How Long Should You Keep Accounting Records?
Category: Uncategorized
By now, you’ve heard it over and over: Cyber threats are growing more frequent and sophisticated by the day.
Yes, there is no shortage of content warning businesses not to grow complacent about cybersecurity. Yet, while large businesses invest heavily in protecting against attacks, hackers are increasingly pivoting to target small and medium-sized businesses — a neglected and under-reported arena filled with softer targets due to insufficient security measures.
Over 43% of cyber attacks in 2023 were against small businesses, only 14% of which were prepared for such an attack, so this is no small matter.
Cyber threats evolve quickly, especially in the age of AI, which can make hacking tools smarter and more challenging to detect.
That’s why analyzing real-world cybersecurity incidents is invaluable for identifying oversights and potential lapses in your safeguards. After all, if a vulnerability granted cybercriminals access to another company, that same vulnerability could leave your organization exposed, too.
Let’s dive into ten lessons from headline-grabbing cybersecurity breaches that could help your business avoid becoming tomorrow’s front-page story.
What lessons can be learned from the biggest cyberattacks in recent history?
Vulnerabilities in trusted partners’ tools or services could provide backdoor access to your systems, as in cases like the breach of Progress Software’s MOVEit file transfer solution.
By compromising the security of vendors, contractors, and suppliers, attackers can access the networks of countless organizations around the world.
Lesson: Assess supplier, vendor, and partner relationships thoroughly, scrutinizing security measures and limiting integration points that grant access to your infrastructure.
Despite increased awareness of cyber risks and training against threats like phishing, social engineering is an alarmingly pervasive and effective attack vector.
Recent incidents, including the breach of MGM Resorts, which (if the hacking group which claimed credit is to be believed) was enabled by “vishing” or phone call trickery, highlight persisting vulnerabilities to human manipulation.
Lesson: Comprehensive, continuous, and creative approaches to security awareness education are imperative to combat social engineering threats.
The ability of hackers to access the personal information of over 37 million T-Mobile customers highlights the perils of improperly managed credentials and excessive access.
Lesson: Reduce risk exposure through stringent access control policies ensuring least-privilege permissions to users across infrastructure, systems, services, and data repositories.
The ransomware attack inflicting over six weeks of severe postal service disruption in the UK by exploiting flaws in the security of Royal Mail, the British mail company, underscores how technical debt and inadequate patch management regimens render organizations vulnerable.
Lesson: Prioritize timely patching and upgrading software assets across the environment, focusing most urgently on internet-facing services and tools exposed to higher risk.
Distributed, hybrid work magnifies attack surfaces through home networks, remote access paths, and unmanaged devices operating off corporate premises.
Multiple studies have revealed that remote or hybrid work is linked to increased cyber exposure.
Lesson: Implement a zero-trust framework for secure remote work environments, ensuring that employees have least-privilege access to corporate resources regardless of their location.
While APIs drive efficient automation and connections between crucial business applications, they also increase exposure. The breach of T-Mobile highlights the growing imperative of managing this enlarged attack plane.
Lesson: Comprehensive API security must complement business priorities, leveraging these interconnections through scaled platforms securing authentication, authorization, encryption, activity logging, and continuous scanning against evolving threats.
Prominent attacks like those launched against Royal Mail and manufacturing giant Clorox demonstrate ransomware’s devastating potential if protections fail to limit blast impact. Infection on one system enables threat actors to achieve widespread encryption and irreparable destruction rapidly.
Lesson: Network microsegmentation, multi-factor authentication protocols for admin roles, and air-gapped offline backups provide fundamentals for reliable business continuity if ransomware hits core infrastructure.
T-Mobile’s second data breach of 2023 lasted nearly a month before it was detected. And Royal Mail’s immense disruption downed export services for weeks.
These extended opportunities for adversaries to inflict more significant harm spotlight the severe risks of lengthy dwell and down times.
Lesson: Early detection is vital to rapid recovery.
While efforts to prevent successful attacks are essential, you should also be prepared for the fallout of a breach. Lacking an incident response plan renders organizations vastly more vulnerable to destructive attacks — not to mention fiduciary and legal liabilities.
Lesson: Develop and continually update detailed response plans encompassing containment procedures, internal and external communications, legal disclosure duties, and more.
Technical controls inevitably have limits in stopping attacks, especially social engineering threats. This reality emphasized the importance of empowering staff to recognize and resist manipulation.
Lesson: Establish a formal security awareness training regimen tailored to your organization’s activities and risks, molded by insights into current staff vulnerability.
The time is now for extreme cyber vigilance.
To begin applying these lessons, prioritize assessing risks and vulnerabilities. Conduct simulations and testing to uncover gaps and dedicate leadership and resources to integrating security across systems and staff.
All businesses of any size should think and act proactively and invest now in improved cybersecurity. By implementing these measures, business owners can safeguard their financial and personal data and keep their businesses running smoothly.
If you are a client and would like to book a consultation, call us at +1 (212) 382-3939 or contact us here to set up a time.
If you aren’t a client, why not? We can take care of your accounting, bookkeeping, tax, and CFO needs so that you don’t have to worry about any of them. Interested? Contact us here to set up a no-obligation consultation.
Interested in receiving updates in your mailbox? Check out our newsletter, full of information you can use. It comes out once every two weeks, and you can register for it below.
Category: Uncategorized
Category: Uncategorized
Category: Uncategorized