Interviews

Execs as weakest link

by Mark Rowe

Senior executives are still often the weakest link in the corporate cyber security chain. Cybercriminals target this vulnerability to commit serious data breaches.

That is according to a white paper, Are You the Weakest Link? How Senior Executives Can Avoid Breaking the Cybersecurity Chain, by The Bunker, an outsourced infrastructure and data storage provider. It says many senior execs ignore the threat from hackers and cyber criminals and often feel that security policies in their respective organisations do not apply to them. However, in reality, their often privileged access to company information make their personal accounts extremely valuable to exploit and heightens the need for extra care. Besides highlighting the common mistakes made by senior executives, the paper lists the top security areas that should be prioritised to ensure cybersecurity resilience.

Phil Bindley, Managing Director, The Bunker said: “In tackling and mitigating the security threat, a critical issue is a failure to securely back up email data. Many businesses assume that a cloud-hosted service, such as Office 365, comes with automatic back-up and security provisions. Unfortunately, it does not.

“Unless stated and agreed, vendors do not guarantee complete system security or data backup as standard, so organisations need to be careful and have a full understanding of the SLAs in place. We advise people to replace the word ‘cloud’ with ‘someone else’s computer’, to get a better perspective of the risks that need to be mitigated when deploying a cloud-based service”.

All employees -especially those at the top of the corporate ladder- need to realise that cybercriminals use social engineering, email phishing and malware to access personal accounts, and C-level staff especially need to avoid becoming the weakest link in the cybersecurity chain by adhering to regularly updated, company-wide security policies regarding data sharing and backup, the firm suggests.

He added: “Cloud offers a highly secure and cost-effective platform to defend against threats and malicious attacks. However, data stored in a public cloud typically resides outside the protection of an organisation’s internal systems and many vendors do not automatically back-up data or implement security and privacy controls as standard, making it a perfect entry-point for cybercriminals to exploit.

“Reviewing corporate policies, with a focus on people, premises, processes, systems and suppliers will provide valuable insights into which areas to improve, and by championing a ‘security first’ corporate culture, organisations and their senior executives will be well positioned to avoid the high financial costs, reputational damage and unexpected downtime that could result from a cyber attack or data breach.”

To download a free copy of the 17-page paper visit The Bunker’s website.

Related News

  • Interviews

    Duty fraud call

    by Mark Rowe

    The chief executive of the retail trade body the ACS (Association of Convenience Stores), James Lowman has called on the House of…

  • Interviews

    A password prompt

    by Mark Rowe

    A Twitter password breach is tip of the iceberg, says Nick Besant, of Panoplia Ltd. Everyone should use the latest social media…

  • Interviews

    Attack on USS Cole

    by Mark Rowe

    Last year we featured a couple of articles on terrorism by Alan Cain, pictured, the head of security at the University of…

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing