Monday, September 25, 2023

NEW INC. MAGAZINE COLUMN FROM HOWARD TULLMAN

 

Don't Gamble with Your Tech Security

This week's cyberattacks in Las Vegas are yet another reminder that you can't be passive about protecting your network and other digital assets. You need to relentlessly remind all team members that they each have a role, every day, in protecting the company--and their jobs. 

 

BY HOWARD TULLMAN, GENERAL MANAGING PARTNER, G2T3V AND CHICAGO HIGH TECH INVESTORS@HOWARDTULLMAN1

 

Watching the hapless victims of a cyberattack as portrayed on The Morning Show -- running around like headless chickens while clueless executives demand instant protection from the just-arrived outside team of white-hat hackers -- I was painfully reminded of just how interconnected we all are by our devices. And how exposed and vulnerable every business is to network intrusions by criminals, along with the extortionate ransom demands that typically accompany them.

When people returned to the office, they brought with them all the shortcuts, compromises, simplistic passwords and other bad habits they've adopted working remotely, along with all the crap and viruses their kids have inadvertently loaded on their laptops and home networks. Now's the time for companies to refocus and redouble their efforts to protect themselves, their people, their customers, their networks, and their digital assets from the risks and increasing likelihood that they are cyberattack targets. Remember, it wasn't raining when Noah built the ark.

The trouble is that until they've been the victim of identity theft or had a check ripped off from the mail, everyone and every business of whatever size thinks that it won't happen to them. You can explain the risks, the economic and reputational costs, the relatively inexpensive preventative steps, and everything else to smart and otherwise prudent and rational entrepreneurs and corporate executives.  But you can't understand for them. 

An excellent case in point: two of the largest casinos in Las Vegas just got hit by cyberattacks with Caesars paying millions in ransom (without sharing any of that information on the Strip) shortly before MGM got hit with a similar attack.  We've been led to believe by Hollywood heist movies that it's incredibly tough to take on a casino because of massive security and surveillance technology. Guess not. You can't really stop what you can't see and keeping ahead of the hackers is more difficult every day. You either pay up front for the protection that is available and keep your fingers crossed or you pay after the fact for the failure and hope it doesn't happen again.

In the recent Morning Show episode, the head honchos at the UBA network were ultimately unwilling to pay a $50 million ransom although it appeared that the network could come up with the cash.  Obviously, this is far from the case for most companies and institutions. And, in the typical circumstances of any startup or relatively new business, a substantial and unpayable demand would very likely mean the death of the firm.

Startups are rarely sitting on piles of cash; investors never want to see their funds going out the door to pay ransoms; and new business builders almost never spend scarce dollars on insurance.  Apart from the D&O insurance which their investors demand, it's a one-in-a-million prospect that they've purchased sufficient business interruption protection to cover cyberattacks. Entrepreneurs believe in passion and promotion, but rarely commit appropriately to downside protection. One of the clearest COVID-19 lessons was just how strapped and skinny millions of startups are and how little thought and money they had committed to resilience and backing up their businesses and their data securely offsite.

To me, the show actually had a far more important message, especially for executives and senior managers charged with cybersecurity responsibilities. The episode tracked the responses and reactions of the various junior and senior staff members to the crisis. Whether through stupidity, selfishness, or inadvertent subversion, several main characters completely ignore the experts' very specific directions to surrender their mobile phones to contain the spread of the virus. Worse yet, despite being told that the corrupted phones represented further risks of damage, they stealthily snuck off to make personal calls. Which reminded me of an old truism: men are not against you; they are merely for themselves.

The point is that no one has the luxury of acting alone because there’s really no digital environment that’s absolutely isolated, insulated, or secure. Every system is subject to human intervention, frailty, ignorance, and self-interest. If your team doesn’t seriously commit to help secure your systems, it’s just a matter of time before you suffer. A little inconvenience and some simple precautions can avoid a ton of disruption. And, as a recent Deloitte survey shows, the risk isn’t where you expect it. Gen Z is, in fact, many times more likely to fall for these schemes as older employees. Turns out, they only think they’re a lot smarter and computer-savvy than you.

There are three major messages that senior management needs to carefully and consistently deliver, and also demonstrate and validate through their own actions. An example or two of conscientious compliance by the boss is worth a million words.

First, make it absolutely clear that the concerns expressed about system security aren't nags or nuisances, they're necessities. They represent existential risks to the business, and the safeguards that have been implemented aren't casual or suggested, they're mandatory and will be strictly enforced with zero tolerance. But just saying it doesn't make it so. Your whole organization needs to live it.

Second, it's far too easy for people to assume that these matters are someone else's responsibilities and especially to hand it off to the IT guys and let them worry about it.  That's misdirected: the vast majority of breaches aren't super-sophisticated or driven by complex technical intrusions. They're the result of simple sloppiness, stupid reuse of the same passwords, laziness in terms of updating software, and, of course, social engineering, which rarely has anything to do with the technical aspects of your systems. You want your people to be helpful when asked, but, in these precarious times, a fair amount of caution, suspicion, and confirmation makes a lot of sense. Keep in mind that 91% of all known cyberattacks start with email phishing.

Third, one ongoing problem is that the fraud phishers and the hungry hackers have increasingly adopted two strategies: (1) they constantly use fake Microsoft logos and language to misleadingly alert users to the falsehood that their passwords need to be changed before they expire or are turned off by Microsoft; and (2) as the year ends, they will again be sending millions of fake emails with titles relating to year-end comp changes, salary adjustments, and bonuses, which appear to be coming from internal HR departments.  They're not, but they are close to irresistible in terms of the temptation to open them. Now is a very good time -- since October is National Cybersecurity Awareness month - to remind your team about these two schemes in particular and also to consider how best to distinguish your legitimate communications from the noisy and cluttered mess.

None of this is easy to pull off, but all of this is critical right now to get out ahead of the problem, to the extent that's possible. Sharing stories from other companies and articles about attacks and breaches that have been hit is somewhat helpful, but sadly, most people still won't believe that these things can happen to them.  Until they do.

SEP 26, 2023

Total Pageviews

GOOGLE ANALYTICS

Blog Archive