- News & Resources: Listings >
- Blog
- How to Improve Safety and Security in Schools – Cloud Manage Network
- Top 10 Cybersecurity Threats in 2024
- Microsegmentation: Protecting Data from Cyber Threats
- Retail shoplifting and loss prevention: How to protect your business
- Generative AI Cost Optimization Strategies
- Why Do I Need to Protect My Cloud?
- 10 Reasons for Engaging Outside Experts to Manage Your Cybersecurity
- Why Hiring a 3rd Party MSP Expert Makes Sense and – and Cents (MANY cents!)
- Brand and Network Considerations When Adopting AI Corporately
- Integrating XDR, SIEM, and SOAR
- 3-2-1 –Go? Not so quick, this time.
- 5 Things a CISO Shoud Know
- 10-Step Patch Management Checklist
- Penetration Testing vs. Breach Attack Simulation
- Current big cyber breaches and impact on businesses
- Smart Infrastructure Gets Lit Up!
- Securing Industrial IoT: The Missing Puzzle Piece
- 7 Common Cybersecurity Mistakes Made by SMBs
- The Future of Physical Security: Cloud-Based Systems
- Autonomous and Sensor Technology Use Surging
- 2024 Facilities Trends Will Require Facilities and IT Teams to Work in Tandem
- NGFW vs. WAF. What’s the Right Firewall for You?
- Chris Hadfield’s Words To Live By
- Industrial Revolution 4.0 + IIoT
- Digital Fluency Drives Innovation
- Your Cloud Needs Protecting, Too
- Your building alarm systems could become obsolete. In 2024!
- Zero Trust 2.0: Zero Trust Data Resilience (ZTDR)
- We just got, or got used to, Wi-Fi 6. What is Wi-Fi 7?
- What Does the Board Need to Know? Business Metrics that CISOs Should Share – 4th and Last in a Four-Part Series
- Why 2024 is the Year for AI Networking
- International Women’s Day is Tomorrow – Great Time to Think About…
- Data-Centric Security Step One: Classifying Your Data
- The Network – Unsung Hero of Super Bowl LVIII
- What Does the Board Need to Know? Business Metrics that CISOs Should Share – Third in a Four-Part Series
- Boosting IT Team Performance by Fostering Intuition, Curiosity and Creativity
- Breach Remediation Costs Can Wipeout Bottom Line and Business
- Hoodied Hackers Now Favour Hugo Boss
- What Do You Need to Tell the Board? Business Metrics that CISOs Should Share – Second in a Four-Part Series
- How to Get People to Re-Engage After the Holidays
- What Does the Board Need to Know? Business Metrics that CISOs Should Share – First in a Four-Part Series
- Android Devices MUST be Updated + IT Departments Being Cut as Privilege Escalation Escalates
- Today’s Common Cloud Migration and Management Concerns
- Protect Your Healthcare Network from Cyberattack – Lives are at Stake
- Happy Halloween: Black Cats Lead to Boo….Hoo.
- Insurance Underwriters are Protecting Their Flanks
- Insurance Companies Cracking Down as Cybercriminals Become Better Business Builders
- Scary Cyberattacks Stats
- Parents, Profs and IT Professionals Perceive Back-to-School Through Different Lens
- Zscaler’s new IDTR and other tools that leverage generative AI
- Vanquish Vaping, Vandalism and Villainy
- Fabric for Fast-Paced Environments
- Changes to Cyber Insurance Requirements – What you Need to Know
- Cybersecurity Readiness – Newly Released Report
- Passwords Leaked…Again
- 10-Step Patch Management Checklist
- Remote – Again – For Now… and Still Maintaining Engagement
- Protecting Pocketbooks, Passwords and Property from Pilfering
- Raspberry Robin: Highly Evasive Worm Spreads over External Disks
- Cisco Introduces Responsible AI – Enhancing Technology, Transparency and Customer Trust
- Managing Customer Trust in Uncertain Supply Chain Conditions
- Hope on the Horizon
- Toys of Tomorrow… What will spark your imagination? Fuel your imagination?
- Protecting Purses and Digital Wallets
- The Password that Felled the Kingdom + MFA vs 2FA
- The MOE’s RA 3.0 and Zscaler
- 7 Critical Reasons for MS Office 365 Backup
- Penetration Testing Important, but…
- Social Engineering and Poor Patching Responsible for Over 90% of Cybersecurity Problems
- Breach Incidence and Costs On the Rise Again + 5 Ways to Reduce Your Risk
- Cybersecurity Insurance Policies Require Security Audits and Pen Testing
- Wireless strategies for business continuity gain importance as enterprise expand IoT, cloud, and other technologies
- How Cybercrooks are Targeting YOU
- Enabling Digital Transformation with Cisco SD-WAN
- WFH Post Pandemic – What It Will Look Like. What You’ll Need.
- Leaders to looking to the IoT to improve efficiency and resiliency
- Cyber Security Vernacular – Well, some of it, for now
- Why You Need Disaster Recovery, NOT Just Back-Ups
- 10 Reasons Why Having an Expert Manage Your Cybersecurity Makes Sense and Saves Dollars
- Converting CapEx IT Investments into Manageable OpEx
- The Hybrid Workplace – Planning the Next Phase
- Cisco Cloud Calling: Empowering Customers to Thrive with Hybrid Work
- When You Can’t Access the Cloud
- How to Keep On Keeping On
- New Cisco Research Reveals Collaboration, Cloud and Security are IT’s Top Challenges
- Threats from Within on the Rise
- Cloud Covered? If Not, Take Cover!
- Zero Trust and Forrester Wave Report
- Password Based Cyber Attack: Like Leaving Keys Under Doormats
- So, What’s Up With Sensors?
- Sensors and Systems Create a Digital “Last Mile” and Help Skyrocketing Costs
- Scanners Provide Peace of Mind for Returning Students and Workers
- Sensors Improve Operations and Bottom Line… Easily and Cost-Affordably.
- Cisco Meraki Looks at 2021
- 2020 Holiday Shopping: Cybersecurity and Other Tips to Safeguard Wallets and Systems
- How to make the most of the technology you have
- Personnel, Planet and Business Progress: More Interdependent Than Ever Before
- Sure… you can get them all in the boat – but can you get them to work well together?
- Pushing the Zero Trust Envelope – Cisco is Named a Leader in the 2020 Forrester Zero Trust Wave
- Cloud Data Must be Protected, Too!
- Don’t Let Anyone Get the Dirt on You – Make It Instead!
- How IoT Devices Can Help You and Your business
- WebEx – A World of Possibility
- Creating Your Breach Response Plan Now Will Save You Thousands Down The Road
- Been hacked? Here’s what you must do next.
- The Need for Pen Testing is At an All-Time High
- 5 Ways an IT Reseller Improves Your Performance and Peace-of-Mind
- 5G and Wi-Fi 6: Faster, more flexible, and future ready. Are you?
- Network and Data Security for Returning and Remote Workers + Disaster Recovery Symposium
- Collaboration and Cisco WebEx: Protecting Your Data
- Thursday’s Virtual Conference Tackles Today’s Supply Chain Trials and Tribulations
- 10 Tips to Reduce Cloud Storage Risk
- COVID-19 Crisis Fuelling IT Spending
- Supply Chain/Logistics Experts Share Their Expertise
- Cisco Breach Defence Overview
- Announcing Our New Website and Blog
As of August 2023, cyber attack was occurring every 26 seconds globally. According to the FBI and Interpol, approximately 33 billion accounts will be breached by the end of 2023. That’s about 97 cybercrime victims being created each and every hour!
In Canada, the number is closer to one a minute – but that’s still an unfortunately and unacceptably high figure!
This also means there have been double-digit increases in success criminal network breaches this year.
Unfortunately, there have been corresponding increases in the cost of these crimes. In 2022, the figure was $6 trillion, and experts estimate the figure will rise to $10.5 trillion by 2025. That’s a 175% increase within two years.
Ransomware and Remediation Both Hit the Bottom Line. Hard.
Although the ransomware fee – if it is paid by the company – represents an interesting sum, the majority of the costs companies face when victims of a successful cyber infiltration, fall into four categories.
-
Ransomware Payouts
-
Investigation and Remediation
-
Business Interruption
-
Brand Reputation – and even Business Implosion
Ransomware Payouts
On average, the ransom was paid out by 44% of Canadian firms last year, and of those, nearly 95% were able to fully restore their data – though some had trouble getting everything up and running smoothly.
The average payout amount was $140,000, or about 16% of the total remediation costs, with recovery and restore being only part of the additional expenses. Obviously, there were some small payouts, but there were some very large ones, too. It should be noted that the insurance companies did not pay the ransomware in all cases.
Investigation and Remediation
About 40% of the total cost associated with a breach is for identifying the problem, resolving it and then preparing to get the company back up and running.
Reducing Remediation Costs
Here are things you can do:
-
Have a solid breach preparedness plan. It should be developed in tandem with all departments within the organisation. You can download a list of elements to include here .
Your plan needs to be shared with department heads, and regular reviews and practice drills should be held. It’s also important to print and post the steps to take in the event that you get hacked. After all, the plan will do you no good if locked on the server.
-
Backup data operating systems along with all special configurations, as well as keeping a record of which users, and devices, have access to what programs. In terms the backup, it is advisable to have this as an automated process by using a program such as the one from VEEAM.
Cautionary note: You must ensure that the back-up system you choose does not synch automatically back to your network, or you risk re-infecting your network if you saved a file containing malware. This is especially problematic if the virus laid low for a long time before deploying.
Your needs to be backed up in three locations – one of which can be the cloud.
-
Ensure your data is backed up in two locations that are not on premises – and that each of these is located in different geographic areas.
-
If your organisation is small enough, also back up your data, operating systems and keys to an external hard drive. You can get them with 22 TB of capacity or more – and solid state is best. I have two. One that I keep where I work and the other at home.
-
Engage the services of a third-party Disaster Recovery firm. If you are going to manage this yourself, remember there is a big difference between backing up your data and being able to restore everything to pre-attack operating status. If you’re doing this internally, it’s advisable that you routinely practice restoring your systems and data, right from bare metal, in the event of a total system collapse.
-
Work with a DraaS firm. It’s far better to engage the company before you need its services, but this truly is a case of “Better late than never”. It is helpful to have someone who knows exacty what to do, with the experience and current knowledge of the nastiest malware out there – especially since your team will be contending with other matters. The ones we work with can all be working to set things right within 30 minutes or less.
-
Deploy software, such as Cisco’s Secure Network Analytics will give you visibility and secure intelligence across the entire organisation before, during and after attack. Continuously monitor your network to provide real-time threat detection incident response forensics. It also helps with ongoing threat hunting which is an important part of maintaining your network security.
Business Interruption
Every moment a company is unable to serve its clients, manufacture items or delivered much needed services, it cost the company money. In the event of critical services such as hospitals and infrastructure, the toll can be life-and-death, literally.
Brand Reputation – and even Business Implosion
Loss to brand reputation can take the biggest toll on an organisation. This is especially true if customers take to social media to complain about your downtime or clients’ personal information is leaked onto the dark web.
If you are as well known and trusted, you might recover from the attack, just as LinkedIn did after the August 2023 breach. If not, you may not survive. Approximately 20% don’t.
Worse, is something that people don’t discuss as often, but represents an increasing component of the costs associated with cybercrime. It is the theft of corporate strategies and intellectual property.
There is a disturbing amount of corporate information available for sale on the dark web.
AvosLocker is a company that has been offering Ransomware-as-a -Service to criminals since 2021, and is known for targeting critical infrastructure, government and other public facilities, financial services and manufacturing in Canada and the US, Europe, including countries such as Belgium, Germany, Spain and the UK, as well as countries like Taiwan, Turkey Syria, Saudi Arabia and others. It often has corporate property data available for sale.
As do other access brokers.
Proprietary processes, patent formulas, client list and more. All can be had for a price. And a relatively low price, at that.
It’s estimated at least two companies globally are forced out of business each and every month, because their proprietary information has been stolen. Competitors, sometimes new companies that form for the sole purpose of taking over an established business, have managed to procure everything needed to make the product(s). They also “steal” the original company’s customers, and capture a larger market share, with a lower-priced, yet seemingly comparable product offering. And, sadly, this figure is escalating.
Corporate espionage is often behind attacks, especially nation-state ones, but in over 90% of corporate breaches, employee and client personal data is also stolen.
Preparation and planning can help protect your people and profits. To learn more, please contact us at [email protected] or call us at 416.429.0796 or 1.877.238.9944 (toll free).