David B. Grinberg

7 years ago · 4 min. reading time · ~100 ·

Blogging
>
David B. blog
>
Cybersecurity is Top Business Priority in 2017

Cybersecurity is Top Business Priority in 2017

IM
el deh ;
fda hat 4

# AL 7
“iz 4
a

How concerned are you about falling prey to cyberattacks in the New Year?

Whether you’re a corporate CEO or a small business owner, strengthening cybersecurity should be a top business priority in 2017. In fact, it should be a “no brainer” by now that every company worldwide needs to get more serious about protecting their information technology (IT) infrastructure to guard against the continuing proliferation of cyber threats.

The U.S. Departmentof Homeland Security (DHS) reminds us:

"Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace. Yet cyber intrusions and attacks have increased dramatically over the last decade, exposing sensitive personal and business information, disrupting critical operations, and imposing high costs on the economy."

With this in mind, it should be very troubling to anyone online that cyberassaults by rogue hackers continue to skyrocket.

Some global security analysts estimate that hundreds of thousands of attempted cyberattacks occur every minute.

This is a bleak reality of fast evolving technology in the 21st century digital age. 

No Failsafe System

In addition to prostituting the privacy of millions of individuals and employees spanning all industries, international cyber criminals can badly damage a company’s brand image and alienate the consumer base, among other detrimental consequences.

That’s why the top business priority in the year ahead should be substantially increasing investments in more potent protection of critical IT infrastructures.

But despite years of incremental progress, it appears there is still no failsafe system to stop sophisticated hackers from causing havoc in cyberspace.

Why are cyber criminals always one step ahead of being caught?

As Wired.com recently reported, “Whether it was a billion compromised Yahoo accounts or state-sponsored Russian hackers muscling in on the US election, this past year [2016] saw hacks of unprecedented scale and temerity. And if history is any guide, next year [2017] should yield more of the same.”

Sony Scathed

I recall the issue of cybersecurity, or lack thereof, capturing mainstream public attention in the USA during late 2014. The harsh realization about our vulnerability in cyberspace occurred in the wake of a severe cyberassault on Sony Pictures in Los Angeles. This resulted in broad international media coverage, as the world renowned movie company initially displayed a knee jerk reaction of denial and damage control.

The Sony cyber breach resulted in embarrassing revelations about business relationships between senior corporate executives and Hollywood movie stars. And the fallout led to the hashtag #Sonygate trending on Twitter for weeks, not to mention some in Sony’s C-suite losing their jobs.

The New York Times reported back then, “Interviews with over two dozen people involved in the episode suggest that Sony — slow to realize the depths of its peril — let its troubles deepen by mounting a public defense only after enormous damage had been done.”

Since then, widespread cyberattacks have become a common casualty of conducting business. The "new normal" of cyber disruptions have caused incalculable productivity losses in the private and public sectors alike. The specific repercussions range from plummeting corporate revenues, to ruined reputations, to dire nationals security risks.

Four Key Threats

According to NetworkWorld.com: “Cyber criminals are becoming more sophisticated and collaborative with every coming year. Looking ahead to 2017, the Information Security Forum (ISF) forecasts businesses will face four key global security threats in 2017.”

The “top four global security threats” identified by the ISF are:

1) “Supercharged connectivity and the IoT will bring unmanaged risks.”

2) “Crime syndicates will take a quantum leap with crime-as-a-service.”

3) “New regulations will bring compliance risks.”

4) “Brand reputation and trust will be a target.”

  • Click here for more predictions on cyber threats in 2017.

~
\&2
Ba

Interconnected = Vulnerable

In assessing the severity of security flaws in cyberspace, I spoke with several experts in the field.

Charles “Chuck” Brooks is the vice president for government relations and marketing for Sutherland Government Solutions. He served at DHS as the first director of legislative affairs for the Science and Technology Directorate. He ominously points out:

"The reality is that the more digitally interconnected we become in our work and personal lives, the more vulnerable we become." -- Chuck Brooks

Mr. Brooks adds: "Mitigating cyber threats will grow as a priority for business, and for us personally, if we are to commercially function and prosper."

But how can companies successfully mitigate cyber threats?

His advice: "The C-suites and governing boards of corporations will need to invest in better enterprise and endpoint security to prevent phishing and malware probes by hackers. This will also require better training of executives and employees in basic information security measures."

Confronting Cyberterrorism

There’s also the daunting problem of fighting a new wave of so-called "cyberterrorism."

c1415bbe.jpgIn a gut wrenching worst case scenario, this could involve state sponsored and/or terrorist affiliated super hackers manipulating and shuttering a country's electrical grid, financial institutions, or even the water supply. These are scary situations indeed.

Roque Wicker is the principal of Counter-Terrorism Watch, Inc. The company is a global provider of security consulting and training services based on the West Coast of the USA with offices in Southeast Asia. He says:

“Any New Year's resolution needs to focus on cyber threats." -- Roque Wicker

Mr. Wicker adds: "Without a more robust public/private partnership to combat cyber threats and data breeches, our nation's critical infrastructure and economy could be slowed or even halted -- causing preventable chaos on a scale never seen before."

Looking Ahead

With the U.S. presidential inauguration fast approaching, many in the tech industry are cautiously contemplating how the incoming Trump Administration will improve cybersecurity for government and private industry alike?

Chuck Brooks addresses this crucial question in a recent Federal Times article, writing:

  • “One area where DHS is certain to continue to assume a special role and profile is cybersecurity…a major challenge to the nation’s economic and security welfare.”
  • “Because of the exponential growth of the Internet of Things, mobile devices, big data and digital commerce, cybersecurity has grown immensely as a key priority while DHS has assumed more of a formal government role in the civilian cyber arena.”

He also points out the following about the President-elect:

  • “Trump recently selected Tom Bossert to serve as his White House homeland security adviser. Tom Bossert has a cybersecurity background, and his appointment signals the important role of cybersecurity in the new administration.”

In essence, there's simply no time to waste before the next corporation or government entity falls victim to another crippling cyberattack.

Therefore, swift and bold action to safeguard America's critical IT infrastructure -- and that of all advanced industrialized nations -- is needed now more than ever. No business is safe from increasing cyber threats and no country is immune from the threat of cyber warfare.

Thus, let’s hope the new American president is up to the challenge.

_____________________________________________________________________________________

5e27e8bf.jpgABOUT THE AUTHOR: I'm an independent writer and strategic communications advisor with over 20 years of experience in the public and private sectors -- including work in the White House, Congress and national news media. I'm also a Brand Ambassador for beBee Affinity Social Network. You can also find me buzzing on Twitter, Medium and LinkedIn.

NOTE: All views and opinions are those of the author only and not official statements or endorsements of any public sector employer, private sector employer, organization or political entity.



""""
Comments

David B. Grinberg

6 years ago #11

The critical importance of effective cybersecurity needs to be at the top of every company's priority list, especially in the wake of the "WannaCry" ransomware attack. CNN reports the following: "The world's biggest cyberattack has hit at least 150 countries and infected 200,000 machines since it started spreading last Friday. The victims include hospitals, universities, manufacturers and government agencies in countries like Britain, China, Russia, Germany and Spain. The list of institutions has grown as more become aware of hacks and as variants of the virus spread." http://money.cnn.com/2017/05/15/technology/ransomware-whos-been-hit/ (includes video)

David B. Grinberg

7 years ago #10

#34
Thanks so much for your kind words, Donna-Luisa Eversley, in addition to taking the time to read, comment and share. Thanks also for tweeting this post, which is likewise greatly appreciated. Your gracious support and positive social media engagement really means a lot to me. Thanks for being some awesome and BEE-autiful!

David B. Grinberg

7 years ago #9

FYI NEWS UPDATE: Today's NextGov.com reports: "Obama’s Cyber Legacy: He Did (Almost) Everything Right and It Still Turned Out Wrong" (headline) EXCERPT: "The Obama administration made an unprecedented all-fronts effort to secure cyberspace. So, why are we less secure? For eight years, cyberspace proved the Obama administration’s most unpredictable adversary, always twisting in new directions and delivering body blows where least expected." http://www.nextgov.com/cybersecurity/2017/01/obamas-cyber-legacy-he-did-almost-everything-right-and-it-still-turned-out-wrong/134612/?oref=govexec_today_pm_nl

David B. Grinberg

7 years ago #8

FYI NEWS UPDATE: According to Politico.com and a statement from President-elect Trump...what do YOU think? Politico: "[Trump] said he will appoint a team upon assuming the presidency responsible for creating a plan within the first 90 days of his administration to combat cyberattacks." Trump Statement: "Whether it is our government, organizations, associations or businesses we need to aggressively combat and stop cyberattacks.The methods, tools and tactics we use to keep America safe should not be a public discussion that will benefit those who seek to do us harm. Two weeks from today I will take the oath of office and America's safety and security will be my number one priority." Read more: http://www.politico.com/story/2017/01/trump-statement-233297

David B. Grinberg

7 years ago #7

FYI - Additional reading for cyber geeks: "A Visual Map of Emerging Cybersecurity Trends" via TechRepublic.com http://www.techrepublic.com/article/a-visual-map-of-emerging-cybersecurity-trends/

David B. Grinberg

7 years ago #6

Many thanks for your incredibly valuable feedback, Zacharias, which is most appreciated. You make several excellent points for which we should all pay attention. I'd be interested in your take of an article from today's NextGov.com on the issue per a report by the non-partisan Commission on Enhancing National Cybersecurity (except below): http://www.nextgov.com/technology-news/tech-insider/2017/01/priorities-enhancing-national-cybersecurity/134201/?oref=govexec_today_pm_nl "Advancing our nation’s cybersecurity posture must be a key priority for the Trump administration, especially if we are to maximize the benefits of digital transformation...while there are many potential benefits of a more active role for the federal government in the global standards arena, this activity should be closely tied to the promotion of international, industry-driven standards. Using market-based approaches allows technology companies to focus resources on enhancing innovative security solutions for the global market, rather than on compliance with distinct requirements in different countries."

David B. Grinberg

7 years ago #5

#19
Thanks very much for reading, commenting and sharing this post, Ali Anani. I echo your concerns. My informal understanding is that intelligence communities of various countries are indeed trying to recruit cyber criminals to work for those governments. However, strategic intentions will vary between democracies and authoritarian regimes. Let's hope the good guys can win over the bad guys and make cyberspace a safer place.

David B. Grinberg

7 years ago #4

MANY THANKS! continued from below... Lisa \ud83d\udc1d Gallagher

David B. Grinberg

7 years ago #3

Many thanks to everybody below for taking the time out of your busy schedules to read, comment, share and otherwise engage with this blog post. Your gracious support and constructive comments are very much appreciated! Sarah Elkins

Sarah Elkins

7 years ago #2

I know I'm not the only one to be somewhat oblivious to these issues. Thanks, , for this important reminder. We can take small steps to help ourselves, like changing passwords periodically, using different passwords, and making difficult passwords using a variety of symbols, numbers, and case.

David B. Grinberg

7 years ago #1

#1
Thanks so much for your valuable feedback, Joseph Sprute. I appreciate your being the first to comment. cc: Javier \ud83d\udc1d beBee

Articles from David B. Grinberg

View blog
6 years ago · 3 min. reading time

Although President John F. Kennedy was assassinated more than a half-century ago, his strong legacy ...

6 years ago · 4 min. reading time

Happy Birthday America! 🇺🇸💥💥 · Call it coincidence, but did you know that the most sweeping civil ri ...

7 years ago · 5 min. reading time

The date was Nov. 22, 1963. The place was Dallas, Texas. The historic tragedy was the assassination ...

Related professionals

You may be interested in these jobs

  • Direct apply

    beBee Handyman Shelter Island Heights, NY, United States Freelance

    I am in need of an Air Conditioning Installation service in Shelter Island Heights, NY with the following characteristics:Type of work to be done · Gas refill · Type of air conditioning · Indoor split · What technology does the air conditioning have? · Fixed speed · Air condition ...

  • Great Clips

    Hair Stylist Intern

    Found in: Talent US C2 - 5 days ago


    Great Clips Alliance, United States

    · Are you a cosmetology or barber student who's ready to jump-start your career? Join a locally owned Great Clips salon team and they will help you develop your skills and gain essential salon experience. · Great Clips franchisees aim to assist you: · Familiarize yourself with ...

  • INETUM

    Ingénieur de production H/F

    Found in: Talent US 2 C2 - 2 days ago


    INETUM Francesville, United States

    Mission · Dans le cadre de son développement, la Business Line Infrastructure Services IDF d'Inetum recrute un(e) : Ingénieur de production Linux. Poste basé à Montigny-le-Bretonneux 78 · Vos missions seront les suivantes : · • Suivi de la PROD et résolution des incidents N2 · • ...