IT disaster recovery, cloud computing and information security news


Lack of awareness amongst top management is adding to cyber security issues says report

A new report from The Bunker has highlighted that senior executives are still often the weakest link in the corporate cyber security chain and that cyber criminals target this vulnerability to commit serious data breaches. 

According to the report, ‘Are You the Weakest Link? How Senior Executives Can Avoid Breaking the Cybersecurity Chain’, many senior executives ignore the threat from hackers and cyber criminals and often feel that security policies in their respective organizations do not apply to their unique position. However, in reality, their often privileged access to company information, make their personal accounts extremely valuable to exploit and heightens the need for extra care.

In addition to highlighting the common mistakes made by senior executives, the report lists the top security areas that should be prioritised to ensure cyber security resilience. Commenting on these, Phil Bindley, managing director, The Bunker said:

“In tackling and mitigating the security threat, a critical issue is a failure to securely back up email data. Many businesses assume that a cloud-hosted service, such as Office 365, comes with automatic back-up and security provisions. Unfortunately, it does not.

“Unless stated and agreed, vendors do not guarantee complete system security or data backup as standard, so organizations need to be careful and have a full understanding of the SLAs in place. We advise people to replace the word ‘cloud’ with ‘someone else’s computer’, to get a better perspective of the risks that need to be mitigated when deploying a cloud-based service”.

All employees -especially those at the top of the corporate ladder- need to realise that cyber criminals use social engineering, email phishing and malware to access personal accounts, and C-level staff especially need to avoid becoming the weakest link in the cyber security chain by adhering to regularly updated, company-wide security policies regarding data sharing and backup.

Bindley continued: “Cloud offers a highly secure and cost-effective platform to defend against threats and malicious attacks. However, data stored in a public cloud typically resides outside the protection of an organization’s internal systems and many vendors do not automatically back-up data or implement security and privacy controls as standard, making it a perfect entry-point for cyber criminals to exploit.

“Reviewing corporate policies, with a focus on people, premises, processes, systems and suppliers will provide valuable insights into which areas to improve, and by championing a ‘security first’ corporate culture, organizations and their senior executives will be well positioned to avoid the high financial costs, reputational damage and unexpected downtime that could result from a cyber attack or data breach,” he concluded.

More details (PDF).

Want news and features emailed to you?

Signup to our free newsletters and never miss a story.

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.