The Need For A Security Incident Response Team

Security Incident Response Team

The incidences of modern cyber-attacks are growing, along with their sophistication. Every single weakness, whether technological or human, is being constantly exploited, and the interconnectedness of computers means that a break-in, theft or infection on one system has far-reaching consequences with customers, suppliers and the general public.

Network Security

Network security is an industry created out of necessity. Company decision-makers must recognize that the sheer variety of attack vectors is something that requires constant vigilance, and that not only preparedness, but post-attack response strategies, too, are a critical part of doing business.

security-breach

MetricStream is a global organization that focuses on Governance, Risk, and Compliance (GRC) for modern and digital enterprises. Their recent white paper, entitled The Important Role Of A Cyber Security Incident Response Program, and authored by Vibhav Agarwal and Dr. Michael Redmond, presents a comprehensive assessment of the damage that hackers can cause, the value of deploying a Security Incident Response Team, along with some fascinating case studies and a wealth of highly actionable preventative steps.

Here is an excerpt:

We live and do business in a whole new world; one marked by increasing cyber attacks, and all new rules. Beyond the increase in frequency of attacks, we also face an increase in the types of organizations that have become targets. Today, it goes beyond banks and government-related institutions, to include healthcare providers, retailers, and essentially any entity that owns or has access to the assets and information of its consumers.

Organizations require more focused awareness to bolster their security policies and practices as the foundational structure of an overall risk-management strategy. Furthermore, organizations need to ensure compliance with new laws and regulations that govern how they protect information assets.

It’s also critical that organizations buy into the fact that network and systems administrators alone cannot protect corporate systems and information assets – it must be an organizational team effort. A Cyber Security Incident Response Team (CSIRT) is a must in today’s world.

In April 2012, a server hack was responsible for a HIPAA violation by the Utah Department of health, where over 780,000 people were compromised in the server attack at the authentication level, permitting hackers to hijack Social Security Numbers and personal health records. It was determined that a vulnerable server was not properly configured as per normal procedure, allowing hackers to gain access into the computer network. Added to that, in January and February 2012, nearly 1.5 million individuals were affected by hackers who successfully infiltrated and gained access to the payment processing system of Global Payments Inc. On December 14, 2014, it was reported that the Dutch Government suffered a website outage due to a cyber attack. Allegedly, hackers crippled the Dutch government’s main websites for most of the day, rendering back-up plans and contingencies largely ineffective. All of this goes to show the serious loopholes in our current infrastructure and back-up plans.

While organizations cannot always prevent a breach, a quick response to a security event can go a long way when it comes to minimizing the financial damage and most importantly, protecting the business and its reputation. In order to reduce the costs associated with increased call center activity, customer education and awareness programs, brand repair campaigns, legal and compliance fines, and expenses associated with any customer settlements, organizations should adopt a proactive approach with timely stakeholder communication.”

Pandora’s Box

Of greatest significance in the paper is the recognition that attacks have incalculable costs. Data breaches and thefts unleash a Pandora’s box of additional problems. One compelling case study describes a data break-in to a state Revenue agency that resulted eventually in the filing of hundreds of fraudulent tax returns. It is precisely because no organization can know everything that must be known, that an alliance with governance, planning and response organizations is essential. To review the entire paper, visit Metricstream

By Steve Prentice

Hacker Cloud

Pandemic and Cybersecurity: Top Threats to Businesses

Pandemic and Cybersecurity The worldwide spread of the COVID-19 virus is coming to naught (or at least we hope so). But the impact that this virus produced on the whole world, and specifically on businesses, ...
Jen Klostermann

Enterprises Starting To Embrace Blockchain-as-a-Service (BaaS)

Blockchain as a Service (BaaS) Many global companies have already implemented Blockchain-as-a-Service (BaaS) into their cloud offerings. There isn't any question that offering BaaS can serve as a differentiator for many companies. Not to mention, ...
Gary Bernstein

Mapping Crime Though Big Data – Leading Sources

Online Crime Maps Online crime maps is a set of tools used by law enforcement agencies to map and make an analysis of crimes and incidents in order to find possible patterns in them. Online ...
Juan Pablo Perez Etchegoyen

Key Considerations for Keeping Mission-Critical Cloud Applications Secure and Compliant

Keeping Cloud Applications Secure and Compliant According to reports, nearly 70% of enterprises were moving mission-critical business functions and processes to the cloud before the pandemic. In today’s new normal, that number has skyrocketed. Organizations ...
Patrick Joggerst

Living on the Edge: The New Real-Time Communications Security Risks

Real-time communications Security Risks As more and more people have been forced to work remotely due to the global public health crisis, collaboration platforms have unexpectedly saved the day for millions of businesses and allowed ...
David Friend

Cloud 2.0 will not be Ushered in by AWS or other Cloud Giants

Cloud 2.0 Trends Amazon, Google, and Microsoft are all pursuing similar business strategies: they want it all. ‘It,’ in this case, means the entire IT infrastructure in their cloud. Furthermore, they want you to buy ...