Page 24 - PWM_OCTOBER 2021 EBook
P. 24

BETTER BUSINESS




           Terminating




           cyber attacks







           With more people working from home than ever
           before, the threat from malicious hackers has
           increased exponentially, so how do you protect
           your business? by Adam Bernstein

                 yber-attacks are in the news  £13,400.
                 again. First seen in 1972
                 when a researcher working  Defining a cyberattack
                 in the US on Arpanet, a pre-  So,  what  is  a  cyberattack?
                 cursor to the internet, cre-  According to Dai Davis, solicitor,
           Cated a computer program   chartered engineer and partner at
           called Creeper that could move across  Percy  Crow  Davis  &  Co,  the
           Arpanet’s network, it left a bread-  Wikipedia definition, of “any attempt
           crumb trail wherever it went which  to expose, alter, disable, destroy, steal
           read: ‘I’m the creeper, catch me if you  or gain information through unau-
           can’.                      thorised access to or make unauthor-
            But now the intrusions are more   ised  use  of  an  asset…  that  is  a
           insidious. In May, Colonial Pipeline –  computer information system, com-
           which operates a pipeline that carries  puter infrastructure, computer net-
           around 3 million barrels of fuel a day  work, or personal computer device,”
           between Texas and New York – was  is one that he agrees with.
           the subject of a ransomware cyberat-  He says that it “matches the broad
           tack that shut its systems down for   definition of an offence under section
           five days leaving the East Coast short  1 of the Computer Misuse Act 1990
           of fuel. A few days later, at the start of  which criminalises any action that
           June, the world’s largest meat proces-  ‘causes a computer to perform any
           sor, JBS, was also attacked by ransom-  function with intent to secure access
           ware and its operations in Australia,  to any program or data held in any   they have been breached, and those who don’t yet know.” But as to where
           Canada and the US were halted.  computer where that access is unau-  the threats originate, Davis says that some are performed by ‘script kiddies’
            While big corporations garner the  thorised”.           “who try and hack into a system for fun. They are mostly out to hack well-
           most column inches, no business or   Roy Isbell, a cyber security special-  known sites, or ones that will give them some ‘prestige’”. He adds that non-
           organisation  should  think  itself   ist and advisor to the UK Forensic   monetary sites include those that attract opposition, such as the sites of
           immune. And for the world of print,  Science Regulator, agrees with Davis.   political parties.
           there was the attack in March of this  He defines a cyberattack as “funda-  Isbell takes a similar line but has seen “some operate in a more random
           year on the MBA Group. The com-  mentally the interaction of a threat   fashion” as they look to prove their skills or develop tools in order to raise
           pany  reported  that  it  had  been   actor with a particular system with   their profile within the hacking communities.
           “impacted by a cyberattack, which   the intention of achieving a particular   For the criminally minded, making money is always the goal and they
           caused some operational disruption   outcome”.           attack anything where it pays them to do so. “They may,” says Davis,
           to our systems and a small proportion   Of course, how the attack mani-  “adopt a scattergun approach, sending out millions of scam emails in the
           of our client work”. The firm’s opera-  fests itself is dependent upon the out-  expectation that only a few people will fall for the scam, alternatively they
           tions were disrupted for more than a  come that the threat actor is hoping   may target a particular ‘rich’ target but in a more subtle, considered man-
           week as a result of the attack.  to achieve, the level and type of access   ner.”
            The problem is acute according to  that they have been able to create, and   Of course, at the extreme, states such as China, Russia and North Korea
           the Cyber Security Breaches Survey  the skills and tools available to the   attack companies to steal technology.
           2021  from  the  Department  of   threat actor.            Worryingly, as Isbell points out, Covid-19 has altered the landscape some-
           Digital, Culture, Media & Sport. It   Nevertheless, he’s aware that many   what because “we now have a more distributed business model with
           found that 39% of businesses were   believe that ‘cyber’ is just an alterna-  employees working from home, often on shared networks with only limited
           subjected to a cyberattack or breach  tive word for the internet and devices   security implemented”. He has seen a significant increase in attacks
           in a 12-month period and 21% lost   that are connected to it. While this   directed at organisations directly involved in dealing with the pandemic or
           money, data or other assets. Further,  may be true, he says “that this is not   involved in vaccine research.
           the average cost of the cyber security  the whole scope of what the cyber   Making a similar point, Davis has found that any newsworthy topic may
           breaches these businesses experi-  environment covers”.  be used to persuade a staff member or individual to click on a link that will
           enced was estimated to be £8,460.   Davis recalls an old information   take them to a compromised website. “In that sense, the pandemic is no dif-
           For medium and large firms com-  technology saying: “There are two   ferent and has given malicious actors opportunity to create appealing false
           bined, the average cost was higher, at  types of business: those who know   links, for example, with offers of having an early vaccination.”

           24 PrintWeek MENA October 2021                                                             www.printweekmena.com
   19   20   21   22   23   24   25   26   27   28   29