How to Stop Worrying About Cyber Security and Compliance: Part II
The second of our two-part report providing busy CEOs with a template for mitigating the stresses and risks of cyber security and compliance. Here is Part I if you missed it.
Previously we discussed why businesses often procrastinate when it comes to cyber security and regulatory compliance. Now it’s time to list how you can mitigate the risks and sleep better at night.
- Make a Risks-and-Issues Analysis
Every substantial business should maintain a list of risks and issues, with some analysis of the mitigation options. The board should review this document at least annually, and each risk or issue must be owned by an executive with the expertise and time to manage it.
A certain level of risk is of course inevitable. But you need to know what you have, what’s valuable, and what’s vulnerable. Documenting the risks, and having an open discussion about them, will drive sensible decisions about how to mitigate risk and take action when and if the worst happens.
Even better, it avoids sweeping issues under the carpet. Instead, you can confront the real business risks, identify a proportionate response, and ensure you are looking after the things that matter.
Proper backup plans, disaster recovery, and crisis management plans will flow from these discussions.
- Review Your Cyber Insurance
It’s prudent to consider cyber insurance. But not all cyber insurance is created equal. You need to carefully select an appropriate policy and provider.
The first thing to watch out for is if the provider takes the time to understand your risks and requirements. If they don’t, then they’re simply looking to sell you a policy, and you should walk away.
Next, check the exclusions on the policy. Make sure a member of your executive team understands the coverage — most importantly, if it covers ransomware payments, recovery costs, and loss-of-business. Remember that cyber insurance may not give you back money that’s stolen from you; that generally requires crime insurance.
Also, you should learn how claims work with the insurer. If you have to make a claim, will the insurer specify who runs the recovery program? If so, how quickly can this third party mobilize? If the insurer does not stipulate a third party, don’t wait for an incident to evaluate potential suppliers — identify the best one now.
Ensure that your IT is compliant with the policy. The insurer may impose requirements on your IT, and these requirements may be obscure and complicated. Often the CFO signs the insurance policy without communicating the requirements to the IT team. And the IT team may need to document how they meet the requirements, so that the insurer can audit if necessary. Otherwise your policy may be invalid!
Finally, are your suppliers’ contracts clear about their liability? And are they appropriately insured?
- Get Behavioral and Awareness Training
The weakest security link in any business is often the people. Some of your staff may struggle to understand the issues or to know what secure behaviors really are. You need to clarify your expectations.
Unfortunately, lots of companies have security protocols that no-one reads. Or perhaps people circumvent the rules with the tacit approval of their managers, who are busy and under pressure to deliver results. For example, if managers are writing passwords on Post-its, or accessing email from insecure home computers, then their subordinates will do the same.
Instead you’ll want to foster a culture of security. For example, is your finance manager empowered to challenge an email that looks like it’s from you calling for an “emergency payment?” How are suppliers’ bank details verified? Is your IT staff empowered to call out poor security practices from senior managers?
We recommend awareness training, which is relatively inexpensive — a few hundred or thousand dollars. A small price to pay compared to the expense of getting hacked!
- Follow the NIST Cyber security Framework
For most businesses there is a straightforward route to getting basic security right — adhering to the Cyber security Framework from the National Institute of Standards and technology (NIST).
The Framework is a voluntary set of “standards, guidelines, and practices to promote the protection of critical infrastructure.” It’s also the result of a collaboration between industry and government, so it’s designed to be flexible and cost-effective.
As with every aspect of cyber security, though, the Framework is ever-changing; make sure you have someone checking it periodically.
- Do a Penetration Test
A penetration test is when a third party looks for weaknesses in your website and networks. Most companies can have a full, detailed penetration test for just a few thousand dollars.
This is essential if your website includes custom software or any kind of ecommerce services! Poor technical practices can result in custom software being full of holes. The OWASP top 10 is a list of the standard vulnerabilities that almost all hackers focus on — ensure your penetration test includes checks against this list.
Typically, penetration test findings are divided into high, medium, and low priority. Address all high- and medium-priority issues immediately. Address low-priority issues on a case-by-case basis.
- Consider Complying with GDPR
The General Data Protection Regulations came into force in Spring 2018 in the European Union (EU). The rules are in force, with high penalties for breach. Being outside of the EU doesn’t necessarily mean the that GDPR is not your problem: the law applies to any company doing business with EU citizens.
The good news is that for the most part, the compliance measures are sensible and worthwhile. And most businesses can organize an expert assessment of their GDPR compliance for a few thousand dollars.
The recommendations can be complicated, and GDPR compliance can be a long process. So you’ll need to plan the work as a series of projects. Someone at the executive needs to have ownership of it, preferably someone both commercial and sensible in their approach.
You should also check local laws. For example, New York State’s Governor Cuomo recently signed the New York Shield Act, which expanded the notification requirements in the event of a security breach. This law applies to any company with employees in New York State, which, given its size, will have national and even international implications.
- Comply with ISO27001
ISO27001 is a more serious information security and management standard. Some companies have this standard imposed on them by corporate or government customers.
Either way, if your business is complex or has specific security requirements then ISO27001 provides you with a means to foster a culture of security. For example, if you manage sensitive data or valuable intellectual property; if you want to demonstrate your credentials to demanding corporate clients; or if you plan for your business to offer important IT services, then ISO27001 gives you a means to embed security into every aspect of your business operations.
This is another standard that requires external assessment. Although it may only cost a few thousand dollars, implementing the necessary changes can be complicated and invasive. But that’s why companies brag about their ISO27001 accreditation — it’s a demanding standard and it means something.
Remember: Secure Companies Are More Efficient and Reliable
Let’s emphasize that the above steps are sensible. They will make your business more secure, so that you can your customers can sleep soundly. And in the event of a problem — because there are always problems — you will have mitigated the damage, and your business will recover more quickly, and you can avoid criticisms or accusations of negligence.
One final point: well-maintained systems and security practices will make your business far more effective, profitable and reliable.
You may like to visit our Knowledge Center, which includes all content related to this topic.
Freeman Clarke is the largest and most experienced team of part-time (we call it “fractional”) IT leaders. We work exclusively with ambitious organizations and we frequently help our clients use IT to beat their competition. Contact Us and we’ll be in touch for an informal conversation.