{"id":1570,"date":"2019-03-13T01:43:11","date_gmt":"2019-03-12T22:43:11","guid":{"rendered":"http:\/\/kusuaks7\/?p=1175"},"modified":"2021-05-11T14:16:24","modified_gmt":"2021-05-11T14:16:24","slug":"why-cyberattacks-are-the-no-1-risk","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/iot\/why-cyberattacks-are-the-no-1-risk\/","title":{"rendered":"Why Cyberattacks Are the No. 1 Risk"},"content":{"rendered":"<blockquote>\n<h4>The paradigm shift toward always-on IT requires business leaders to rethink their defense strategy.<\/h4>\n<\/blockquote>\n<p>With the world going digital, the dependence on the availability of IT infrastructure keeps exponentially growing, and many people don&#39;t comprehend the true scope of the implications. The recent cyberattack on the&nbsp;<a href=\"https:\/\/www.darkreading.com\/perimeter\/cyberattack-halts-publication-for-us-newspapers\/d\/d-id\/1333575\" target=\"_blank\" rel=\"noopener noreferrer\">Los Angeles Times<\/a>&nbsp;is a prominent example, disrupting the delivery of the Los Angeles Times and Tribune newspapers across the entire US. And in May 2018, a number of distributed-denial-of-service (DDoS) attacks were launched&nbsp;<a href=\"https:\/\/nltimes.nl\/2018\/05\/28\/ddos-attacks-target-dutch-banks\" target=\"_blank\" rel=\"noopener noreferrer\">targeting the Netherlands<\/a>, affecting and temporarily shutting down the online banking of three of the country&#39;s largest financial institutions.<\/p>\n<p>Thanks to the emergence of the darknet,&nbsp;<a href=\"https:\/\/www.darkreading.com\/endpoint\/cybercrime-as-a-service-no-end-in-sight\/a\/d-id\/1333033\" target=\"_blank\" rel=\"noopener noreferrer\">cybercrime has become widely accessible and procurable<\/a>, blurring the lines between legitimate e-commerce and illicit trade. In the Netherlands, an&nbsp;<a href=\"https:\/\/nltimes.nl\/2018\/02\/07\/teen-suspected-ddos-attacks-dutch-financial-services-wanted-prove-point\" target=\"_blank\" rel=\"noopener noreferrer\">18-year-old man was arrested<\/a>&nbsp;in connection with the DDoS attacks who apparently hired a cybercriminal through one of the various marketplaces in the darknet and who &quot;wanted to show that a teenager can simply crash all banks&quot; with a few clicks &mdash; unfortunately, he was right.<\/p>\n<h4><strong>Society Is More Vulnerable to Cyberthreats<\/strong><\/h4>\n<p>Indeed, society has become much more vulnerable to such attacks. The&nbsp;<a href=\"https:\/\/www.weforum.org\/agenda\/2018\/01\/our-exposure-to-cyberattacks-is-growing-we-need-to-become-cyber-risk-ready\/\" target=\"_blank\" rel=\"noopener noreferrer\">World Economic Forum (WEF)<\/a>&nbsp;says business leaders in advanced economies see cyberattacks as their single biggest threat, even more so than terrorist attacks (No. 2), an asset bubble (No. 3), a new financial crisis (No. 4), or failure to adapt to climate change (No. 5).<\/p>\n<p>This is no surprise because the business risks associated with cybercrime are growing along with companies&#39; ever-increasing dependence on technology. Moreover, the massive growth in the use of smart devices has opened up a universe of new ways for cybercriminals to launch attacks through large-scale botnets. By 2025, the number of smart devices in the world is&nbsp;<a href=\"https:\/\/technology.ihs.com\/576272\/iot-platforms-enabling-the-internet-of-things\" target=\"_blank\" rel=\"noopener noreferrer\">projected<\/a>&nbsp;to exceed 75 billion, outnumbering the global population by a factor of 10. Meanwhile, geopolitical rivalries are engendering larger and more sophisticated cyberattacks by smart, well-resourced IT teams with generous state backing. Particularly, large organizations need to take into account a whole range of cyber threats &mdash; including business interruption, theft, and extortion &mdash; reputational damage, economic espionage, and the infiltration of critical infrastructure and services. The evolving threat landscape combined with a mixture of highly sophisticated adversaries makes cyber-risk very challenging to manage.<\/p>\n<h4><strong>An Under-Resourced Risk<\/strong><\/h4>\n<p>Awareness of this risk is growing, and more organizations are directing efforts toward cyber-risk management. However, as the WEF highlights, cybersecurity is still under-resourced when measured against the sheer scale of the threat.<\/p>\n<p><a href=\"https:\/\/www.darkreading.com\/cloud\/cybercrime-is-skyrocketing-as-the-world-goes-digital\/a\/d-id\/1331905\" target=\"_blank\" rel=\"noopener noreferrer\">Cybercriminals are now estimated to pocket $1.5 trillion<\/a>&nbsp;annually &mdash; a staggering amount equal to Russia&#39;s gross domestic product, and five times the cost of approximately $300 billion resulting from natural disasters in 2017. Some studies predict that the takedown of a single cloud provider could result in $50 billion to $120 billion in economic damage &mdash; similar to the financial carnage stemming from Hurricane Sandy and Hurricane Katrina.&nbsp;<\/p>\n<h4><strong>Cyber Issues Reduce Value<\/strong><\/h4>\n<p>Cyberattacks can wreak havoc on a company, and severe financial and legal blowback are only the start. Equifax&#39;s stock dropped more than 31% after the firm revealed that it had been the victim of a breach. The disclosure erased $5 billion in market value, as reported by&nbsp;<a href=\"https:\/\/www.marketwatch.com\/story\/equifaxs-stock-has-fallen-31-since-breach-disclosure-erasing-5-billion-in-market-cap-2017-09-14\" target=\"_blank\" rel=\"noopener noreferrer\">MarketWatch<\/a>. After Yahoo disclosed two large-scale breaches, Verizon cut its buy offer by $350 million, or about 7% of the original price. The breach almost scuttled the deal. Yahoo had to pay a $35 million penalty to settle securities fraud charges levied by the&nbsp;<a href=\"https:\/\/www.sec.gov\/news\/press-release\/2018-71\" target=\"_blank\" rel=\"noopener noreferrer\">US Securities and Exchange Commission (SEC)<\/a>, and another $80 million to settle lawsuits launched by irate shareholders.<\/p>\n<p>When the&nbsp;<a href=\"https:\/\/edition.cnn.com\/2018\/11\/30\/tech\/marriott-breach-what-to-do\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">Marriott breach<\/a>&nbsp;hit the news, Sen. Charles E. Schumer (D-NY) called on the hotel chain to&nbsp;<a href=\"https:\/\/www.washingtonpost.com\/business\/2018\/12\/03\/schumer-marriott-should-pay-new-passports-compromised-by-data-breach\/?utm_term=.a3c53ea37d76\" target=\"_blank\" rel=\"noopener noreferrer\">foot the bill<\/a>&nbsp;and replace the passports for as many as 327 million people whose passport numbers might have been exposed in the attack. Marriott pledged to cover the cost, but at $110 per passport &mdash; the standard fee &mdash; it would have had to fork out an incredible $36 billion, an amount equivalent to the firm&#39;s entire market capitalization.<\/p>\n<h4><strong>New Risk Imperatives<\/strong><\/h4>\n<p>Other factors influence the consequences of cybercrime. For instance, firms are more heavily leveraged than they were a few years ago. Since 2010, the debt-to-equity ratio for the median S&amp;P 1500 company has nearly doubled. Consequently, according to the WEF, their stability is even more threatened by cybercrime skullduggery.<\/p>\n<p>In response, regulatory frameworks are being tightening up around the globe &mdash; witness the General Data Protection Regulation in Europe and the new SEC directives in the US. The authorities want to see better preparation that will mitigate risk, and more transparency after cyberattacks. In a&nbsp;<a href=\"https:\/\/www.sec.gov\/news\/press-release\/2018-22\" target=\"_blank\" rel=\"noopener noreferrer\">press release<\/a>, SEC Chairman Jay Clayton urged public companies to &quot;examine their controls and procedures, with not only their securities law disclosure obligations in mind, but also reputational considerations around sales of securities by executives.&quot;<\/p>\n<p>Businesses need to focus on their resilience to cyber events and generally need to put emphasis on prevention and response.&nbsp;<a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/the-disconnect-between-cybersecurity-and-the-c-suite-\/a\/d-id\/1330675\" target=\"_blank\" rel=\"noopener noreferrer\">Research<\/a>&nbsp;suggests that only about half (52%) of organizations have a CISO on their payroll, and only 44% say their corporate boards actively participate in their companies&#39; overall security strategy. In the digital age, this is no longer good enough and needs rethinking.<\/p>\n<p>Because virtually every business is going digital in one way or another, it&#39;s naive to think that today&#39;s cyberattacks primarily affect technology companies. In fact, cybercrime is setting its sights on industries across the board, many of which were left alone in the pre-digital era. Hotels, airlines, and banks, for example, are now squarely in the cybercriminals&#39; crosshairs.<\/p>\n<p>The upshot is that modern corporate innovation and growth must be balanced against cyber-risk and IT stability. More than ever, business leaders must create strategic plans that pave the road to emerging opportunities but also outline how their companies will ensure business continuity and deal with the complex set of cyber threats blighting the global digital landscape.<\/p>\n<p>Originally appeared in <a href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/why-cyberattacks-are-the-no-1-risk-\/a\/d-id\/1333616?\" rel=\"noopener\">DARKReading<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Business leaders in advanced economies see cyberattacks as their single biggest threat, even more so than terrorist attacks.&nbsp;This is no surprise because the business risks associated with cybercrime are growing along with companies&#8217; ever-increasing dependence on technology. Moreover, the massive growth in the use of smart devices has opened up a universe of new ways for cybercriminals to launch attacks through large-scale botnets. Modern corporate innovation and growth must be balanced against cyber-risk and IT stability.<\/p>\n","protected":false},"author":166,"featured_media":4119,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[195],"tags":[93],"ppma_author":[1950],"class_list":["post-1570","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iot","tag-internet-of-things"],"authors":[{"term_id":1950,"user_id":166,"is_guest":0,"slug":"marc-wilczek","display_name":"Marc Wilczek","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/04\/medium_00058d24-991e-4fe8-b65f-2188edaded40-150x150.jpg","user_url":"http:\/\/www.marcwilczek.com","last_name":"Wilczek","first_name":"Marc","job_title":"","description":"Marc Wilczek, Chief Operating Officer at Link11, is a columnist and recognized thought leader helping organizations drive their digital technology. Over the past 20 years, he has held various senior leadership roles across the ICT industry. Previously, he was a member of the management board of T-Systems\u2019 Computing Services &amp; Solutions (CSS) division. Besides being a public speaker, he has authored dozens of publications featured in CIO Magazine, InformationWeek, Bloomberg, Information Management, DarkReading, ZDNet, and others."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1570","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=1570"}],"version-history":[{"count":1,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1570\/revisions"}],"predecessor-version":[{"id":6622,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1570\/revisions\/6622"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/4119"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=1570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=1570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=1570"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=1570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}