Skip to main content

Cybersecurity Pointers for Business Leaders



Michele Braun
Director, Institute for Managing Risk
Manhattanville School of Business

What can a company do to take advantage of the computer and Internet technology that helps it flourish while staying protected from cybercrime and cybersecurity threats?

We used to say “you only have to open a newspaper …” to find a frequent news topic.  Today, you don’t even need to open up the newspaper (either physically or digitally) to find yet another report about a cyber breach, a cyber fraud, hacking, ransomware, phishing, or spear fishing.  Today, these news reports are routine and “above the fold,” the subject of Congressional hearings, company announcements attorney general investigations.  It’s almost a cliché, unfortunately, to tell a business that the question is not “if but when” it will endure a cyberattack.

The Wall Street Journal quotes Cathy Bessant, Bank of America’s Chief Operations and Technology Officer, as saying “There is only one way to be fully protected, and that is to shut the place down.” (October 30, 2017, page R6).  Ms. Bessant also said that “The art of cyber is to keep the firm in business and continue to grow and serve the needs of the customer every day.”  This imperative applies equally at non-profit and for-profit enterprises.  

On November 9, 2017, a panel of cybersecurity experts gathered at the Manhattanville School of Business to explore this “art of cyber,” address the necessary balance, and answer many of the practical cybersecurity questions asked by business leaders.  [My October 30 article tees-up those questions.]

For Tom Morley, Director of the NY Small Business Development Center, preparedness starts with a risk assessment.  “Inventory your data,” he advised.  “Get granular, and catalog the risk:  what would have value to someone else [if stolen] and what’s the value to you if lost?”  Data files are important company assets and as worthy of protection as any physical asset. 

Planning and practice are key cyberprotection tools according to Michelle Mitrione, Manager in IBM’s Security Services Global Portfolio Management group.  “Assess your risks, plan your response, test your plan, and then do it again,” says Ms. Mitrione.  Testing, training, and practice are key to avoiding risks, surviving breaches, and recovering from set backs. 

Rob Rosenzweig, National Cyber Risk Practice Leader at Risk Strategies Company, advises businesses of all sizes to consider purchasing cyberrisk insurance.  As a growing market, there are many insurers offering this product, so a business should be able to shop around to get good coverage.  Then, if your systems are breached, Rob said to think of the insurer as your “one-stop source” for recovery services.  The insurance company should be able to arrange for specialists to investigate the breach, provide legal advice, monitor credit for customers (if appropriate), and assist in restoring corrupted files.

The first thing to do if you suspect a breach, says Andrew Kaplan, President of Ekapco, a computer network and systems solutions company, is to disconnect the computers from the Internet.  This might mean unplugging a communications cable or turning off the Wi-Fi.  Then, both Andrew and Rob advise that you call (1) your IT professional and (2) your lawyer in rapid succession.  Bringing in legal counsel early is important to insure compliance with consumer notification laws and other regulatory requirements that vary by industry. 

Now, even as your firm is recovering from the breach, start updating your plan and identifying problems that might be avoidable.  All the speakers warned that recovered data and computer applications must be screened before reloaded onto company computers—you don’t want to re-infect them if the backed-up version carries a virus or foreign program.

In evaluating risk, consider isolating certain systems.  Mssrs. Morley and Kaplan recommend keeping some computers away from the Internet.  They recommend that you assess whether your systems (inadvertently) expose internal data sets and proprietary information to the Internet, when they only need to be available for internal company use.  Speaking of internal use, Ms. Mitrione cited statistics on the risk of breaches from internal sources, either accidentally or maliciously.  Employees should be given access only to the internal systems required for their work—not everyone needs access to all systems. 

Importantly, all panelists spoke about creating a culture of awareness and quick response—train staff actively, make sure they understand the urgency to promptly report problems and suspicious activity, and work to see that everyone stays alert! 

Finally, the panelists provided the following important tips and successful strategies to enrich cybersecurity.  And, email me your business questions for cyber security [michele.braun@mville.edu] so we’re ready to answer them in future programs.  


Cybersecurity:  Readiness, Response & Recovery
Tips and Best Practices from Expert Panel
Manhattanville School of Business, November 9, 2017

Tom MorleyDirector
Small Business Development Center for Putnam, Rockland, Westchester Counties

Information is an asset deserving protection.
Cybersecurity is easier than some may think.
Cybersecurity isn't optional.

Robert H. Rosenzweig, RPLU | National Cyber Risk Practice Leader
Vice President, Risk Strategies Company

It is not just a technology issue, people and processes are part of a problem. Train your employees!

The organizations that are best positioned to minimize the cost and reputational impact of a data breach have an incident response plan and stress test it with table top exercises.

Not all Cyber Insurance policies are created equally, make sure you are working with a true specialist broker and understand what you’re buying.

Michelle Baselice Mitrione, Manager
IBM Security Services Global Portfolio Management

Don't get comfortable. You ran your penetration test and now think you are done for the year.  This is an ever changing threat landscape and we must stay vigilant.

Know your data.  Are your “crown jewels” classified as such? Where does your critical data reside? Who owns sensitive data?

Know who to call.  Treat breaches as business critical situations and not just an IT problem.

Andrew Kaplan, President
Ekapco LLC

The END user is the final defense, and the defense is only as good as the weakest link in the chain.

DO NOT OPEN ANY attachment/links without taking a moment to think is this VALID, if not sure ask someone, and there should be a Ask path, who asks who when not sure.
  
NEVER let anyone add anything to the network without default passwords being changed: camera systems, postage meters, copiers, printers. AKA a target.

Comments

Popular posts from this blog

The Marketing Success of Mailchimp

Today in the October 5th New York Times there was a wonderful article published about the success of a small business called MailChimp and how they accomplished this while taking the road less traveled. According to the article there are two ways to create a business.  The first is the typical way a business gets started; a young entrepreneur comes up with an innovative idea, next is the creation of a prototype along with participating in a start-up boot camp. This then leads to small investors hopping on board; which leads to the creation of a Kickstarter. If everything works out and the product is successful it’s time for the founders to enter the haphazard mode called expansion. This usually translates to selling off the company piece by piece for huge chunks of money from venture capitalists. Then, once a few years have passed, if all goes well, the founders hit it big time and then BANG their set.  The second and less well known option is just ...

The End Of A Manhattanville Legend

A piece of Manhattanville College died when sister Ruth Dowd passed on Friday, May 31, 2019, four months after her 100 th birthday. People will look at those dates will say “she had a good run,” or “she had a good life.” And while that is true, the fact is those who really knew her know there is much more to her story! Obituaries tell us about a person’s life; where they are from, went to school, worked, their family etc. They are benign by nature…   Let me tell you my thoughts about the PERSON, and bear in mind, I met her when she hired me 13 years ago…when she was merely 87! Ruth is one of my favorite names. Aside from being the eighth book in the Bible, and only one of two named after women in the Old & New Testaments,  it was my Grandmother’s (mother’s side) name. You want to talk about special people???? Sister Ruth Dowd hired me in 2006 to run the sport business management program at Manhattanville College. I took the interviews, but I really was kind...

Why Study Risk Management?

As I read the newspapers, listen to news radio, watch TV news, stream business and general news, one of the words that shows up most frequently is “risk.”   Risky decisions, risk-weighted analyses, risk-focused audit, cyber risk, climate change risk, to name a few examples.   Several business people have told me they just want to run their enterprises and, unless risk taking is explicitly part of the business model (as for an investment fund or insurance firm), they just don’t have time to worry about risk.   This preference, while understandable, appears to be at odds with the frequent media references, so I decided to consult some experts.   The 2018 International Standard on Risk Management ( ISO 31000 ) says that t he purpose of risk management is “the creation and protection of value.   It improves performance, encourages innovation and supports the achievement of objectives.” Another widely recognized industry initiative ( COSO 201...