Our cyber security products span from our next gen SIEM used in the most secure government and critical infrastructure environments, to automated cyber risk reporting applications for commercial and government organisations of all sizes.
The scourge of ransomware continues with the high-profile Colonial Pipeline case back in May (we blogged about that here), now just another disturbing statistic in an onslaught that some have estimated to be up to 4,000 attacks a day.
Ransomware, of course, is not a new problem. Past events include the famous WannaCry/NotPetya strains that affected the UK NHS and shipping conglomerate Maersk (amongst others) in early 2017 and the Travelex ransomware attack that affected travellers buying Forex in early 2020.
But 2021 so far does seem to be “the year of ransomware”. Colonial’s ransom of $4.4m (they did claw some back) has been accompanied in this year’s roll-call by insurance company CNA Financial who reportedly paid a $40m ransom, the Irish Healthcare system who despite being given the decryption tool is still seriously impacted and then JBS, who had their international meat packing production halted for a period.
So, what does this mean?
Governments are concerned at the highest level. And rightly so. These attacks are starting to impact the ordinary consumer leading to social, economic and political consequences. The disruptions have been far reaching. The Colonial attack meant changing regulations to temporarily permit large volume road haulage of fuel and a rise in pump petrol prices. Attacks on the healthcare and education sectors were more severe, with treatments and operations being cancelled. Even schools have been closed and other services disrupted.
Aside from top level talks at the G7 summit and between Presidents Biden and Putin, there are several more tactical initiatives. Guidelines issued in the USA and UK have been published and several nations, including Australia where the Essential 8 standard already has a malware focus, have increased their attention on this matter.
In Australia for example, there have been calls for mandatory notifications of ransomware attacks as with privacy breaches. France has reportedly banned the payment of ransoms by insurers and in the US the SEC and OFAC have been looking to ban ransom payments, particularly to countries where trade/economic sanctions have been imposed, and invariably from where these ransomware attacks are launched.
Organisations cannot ignore the ransomware risk. Particularly those that are part of critical infrastructure, so finance, utilities, food, health, education, retail, transportation, energy etc… the list is long.
In the past there has been a heavy reliance on detection, with enhancements to anti-virus software suites and network defences, the rise of endpoint detection and response (EDR and its successor XDR). These technologies are all familiar and are designed to stop a ransomware attack in its tracks and do something about it before it spreads.
Increasingly however, there has been more consideration around better controls to prevent ransomware attacks in the first place. The recent UK National Cyber Security Centre and White House recommendations on best practice to protect against ransomware each recommend the use of multiple security controls. These controls can be categorised into three avenues of effort or investment. The first two are prevention of the initial infection then containment or limitation of its spread. If these two are coupled with a third strategy, recovery, then the resistance to a ransomware attack, or the readiness of the organisation for one is heightened.
In reality, this means better cyber hygiene controls across the board. Many of these attacks penetrate the organisation through vulnerabilities that really should have been managed. If they can be contained, however, their repercussions can often still be minimised. Examples of these three areas are:
This was precisely the approach used in the original Australian Cyber Security Centre’s Essential 8 framework (which uses a number of the controls above), but there is considerable overlap here too between the US CMMC standard, the UK’s Cyber Essentials scheme and recent UK and US guidance on ransomware.
So, detection is good, but it’s not infallible. Readiness and resistance as well are better (and ideally these should be used in concert) because they utilise the principle of layered security – defence-in-depth – to improve your overall cyber maturity. Afterall, its not just ransomware that presents a cyber risk to business.
For boards, the ability to get reports of the effectiveness of these controls is a key performance indicator; equally important is getting visibility of the state of their cyber defences. You do not want the first sign of a weakness in your controls to show up when it’s the one that’s exploited by a ransomware attacker. We’ve discussed this at length before in our blogs here and here.
Lastly, the cyber insurance market is being affected by ransomware, and not just directly as in the case of CNA Financial. When an attack occurs the victim organisation wants to claim on cyber insurance and have the ransom paid quickly; and until now that has been pretty much the case.
As noted earlier, however, ransom payments by insurers may soon be outlawed. Right now cyber insurers are taking a much greater interest in the ransomware safeguards and attack readiness of organisations seeking insurance. Supplementary questionnaires are being issued to policy holders and new customers in an effort to better quantify their readiness and so risk of attack (questionnaires may not be the best way to gain assurance) and so premiums for less well defended businesses have risen sharply. Worse, for some the inability to verify adequate ransomware readiness has meant the added burden of co-insurance or even no insurance at all.
The bottom line is that organisations must lift their game, both in terms of their verifiable levels of defence against ransomware (the effectiveness of security controls) and their ability to use those metrics to effectively manage their wider cyber risk management programs.
This is being demanded by boards everywhere, who do not want the risk of large-scale disruption to their businesses and who are in fact accountable for the better management of cyber security risks.
For those that are insured, there will also be an economic benefit: better controls will mean lower premiums and a realistic chance of getting a claim paid.
A recent KPMG Report suggests that protecting against and dealing with cyber risks will be the major challenge for senior executives in 2024. It is clear that despite high levels of security investment, organisations continue to suffer from cyber attacks.Read more
The Australian Signals Directorate’s (ASD) recent publication of their Cyber Threat Report 2022-2023 unearthed a range of areas for concern for government departments and critical infrastructure entities at local, State and Federal level.Read more
As cyber risks increase, organisations are encountering the longer life cycle of insurance renewals and the need to demonstrate better management of security controls and their effectiveness.Read more
Highlights and insights from the recent Managed Services Summit in London & the ISACA Central Chapter Conference on Digital Trust, in Birmingham, UK. With two recent conferences in the space of three days, some interesting challenges were very evident in the topics discussed. Being very different events, the challenges were quite different, but interestingly they […]Read more
In early August 2023, the latest joint advisory on persistent vulnerabilities was issued by the intelligence and security agencies of the “Five-eyes” community. These joint advisories are becoming more common. Perhaps recognising the growing importance of shared security information and the common nature of many of the threats faced – the weight they carry makes […]Read more
The quality of your risk assessment and the security information it provides is important; if you plan to use it to actively manage your operational and cyber resilience activities. Organisations are constantly exposed to a rapidly changing threat environment, so you really need a similarly rapid evidence-based feedback system that informs you of the ongoing […]Read more
The UK market has its own regulators, security standards and challenges. And while rulings from SEC in the US or the Australian Prudential Regulation Authority (APRA) in Australia don’t apply to UK companies, for the most part, the observations are undoubtedly relevant and the resulting advice instructive. It would be wrong to think UK financial […]Read more
<<< Part 2a: Australia’s Essential Eight: Beyond Endpoint Control <<< Part 2b: Activating UK NCSC & US NIST Guidelines: Beyond Endpoint Control Part 4: Systematic Measurement of Cyber Controls >>> As much as we invest into cyber security controls, external threats are inevitable. In a recent Notifiable Data Breaches Report from the Office of the […]Read more
Keen campers, scouts and even the Swiss Army know – that a good penknife is indispensable. This simple device has mitigated many a disaster at one point in time or another. Whether it’s to cut through a bit of string, tighten a screw or simply to solve the problem of no bottle opener in the […]Read more
Supply chain risk is an area of cyber security that demands the ongoing attention of every enterprise; because it can make the difference between being resilient or not. It’s no surprise that insurers warn that the vulnerability of supply chains is potentially a systemic risk that can quickly propagate across supply chain dominated industries. Organisations […]Read more
Read by directors, executives, and security professionals globally, operating in the most complex of security environments.