"Another day, another breach"

"Another day, another breach." I grew tired of hearing that phrase around about 2019! Even back then I thought it's time everyone acknowledges that breaches are inevitable. 

Many of us already have, and that's why the cyber security industry has a fantastic set of standards such as NIST CSF to draw upon for incident response and preparedness. However what I mean by "everyone" is just that - not just cyber sec pros. Business experts, CEOs, tradespeople, school teachers, the whole lot, all must acknowledge breaches are inevitable, and be prepared.

I'm going to compare this to preparedness for other types of disaster, for the sake of the point I want to make. We accepted long ago that floods, fires and droughts were inevitable, so we have a strong culture of preparedness for these. I'm not going to delve into the truly devastating effects of natural disasters, other than to briefly point out that data breach incidents can result in similarly terrible outcomes, including loss of life. So I think it's reasonable to compare the preparedness angle of both.

There's an annoyingly relevant ad playing at the moment on one of the streaming services we use, in which a well known Queensland-based insurance company asks viewers if our homes are storm ready. This was in play well before tropical cyclone Alfred devastated parts of South East Queensland and Northern New South Wales during the past week. The ad goes into the dangers of leaves in gutters and trees too close to dwellings, and whether we have our emergency kit assembled. Drawing a comparison to the "cyber" world, in which technology and the commoditisation of information are simply more layers we've added to our already complex lives, we need to manage the associated risks just as we already do for natural disasters.

Most of us in the cyber security profession have already adjusted our narrative to avoid giving tech-heavy, buzzword-filled advice and instead present clear facts about the risk in the context of the audience. If you're new to this, here's some LinkedIn AI generated content which covers the basics: https://www.linkedin.com/advice/0/what-do-you-non-technical-stakeholders-need-understand-dhdhe

The advice we (cyber sec pros) give can often be driven by regulations, or the applicable set of standards. Fortunately this is usually reasonable, but what if we could apply a layer of intelligence over that advice and tailor it specifically for our audience? Our CIOs, CEOs, boards etc want to mitigate risk first and foremost, so if they have to interpret and prioritise a list of actions themselves, we haven't done our jobs correctly.

For example, we know that Infostealer malware was present on 4.3 million devices around the world in 2024 according to the latest KELA state of cybercrime report, and that around 3.9 billion passwords have likely been compromised. Work related passwords were found on almost 40% of the infected devices, for systems such as email and Active Directory (one of the common directories used in corporate systems to manage identities). We also have to remember that plenty of users blur the boundaries of work and private information systems, using one password across many systems and devices, which could be used to an attacker's advantage. The first thing an attacker might do after finding compromised Facebook, PayPal, Gmail etc accounts for a high profile individual such as a company CEO would be to try the same password on the company's remote login or email system.

Armed with this information, we might decide to run an education campaign targeting our company executives, raising awareness of this. However this cup of coffee has come to an end so please join me later next week over another cup, and we'll talk about how cyber security incident preparedness plays out in the real world. 

Comments