• About Us
  • Contact
  • Careers
  • Send Us a Tip
Menu
  • About Us
  • Contact
  • Careers
  • Send Us a Tip
CyberNews logo
Newsletter
  • Home
  • News
  • Editorial
  • Security
  • Privacy
  • Resources
Menu
  • Home
  • News
  • Editorial
  • Security
  • Privacy
  • Resources
CyberNews logo

Home » Security » Are organizations reporting cyberattacks more?

Are organizations reporting cyberattacks more?

by Adi Gaskell
29 July 2020
in Security
0
data breach button on keyboard
0
SHARES

Across a few articles since the pandemic has erupted across the world, I’ve noted how cyberattacks have been on the rise. Reporting these attacks in a prompt manner is not only important in reassuring consumers whose data may have been compromised but given the connectivity of supply chains, it’s also important to notify partners whose systems might also have been compromised.

PwC’s Threat Intelligence team recently said that attackers have been setting up ‘leak sites’ to post stolen data onto, with over 150 organizations reporting that their compromised data had ended up on such websites during the pandemic.

“There’s been a rise in the number of public high-profile cybersecurity incidents, with the majority being ransomware attacks involving exfiltrated data being leaked,” says Kris McConkey, Cyber Threat Operations Lead Partner at PwC. “In most such cases, initial access to networks is typically established well before the attacks are made public or identified by the victim organization.”

Why sharing information matters

The battle against cyberattacks is undoubtedly a complex one, with successful defense relying on effective responses to what is often a rapidly changing threat landscape. Any form of data gap can exacerbate these risks, and make the defense that much harder. After all, it’s highly likely that if an attack is successful against one organization, that the same tactics and methods will be used to attack a second, and a third organization.

By sharing data about attacks when they happen, it helps other organizations prepare themselves and ensure that similar vulnerabilities don’t exist in their own systems. Of course, such a practice would also alert your own cybersecurity teams to breaches elsewhere so that they get early warnings of potential threats. It becomes a virtuous cycle as organizations become better equipped to rapidly respond to the current threat landscape.

Such ready sharing of information also helps regulators and law enforcement agencies successfully manage their response to attacks, whether in terms of trying to locate the criminals or updating guidance and regulations to make systems more robust in the future.

Sharing the right information

An obvious first step when you begin to share information about cyberattacks is understanding what information to share. This process begins by understanding what information you want to capture in the first place. In order for the collective to be wiser after you share information, it’s good practice to use a standard taxonomy so that it becomes easier to track and trace each attack. This taxonomy should include things such as the type of incident, when it occurred, when it was detected, the scale and type of impact, and the method used.

Once the precise information to be shared is determined, it’s vital that organizations overcome any fears or stigma associated with any cyberattack. It’s enormously tempting to try and keep any breaches in-house to avoid any embarrassment or loss of confidence among consumers. Indeed, there is a temptation to believe that highlighting any successful attacks might merely invite other attackers to try their luck.

These are all valid fears, and succumbing to them will severely limit the amount of data that’s shared, so the best approach is to ensure anonymity whenever firms report cyber attacks. While doing this, however, it’s equally important to ensure that the data shared includes various characteristics of the firm, such as the industry it operates in, its size and geographic spread. This will help similar organizations understand the risk they face and allow them to respond accordingly.

As information about attacks begins to mount, this information also provides us with a detailed picture of the cybersecurity landscape, and we will begin to grasp whether particular nations, industries, or organization types are being affected, whilst also allowing firms to benchmark themselves against their peers.

Regulatory support

There’s a clear desire among regulators for companies to quickly and thoroughly disclose any cyber breaches they suffer, but the regulators themselves are not really sharing this information more widely, such that the economy can become wiser and more protected from subsequent attacks. Indeed, often, no data is shared with the wider economy at all.

For instance, the Securities and Exchange Commission in the US mandates that companies disclose their cyber risk exposure, but the information they require is fairly limited, and nowhere near as rich or as valuable as highlighted above. This results in many organizations providing boilerplate style statements that fulfill their legal obligations but provide little of real value.

Worryingly, there seem to be few, if any, changes to this situation, and therefore there is little incentive for organizations to declare any attacks publicly, as they would be largely operating in isolation were they to do so. A good example of what can be achieved can be found in Israel, where the Cyber Net platform provides organizations with an opportunity to anonymously share much of the information outlined above, whilst also providing cybersecurity teams with a live dashboard on the kind of threats they themselves must guard against. The platform, which is operated by the National Computer Emergency Response Team has strong government support, so usage is high. As well as being anonymous, the platform pledges not to share data with any other government agency, which helps to provide sufficient confidence to motivate participation.

Such sharing of information is vital if industry is to successfully tackle the evolving cyber threats we face, and it seems increasingly sensible for such sharing to be done on an international, rather than national, scale. Alas, we’re some way from such disclosure being the norm, but Cyber Net does at least show what can be achieved.

ShareTweetShareShare

Related Posts

Europol building

Europol distributes anti-malware code via the Emotet botnet

28 January 2021
TikTok logo

Potentially massive TikTok vulnerability patched

28 January 2021
The satellite-hacker’s guide to the space industry: don’t panic (yet)

The satellite-hacker’s guide to the space industry: don’t panic (yet)

27 January 2021
Man in front of multiple computers

North Korea has been targeting threat researchers

27 January 2021
Next Post
Four of the most powerful tech CEOs to defend against accusations of monopoly

Four of the most powerful tech CEOs to defend against accusations of monopoly

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Popular News

  • 70TB of Parler users’ messages, videos, and posts leaked by security researchers

    70TB of Parler users’ messages, videos, and posts leaked by security researchers

    83059 shares
    Share 83049 Tweet 0
  • 8 best cybersecurity podcasts for 2021

    56 shares
    Share 56 Tweet 0
  • Walmart-exclusive router and others sold on Amazon & eBay contain hidden backdoors to control devices

    13365 shares
    Share 13361 Tweet 0
  • The ultimate guide to safe and anonymous online payment methods in 2021

    13 shares
    Share 13 Tweet 0
  • Network Attached Storage

    0 shares
    Share 0 Tweet 0
Europol building

Europol distributes anti-malware code via the Emotet botnet

28 January 2021
Is PayPal’s crypto move a game-changer for bitcoin?

Cryptocurrency crime drops in 2020 but ‘DeFi’ breaches rise, study finds

28 January 2021
Privacy is an illusion. But that‘s a good thing

Privacy is an illusion. But that‘s a good thing

28 January 2021
Will quantum cryptography break classical encryption?

Will quantum cryptography break classical encryption?

28 January 2021
TikTok logo

Potentially massive TikTok vulnerability patched

28 January 2021
The U.S. flag is seen on a building on Wall St.

Costly short squeeze makes Reddit required reading on Wall Street

28 January 2021
Newsletter

Subscribe for security tips and CyberNews updates.

Email address is required. Provided email address is not valid. You have been successfully subscribed to our newsletter!
Categories
  • News
  • Editorial
  • Security
  • Privacy
  • Resources
  • VPNs
  • Password Managers
  • Secure Email Providers
  • Antivirus Software Reviews
Tools
  • Personal data leak checker
  • Strong password generator
About Us

We aim to provide you with the latest tech news, product reviews, and analysis that should guide you through the ever-expanding land of technology.

Careers

We are hiring.

  • About Us
  • Contact
  • Send Us a Tip
  • Privacy Policy
  • Terms & Conditions
  • Vulnerability Disclosure

© 2021 CyberNews

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.

Home

News

Editorial

Security

Privacy

Resources

  • About Us
  • Contact
  • Careers
  • Send Us a Tip

© 2020 CyberNews – Latest tech news, product reviews, and analyses.

Subscribe for Security Tips and CyberNews Updates
Email address is required. Provided email address is not valid. You have been successfully subscribed to our newsletter!