11.04.2016 Views

Cyber Threats Targeting Mergers and Acquisitions

10sG0c

10sG0c

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Marketing<br />

Marketing plays an important role in the M&A process, but it can also provide clues that threat<br />

actors may act upon. These clues are not always easily visible <strong>and</strong> spelled out. In fact, to the public<br />

these marketing activities may appear as business as usual, but to a trained analyst an identifiable<br />

pattern <strong>and</strong> opportunity can emerge. Some signals might appear in the form of a company visibly<br />

slowing down its cycle of new feature releases or showing a strength in profitability but meanwhile<br />

quietly reducing staff. Such activities can leave organizations open to threats. For example, based<br />

on such clues an attacker may target someone in corporate development with a one-page company<br />

summary designed to look like an M&A document, but in reality is part of a spear-phishing<br />

campaign. Or, in cases where a reduction in staff is occurring <strong>and</strong> speculation of M&A activity<br />

begins to spread, employees who are feeling overworked <strong>and</strong> at risk of losing their jobs may seek to<br />

intentionally leak data at the expense of the organization.<br />

Due Diligence<br />

Due diligence is one of the most important stages of the M&A process; it is an opportunity for<br />

the acquiring company to carefully review the target company with a fine-toothed comb to better<br />

underst<strong>and</strong> their strengths, weaknesses <strong>and</strong> risks. That said, it’s important to ask the right<br />

questions as they relate to security <strong>and</strong> integrity of the organization. For example, the company in<br />

question may have previously experienced a data breach that was either never detected or never<br />

fixed. Similar issues may include the acquisition of insecure network infrastructure <strong>and</strong> software. A<br />

failure to detect these issues at this stage could have significant long-term effects for the acquiring<br />

company. To this end, Appendix 1 provides guidelines <strong>and</strong> recommendations for organizations to<br />

underst<strong>and</strong> how they can mitigate such risks as part of the due diligence process, prior to finalizing<br />

the deal.<br />

It is also important to note that, at this stage of the process, the amount of data that is shared<br />

increases dramatically <strong>and</strong> so does the risk of a data breach. As such, organizations may well<br />

experience an increase in spear-phishing attempts as attackers strive to take advantage of a surge<br />

in valuable data that exchanges h<strong>and</strong>s during due diligence.<br />

9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!