10.07.2015 Views

Cityam 2015-05-21

Cityam 2015-05-21

Cityam 2015-05-21

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6 CYBERSECURITYINFO.CO.UKAN INDEPENDENT SUPPLEMENT BY MEDIAPLANETINSPIRATIONTacklingthe cybersecurityskills gapLieutenant GeneralSir Edmund Burton KBEChairman of the Information AssuranceAdvisory Council (IAAC)PHOTO: THINKSTOCKHands on learning. Awareness training is becoming essential for organisationsCompanies are falling shorton awareness trainingClicking on a web link in an email is a common and often harmlesstask that we all do every day both at home and work.Yet, as we have been told, andhave seen, it can actuallybe very dangerous and canlead to massive problemsfor individuals and companies.Cybersecurity professionals callthese sorts of attacks, for that is whatthey are, phishing attacks. These attacksrefer to a multitude of clever scams thataim to lure people into launching malwareor offering information that an attackercan use to compromise systems,steal data, or mimic identities. They canrange from fraudulent phone calls frompeople pretending to be from your bank,utility, or helpful service desk, to emailsthat invite you to hold money for peopletrapped in warzones or confirm yourbank details. And they can be very clever.People who have long understoodthe concept of a phishing attack are atrisk of being duped as these attacks becomemore targeted, even personalisedwithin email invitations, in texts and onsocial media sites.These cyber security scams have becomeheadline news and many companiesrecognise the need to invest in programmesto help their employees be moreaware of the risks. It comes as a worryingsurprise therefore when phishingscams top our list of tactics that securityprofessionals are facing today.Our <strong>2015</strong> Global Information SecurityWorkforce Study conducted by industryanalysts Frost & Sullivan surveyed nearly14,000 information security professionalsaround the world to reveal, predictably,that the threat techniques employedby attackers and hackers todayare diverse. Phishing attacks featuredAdrian Davis, CISSPManaging Director EMEA, (ISC)2prominently as a top concern identifiedby 54 per cent of respondents, wayahead of other concerns such as networkmalware (36 per cent). Accordingto the study report “the realism and targetedapproach of today’s phishing campaignsappear to rival the informationsecurity professional’s efforts to elevateemployees’ ability to recognise, report,and leave untouched suspected phishingmessages.” This is worrying givenhow just one mistake can lead to a virulentpropagation of malware across theorganisation’s network and systems.A rising threatData Breach Research from Verizon confirmsa rising trend, with phishing beingin the top 20 varieties of threat actions ineach of the past five years, rising to tenthplace in 2013 and then third last year. Therise of such threat actions is also drivenby the sophistication of attacks, with theinformation gained in phishing scamsoften used to compromise systems utilisingother techniques, in what are known“These cybersecurityscams havebecomeheadlinenews andmanycompaniesrecognisethe needto invest inprogrammesto help theiremployeesbe moreaware of therisks”Learn more atcybersecurityinfo.co.ukas Advanced Persistent Threats (APTs).What are companies doing to copewith this risk? Investments are beingmade in tools and technology. However,creeping levels of complacency aroundawareness training may well be a contributingfactor in making phishingattacks effective. Our survey, whichhas been conducted for over ten years,shows a declining trend in respondentsindicating demand for end-user educationand training over the past threesurveys (2011 - 39 per cent, 2013 – 38 percent, and <strong>2015</strong> – 32 per cent). Further,there is notable downward movementin the levels of concern associated withmobile devices and internal employees.It’s not that the concern isn’t there, butother concerns are rising up the prioritylist.With regard to awareness, I worrythat companies and organisations maybelieve that they are doing enough, orworse, believe they have already takencare of the need with online training resourcesor the programme deliveredlast year. The hackers’ success shouldpuncture this complacency. The realityis that delivering awareness trainingisn’t enough. Appropriate security instincts,which starts with a recognitionof accountability, must be embeddedacross the organisation. Common awarenesstechniques only go so far. Thereis considerable work ahead for organisationswho must assure an understandingof how this can be accomplished intheir organisation; assuring their effortsare highly contextual and relevantto their risks. The first step will be recognisingthe priority.“The Government has avision for a vibrant, resilientand secure cyberspace,contributing to economicprosperity, nationalsecurity and a strongsociety. The vision can onlybecome a reality if wehave a strong cybersecurity skills base in theUK, both within Governmentand in the private sector.”[Minister forUniversities and Science- March 2014]This vision calls for urgent actionby executive boards acrosspublic and private enterprises,in partnership with schools, collegesand universities. The initiativepresents national and internationalbusiness opportunitiesfor enterprises large andsmall. Previous national initiativeshave failed because of a failureof executive boards to engageand to provide the necessaryleadership and resources.The national need can be met byfocussing national efforts aroundthe Government Cyber SecuritySkills initiative. Such a programmealready provides a clear statementof the objective that has instigateda range of concurrent activities.These have included therecent changes in primary and secondaryschools’ curricula and theestablishment of cyber securitycentres of excellence in researchand education.While the UK addresses the mediumand long term need for skillsand education, there are majoropportunities for the providersof managed security services tomeet the current, urgent and importantneeds of enterprises. Thiswill achieve the cost effective managementof persistent threats tobusinesses and should result inthe development of a discerningand intelligent customer community.Thesuccess of this historicopportunity will depend on the effectivenessof leadership, by example,throughout public, privateand third sector enterprises.Learn more oncybersecurityinfo.co.uk

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!