UC Advanced - issue #4

and refine the response plan.” While the blame may be partially at least levelled at employees, according to Reeves, and Mole, businesses need to take responsibility for the training of staff to be able to spot potential problems, and maybe the odd phishy email. “It doesn’t matter how much technology a business has in place if they don’t have the skill of people to pay attention to it,” said Mole. “A few years ago, Rob Joyce, who used to be the Head of Tailored Access Operations at the NSA in America, presented at a conference and talked fairly openly about how the NSA works and what caused them problems. He said that what hackers fear the most is an out-of-band network monitoring solution that sees everything on the network and that someone is paying attention. “If we’re going to defend networks better, we need a combination of good technology, good people, and good processes. That’s the pragmatic approach that I’m seeing more from C-level people.” “Focusing on developing the internal security culture is key,” said Reeves. “Threat- aware staff, who are trained against their genuine environmental risks, not death by Powerpoint, are the most effective defence. “An important question CEOs need to be asking of their business right now is how likely are your people to raise their hands and admit to clicking a dodgy link or being held to ransom? Security and risk go hand in hand but are rarely seen as bedfellows at the board level. “Risk is often articulated at the board level through a commercial lens, but rarely seen from the perspective of cyber governance and compliance - let alone impact from those hellbent on disrupting your business. A firewall and long passwords are no longer enough.”

Christine Sabino Legal Director

hayesconnor.co.uk

and how to spot them, can also be a good education point. “It might sound simple, but these small improvements could save a business time and money. Ensuring to have regular training for current staff, and making this training part of the onboarding process is essential.” Chaudhuri echoed that sentiment, adding “Storage solutions are also vulnerable to insider threats, where employees or trusted individuals misuse their privileges to access or leak sensitive data. “Whether intentionally or unintentionally, insider threats can result in significant data breaches and compromise the security of storage systems. Implementing access controls, user behaviour monitoring and regular security audits can help identify and mitigate the risks associated with insider threats. “Employee training is a critical component of a strong defence. Cyber Security awareness programs educate employees about potential risks, best practices, and the importance of data security. By empowering employees to identify and respond to potential threats, businesses can build a security culture and reduce the likelihood of human error leading to breaches. “Incident response plans are crucial for effective incident management and mitigation. Businesses should have well- defined procedures to detect, respond to, and recover from security incidents. This includes establishing a dedicated incident response team, implementing incident monitoring systems, and conducting regular drills to test

Bernard Montel Technical Director

tenable.com

ucadvanced.com

27

Powered by