ICAS ICAS logo

Quicklinks

  1. About Us

    Find out about who we are and what we do here at ICAS.

  2. Find a CA

    Search our directory of individual CAs and Member organisations by name, location and professional criteria.

  3. CA Magazine

    View the latest issues of the dedicated magazine for ICAS Chartered Accountants.

  4. Contact Us

    Get in touch with ICAS by phone, email or post, with dedicated contacts for Members, Students and firms.

Login
  • Annual renewal
  • About us
  • Contact us
  • Find a CA
  1. About us
    1. Governance
  2. Members
    1. Become a member
    2. Newly qualified
    3. Manage my membership
    4. Benefits of membership
    5. Careers support
    6. Mentoring
    7. CA Wellbeing
    8. More for Members
    9. Area networks
    10. International communities
    11. Get involved
    12. Top Young CAs
    13. Career breaks
    14. ICAS podcast
    15. Newly admitted members 2022
    16. Newly admitted members 2023
  3. CA Students
    1. Student information
    2. Student resources
    3. Learning requirements
    4. Learning updates
    5. Learning blog
    6. Totum Pro | Student discount card
    7. CA Student wellbeing
  4. Become a CA
    1. How to become a CA
    2. Routes to becoming a CA
    3. CA Stories
    4. Find a training agreement
    5. Why become a CA
    6. Qualification information
    7. University exemptions
  5. Employers
    1. Become an Authorised Training Office
    2. Resources for Authorised Training Offices
    3. Professional entry
    4. Apprenticeships
  6. Find a CA
  7. ICAS events
    1. CA Summit
  8. CA magazine
  9. Insight
    1. Finance + Trust
    2. Finance + Technology
    3. Finance + EDI
    4. Finance + Mental Fitness
    5. Finance + Leadership
    6. Finance + Sustainability
  10. Professional resources
    1. Anti-money laundering
    2. Audit and assurance
    3. Brexit
    4. Business and governance
    5. Charities
    6. Coronavirus
    7. Corporate and financial reporting
    8. Cyber security
    9. Ethics
    10. Insolvency
    11. ICAS Research
    12. Pensions
    13. Practice
    14. Public sector
    15. Sustainability
    16. Tax
  11. CPD - professional development
    1. CPD courses and qualifications
    2. CPD news and updates
    3. CPD support and advice
  12. Regulation
    1. Complaints and sanctions
    2. Regulatory authorisations
    3. Guidance and help sheets
    4. Regulatory monitoring
  13. CA jobs
    1. CA jobs partner: Rutherford Cross
    2. Resources for your job search
    3. Advertise with CA jobs
    4. Hays | A Trusted ICAS CA Jobs Partner
    5. Azets | What's your ambition?
  14. Work at ICAS
    1. Business centres
    2. Meet our team
    3. Benefits
    4. Vacancies
    5. Imagine your career at ICAS
  15. Contact us
    1. Technical and regulation queries
    2. ICAS logo request

Eight ways to improve your cyber security

Photo of a busy office
  • LinkedIn (opens new window)
  • Twitter (opens new window)
Andrea Murad By Andrea Murad, CA Today

15 May 2019

Key points:

  • The biggest threats to business data don't come from hackers - they come from the employees who give access and mismanaged systems.
  • The repercussions of data breaches are wider than data loss.
  • Read the following tips for every employee and business to help secure data against cyberthreats.

Whether malicious or human error and no matter how many protections a company has, internal data breaches are just as significant and even more prevalent than attacks from hackers. How do companies tackle the human element of cybersecurity threats?

Since every company is susceptible to some type of attack and the consequences are costly, the best cybersecurity strategy is to be proactive rather than reactive.

Breaches happen in different ways. Someone could type the wrong email address or accidentally click on a link. A disgruntled employee may deliberately leak information or copy sensitive customer information.

While there are legal protections in some countries and government compliance requirements that do stop some leaks because sensitive data must be accounted for, leaks can still happen.

The current numbers say that the average breach costs $3.8m USD per organization.

“It happens with people being irresponsible with how they communicate and also people not being protective of information, but it comes downs to training and awareness, and governance,” said Warren Zafrin, Managing Director, Risk Advisory Services, UHY Advisors NY, Inc.

Deploying enforcement policies and technology also help contain the exposure.

“The current numbers say that the average breach costs $3.8m USD per organization,” said Jonathan Steenland, Chief Operating Officer of the National Cybersecurity Center. “Those are hard dollars, but what is more difficult to quantify is the longer-term impact from a breach of trust.”

Identification and remediation

Once a breach occurs, there are expensive forensic costs to identify the root cause, the extent of what’s been compromised and the necessary remediation. “There’s a handful of things that are becoming common place for companies to do post-breach,” said Jonathan.

Consumers might be provided additional protections like credit monitoring for a number of years, for example, and there are also different types of lawsuits as a result. These costs are tangible and easy to understand and calculate.

Connecting the dots to the breach is difficult.

Depending on how much intellectual property was lost however, the long-term impact of that loss and any resulting shift in the competitive landscape within that industry is harder to calculate.

This effect often takes a few years to play out, and the shift might be from a significant breach that happened a few years back and not from a new competitor with comparable technology or services. Connecting the dots to the breach is difficult, and the financial impact would likely be much higher than $3.8M, said Jonathan.

Companies can protect themselves with a heightened level of resiliency and operational readiness to be able to sustain a breach and move forward, but the strategy starts at the top.

This means having a comprehensive system in place so that companies can assess where to make any necessary changes.

Here are tips to develop an effective strategy that focuses on people, process and technology:

1. Training

People are always the weakest link, and the first defense is to train staff on basic cyber awareness; like how to spot phishing emails and social engineering attempts, and to be more careful when sending emails with sensitive information. Good technology can mitigate these threats, and having processes will give employees a way to report any suspicious activity.

2. Change password policies

A robust password policy with two-factor authentication, for example a text or a rolling token in addition to a password, will properly protect data and prevent 90% of breaches, said Andrew Beckett, Managing Director and EMEA Leader for Kroll’s Cyber Risk Practice.

Also, consider requiring this additional step on any cloud systems and to access sensitive information like intellectual property, data used by human resources or finance, or customer details, for example.

3. Use encryption

Encrypt data at rest on servers or a hard drive, or anything that’s transmitted. “If you do decide to encrypt, encrypt it properly so it’s stored securely,” said Andrew. “If you’re going to send an email with sensitive data, make sure that’s encrypted even if that email is internally in the office, because your biggest threat is the insider.”

4. Monitor systems

Know who interacts with assets and where those assets are located, for immediate response to unauthorized access. Monitor employee access to information and their actions so that if a disgruntled employee copies a contact list to a thumb drive, for example, you’re able to flag this abnormal behavior, investigate it and take any necessary actions.

5. Use the right technology

Deploy suitable technology, like firewalls, encryption, secure access and segregating networks with VPNs, but along with installing the technology, configure it as well. Firewalls, for example, are an essential part of any network and on many computers, but attackers get through because people don’t change the default passwords. Also, install software updates as these tend to also have security updates that protect against the latest threats.

“There are numerous ways of defeating firewalls, but just because they’re defeated doesn’t mean you’re wasting your money – put it in place, change the default settings, and make sure it’s updated to the most current version,” said Andrew.

6. Avoid public Wi-Fi

Fake Wi-Fi networks are often mistaken for a public network, and when people use the wrong network, someone else can see all their traffic, like login credentials and emails. Two-factor authentication can protect passwords as does using out-of-band communications.

7. Apply governance

A good first step is to set governance and appoint an employee at the top to take an active lead and be responsible for security. Even if there isn’t a regulatory requirement, there are dozens of standards that can be applied and used for monitoring purposes.

8. Create infrastructure

“Make sure that staff understand how to report suspicious activity on the network, have appropriate escalations and procedures, and have suitable external relationships in place,” said Andrew.

For some companies, this might mean having external counsel on retainer and an external computer forensics company to provide advice in the event of a breach, as well as crisis PR companies who can help with the disaster. Also, build relations with the local law enforcement to report cybercrimes.


About the author

Andrea Murad is a New York–based writer. Having worked on both Wall Street and Main Street, she now pursues her passion for words. She covers business and finance, and her work can be found on BBC Capital, Consumers Digest, Entrepreneur.com, FOXBusiness.com, Global Finance and InstitutionalInvestor.com.

2-23-totumpro 2-23-totumpro
ICAS logo

Footer links

  • Contact us
  • Terms and conditions
  • Modern slavery statement
  • Privacy notice
  • CA magazine

Connect with ICAS

  • Facebook (opens new window) Facebook Icon
  • Twitter (opens new window) Twitter Icon
  • LinkedIn (opens new window) LinkedIn Icon
  • Instagram (opens new window) Instagram Icon

ICAS is a member of the following bodies

  • Consultative Committee of Accountancy Bodies (opens new window) Consultative Committee of Accountancy Bodies logo
  • Chartered Accountants Worldwide (opens new window) Chartered Accountants Worldwide logo
  • Global Accounting Alliance (opens new window) Global Accounting Alliance
  • International Federation of Accountants (opens new window) IFAC
  • Access Accountancy (opens new window) Access Acountancy

Charities

  • ICAS Foundation (opens new window) ICAS Foundation
  • SCABA (opens new window) scaba

Accreditations

  • ISO 9001 - RGB (opens new window)
© ICAS 2022

The mark and designation “CA” is a registered trade mark of The Institute of Chartered Accountants of Scotland (ICAS), and is available for use in the UK and EU only to members of ICAS. If you are not a member of ICAS, you should not use the “CA” mark and designation in the UK or EU in relation to accountancy, tax or insolvency services. The mark and designation “Chartered Accountant” is a registered trade mark of ICAS, the Institute of Chartered Accountants of England and Wales and Chartered Accountants Ireland. If you are not a member of one of these organisations, you should not use the “Chartered Accountant” mark and designation in the UK or EU in relation to these services. Further restrictions on the use of these marks also apply where you are a member.

ICAS logo

Our cookie policy

ICAS.com uses cookies which are essential for our website to work. We would also like to use analytical cookies to help us improve our website and your user experience. Any data collected is anonymised. Please have a look at the further information in our cookie policy and confirm if you are happy for us to use analytical cookies: