Vector
Vector

Choose your topics

Blogs
How to Prioritize Your Third-Party Risks

How can you prioritize effectively and enhance your organization’s security posture? Here are our top tips for setting up realistic, sustainable processes.

Third-Party Risk Management GRC
Blogs
Top Tips to Save Time When Assessing Third-Party Risks

Is assessing third-party risks taking up too much of your time? How can you make the process more effective and efficient? Find out in the latest post from SureCloud.

Third-Party Risk Management GRC
Blogs
The GRC Trends to Look Out for in 2024

Our GRC experts at SureCloud share their 2024 predictions for the world of governance, risk and compliance.

GRC
Blogs
The Top 5 Challenges of Third-Party Risk Management

With the supply chain now seen as a legitimate attack path, what can your organization do? Let’s explore 5 challenges of TPRM and how to overcome them.

Third-Party Risk Management GRC
Blogs
What is Third-Party Risk Management?

What is third-party risk management and how should you approach it? Find out in this post.

Third-Party Risk Management GRC
Blogs
The Top 4 Challenges of Risk Management

What are the top four challenges of risk management today and how can you overcome them? Find out in this post from SureCloud.

Third-Party Risk Management GRC
Blogs
Transform Compliance into Your Competitive Advantage

In GRC, compliance is often viewed as a cost that makes it harder to pursue growth. Here's how to make it your competitive advantage.

Compliance Management GRC
Blogs
Questions You Should Ask when Preparing For Your First Pen Test

Understand the processes that you and your chosen pentest provider will travel through for your first pen test, from the initial point to the day the test starts.

Penetration Testing
Blogs
TPRM Blog 6-Writing Clear Questions

Our GRC Practice Director explores the importance of clear communication and how to achieve it in your third party questionnaires. Read more here.

Third-Party Risk Management GRC
Vector (7)
Vector-1
GRC

Risk Blog 5: How To Protect Your Organization Against The Rise In Security Risks

Risk Blog 5: How To Protect Your Organization Against The Rise In Security Risks
Written by

Alex Hollis

Published on

1 Mar 2019

Risk Blog 5: How To Protect Your Organization Against The Rise In Security Risks

 
 

There are generally two types of security:

  1. Physical
  2. Digital (cybersecurity)

 

Secure (current)

 

Secure (future)

It used to be that you could lock the doors and everything would be safe. But as more businesses shift their operations online, digital risks are becoming more prevalent. According to research published by The Economist Intelligence Unit, over 74% of organizations believe they will encounter a serious cyber-attack within the next three years, expecting their ICT systems, telecommunications, industrial and financial networks to be the most targeted.

But that’s not to say physical security is no longer relevant; it absolutely has its place, we’re just not seeing the same level of attacks. In today’s world, it’s rare to hear about a physical bank robbery where masked men storm the building demanding to be shown the vault.

The Threat Triangle

In the physical world, you need all three elements to be present. For example, the bank robber might need a gun to scare the cashier (capability) into giving him money (motivation) out of the vault (locality). With security risk, we talk about the Threat Triangle.

With the Internet now a part of our daily lives, everything is better connected in the digital world. This benefit of convenience for your legitimate users also has made it convenient for all those who seek to threaten your organization. You’ve eliminated the need for ‘locality,’ which makes cyber-attacks less risky for those threats to breach your organization.

70% of organizations believe their security risk has increased significantly over the last year. Source: Ponemon Institute

Everyone is a target

There are certain sectors that require stringent physical security measures. Banks, schools, airports, and museums, for example, all need greater security measures because they’re protecting something of high value – money, our children, national security or priceless artifacts.

But in the digital world, everyone is a target, however small you are. In a previous white paper, we discussed the monstrous problem of third-party risk. The challenge with third-party risk is that you can have the tightest security measures in place to protect your organization, but a small supplier can leave you dangerously exposed.

The US retailer Target lost the details of 40 million credit and debit cards through its heating, ventilation, and air conditioning (HVAC) system, which connected to the Internet for remote monitoring. Hackers exploited the vulnerability of the small third-party HVAC contractor, stealing Target’s login credentials and gaining a foothold in its payment systems.

Lock it down

For the last seven years, we’ve specialized in governance, risk, and compliance (GRC) and it’s always amazed us that people continue to think about risk in terms of silos. A risk doesn’t know that you’ve categorized it as operational, financial or security and therefore sits neatly in a little box. Risks will span different departments across your organization, and then beyond to your third-parties.

This year, SureCloud has presented at several industry conferences, including the Gartner Summit and ISF World Congress, about why it’s essential to integrate business risks and IT risks – because the only way you can ensure your organization is truly protected is to take an integrated approach to risk management.

For anyone that was unable to attend the conferences, we have recorded a webinar to explain integrated risk management in more detail and shared a framework to help you enhance your security measures.

The webinar is available on-demand through BrightTALK here.

Alternatively, if you have a specific question about your security risk, you can contact my team directly through sales@surecloud.com.