are four areas that are certainly worth exploring/checking in your business to find out how well prepared your business is to defend itself.
Security-wise
Having worked in the payment card industry for the last decade, the different approaches we've seen can fall into several categories, but the two that we're focusing on here are:
Image by Alamy.
Education-wise
How well do your staff understand data security and the threats to your business? Our finding is that most orgaisations have a basic level of understanding of data security inherent in their workforce, such as don't write your password down. Unfortunately very few do a great job of actively educating their staff. A cyber-security strategy needs to incorporate the end-user as attackers will always look for a chink in an organisation's armour - identifying that weakest link is a lot easier when the organisation's staff are ignorant of the threats to the business.
Management-wise
Management buy-in is one of the most imporant parts of a cyber security strategy. Ensuring that C-level executives understand the threats to the business (and usually their jobs) is essential in forming an effective cyber-security strategy - thinking budgets, headcount, technology, education etc. A security manager without management buy-in can be likened to a boxer getting into the ring with one or both hands tied behind his/her back to fight a highly trained and experience opponent - and still being expected to win. Its unlikely to work out...
Response-wise
Incident Readiness and Response Preparation. Preparing for the attack and breach of defences is a crucial part of a cyber-security strategy and needs to be taken *very* seriously. We've seen all the headlines this year with all the big names being compromised (Home Depot, Bebe, UPS, Sony, Niemann Marcus, Dairy Queen and a lot more). Let us assure you that it is not only the big names getting hit - it is ALL manner of organisations. And they are certainly not limited to the US (although with the disclosure laws in the US, we hear about them a lot more). Our forensic business has had its busiest year yet, with our caseload more than doubling the previous busiest 12 months.
We believe that every business should be preparing for the day that they have a breach - they need to know what they are going to do to manage the situation, how quickly they react will be critical in defending their business from further damage.
Incident Response Planning
Our experience in the forensic field has taught us that most hacked organisations do not have effective security in place. In addition, very few have even a basic Incident Response Plan in place. They all assume that it will not happen to them. Unfortunately experience has shown that it does happen to them - and it could happen to your business too.
To assist you in building your Incident Response Plan, we have created a free Incident Response Planning Guide that outlines some of the key steps that an organisation needs to take to build an effective Incident Response Plan.