A simple, objective, measurable, and scalable standard for accountable risk management in state government.

Introduction

The challenges facing information security (or “cybersecurity”) personnel in state government are endless. State Chief Information Security Officers (CISOs) are too often put in the unenviable position of trying to secure their state’s information assets without adequate support from their governor, legislators, agency heads, or the citizens they serve. The lack of support isn’t due to neglect or indifference, but due to the lack of effective communication, a fundamental understanding of information security risk, and accountability.

SecurityStudio works with state CISOs and governments to simplify information security risk management for optimal effectiveness, without taking shortcuts.

Every state is different

No two states among our fifty are the same.

Some states are more distributed than others. Some states have greater influence on county, city, and local municipal government than others. Some states govern education, both K12 and higher education, more closely than others. Although every state operates differently, information security fundamentals and logic are the same everywhere.

SecurityStudio engages with all states at various levels to make information security better for everyone.

The state of information security in the state

Without knowing where we are, how will we get where we need to go?

The question points to a common problem in state government, reinforced by a recent conversation between a state technology committee chair and our (SecurityStudio) team. The chair asked SecurityStudio to discuss cybersecurity concerns with the committee, but more specifically, the committee wanted to know what their state should do next with cybersecurity.

Chair: We’d like you to come to our next meeting and tell us what we should consider next and what other states are doing. What is our greatest cybersecurity concern today?

SecurityStudio: Good question. It’s fundamental. The state doesn’t know the current state of information security within the state. Furthermore, the state doesn’t know what the future state of information security should be, when it should get there, or how much it would cost.

Chair: What do you mean?

SecurityStudio: Let me ask you this question, do you know the current state of information security within the state?

Chair: No, not really. We’ve seen various reports, but nothing that indicates an objective view of information security across all of state government.

SecurityStudio: Nobody can determine a future state or make good risk decisions without defining where things sit today. The state needs to adopt a simple, objective, measurable, and scalable standard for accountable risk management, read more on the 4 steps here.

Without a current state, how will the state know if its spending on the right things, whether it’s getting an adequate return (in the form of reduced risk) or if it’s effecting proper accountability. We need to be more accountable to the citizens we serve.

Chair: Today, we justify how well we’re doing by how much money we spend on cybersecurity.

SecurityStudio: This is the wrong metric. $10M spent on ineffective or the wrong information security controls can be worse than spending no money at all. Information security budgets must be justified by risk, not by opinion or the latest trend.

We need to help our governor, legislators, CIO and CISO obtain better visibility into information security risk and provide objective justifications for our spending.

Chair: The state is a big, complex organization. How would we get our hands around it all?

SecurityStudio: We start simple and keep it simple, all without compromising quality or accuracy. There are seven simple steps:

  1. Obtain or create an inventory of administrative, physical, and technical components (or “entities”) that complete our state’s government.
  2. Define accountability for each entity.
  3. Perform simple, effective, and consistent risk assessments of each entity.
    • Using the standard definition of information security.
    • Using objective (binary) criteria.
    • With consistent, logical measurement and sensical scoring.
  4. Compile and communicate results with the governor and legislature.
  5. Make risk decisions (using measurement as our guide).
  6. Plan and budget, creating the state’s roadmap.
  7. Implement changes and measure progress.

We built an affordable software platform to manage and automate everything that can be automated. We can show you a demonstration during the committee meeting.

Chair: Excellent! This will be a great discussion. I’m excited to see what you’ll show us.

Most states have the same (or a similar) issues as those described in this real conversation.

How SecurityStudio helps with this problem

SecurityStudio was built specifically for fundamental information security challenges facing state CISOs.

overview

The primary risk management tool on the SecurityStudio (or S2) platform is the SecurityStudio Organizational Risk Management Tool (or S2Org). For the current state of information security in a state to be accurate, the “state” or risk assessment score (S2Score) must represent risk across all state branches and agencies; however, it’s often necessary to go further.

Some states provide shared infrastructure and/or services to counties, cities, other municipalities, K12 education, and/or higher education. In shared resource cases, states leverage the many benefits of S2Org’s built-in “nested entities” function. The two most valuable benefits for states and state CISOs are:

  1. Accuracy. The most accurate representation of risk through measurements and answers provided by personnel who are best suited to provide them.
  2. Accountability. Distributed accountability for an entity (or portion of an entity) to responsible personnel for assessment and/or remediation with a few clicks.

Additional tools on the S2 platform used by state and local governments include 2Team and 2Me. 2Me is a free personal information security risk management tool for everyone. The State of North Dakota was the first state to make 2Me available to all their citizens through an ongoing awareness campaign called #BECYBERSMART. 2Me is available to all states as a white labeled option at no cost.

personal security risk assessment

2Team is used by employers (including the state itself and its sub-entities) to learn about employee information security habits at home, using data from 2Me. ONLY anonymous and aggregated data is shared with employers through the 2Team portal; however, the data can still be invaluable for helping employees secure themselves and/or their families better.

state government

Conclusion

Understanding and managing “the state of information security in the state” is NOW attainable for governors, legislators, agency heads, CIOs, CISOs, and our citizens who rely upon us to do our best.

From the current state:

  • The future state can be determined,
  • The time to reach the future state can be defined, and,
  • Cost (budget) can be justified and our spend can be quantified.

Information security management for state and local government cannot be made any simpler, more objective, more measurable, more scalable, more standardized, or more accountable than we’ve made it with SecurityStudio!

Before we close, we’re also affordable, leaving you with more money for remediation.

Contact SecurityStudio

We are always here to serve.

s2core

Estimate your score or book free demo today

Introduction

Before we dig in, let’s clarify “Vendor Risk Management”. The title of this article isn’t entirely accurate. The term “vendor risk management” and “vendor information security risk management” are two different things, but our industry often uses them interchangeably.

Vendor risk management (or “VRM” for short) rolls off the tongue better, ranks better in search results, and sells more products, but vendor information security risk management (or “VISRM” for short) is more accurate when discussing information security risk versus business risk. You might not be aware of the differences:

  • Vendor risk management deals with business risk. Business risk includes financial risk, reputational risk, business process risk, legal risk, information security risk, and every other risk that a business deals with related to a vendor relationship.
  • Vendor information security risk management deals with information security risk related to the vendor relationship. Information security risk is part of business risk, but it is not business risk.

The words “vendor”, “third-party”, and “supplier” are essentially the same, or close enough. Our preference is third-party because it accounts for vendors (people who sell things), suppliers (people who supply things), and all others third parties we might share data with.

Clarity in knowing that VISRM is part of a greater VRM program is important as you design and mature your approach to these things.

What is Vendor information security risk management?

vendor risk management

It helps to break things down. A vendor is any person or organization who provides goods and/or services for a fee. Information security risk management (the “ISRM” part of the equation) requires more clarification. To “manage” information security risk, we simply ensure these three steps are followed:

  • Assess – use a simple, objective, and measurable information security risk assessment. Information security must account for risks related to:
    • People
    • Physical (controls)
    • Technical (controls)
  • Decide – Only four choices; accept (as-is), mitigate, transfer, or avoid.
  • Implement – implement or do what the risk decision is/was.

Now that we’re on the same page about what vendor information security risk management is, here are the nine things we must do if we want to do it right!

#1 – Define why.

It’s common for people and organizations to rush into something without a clear understanding of why they’re doing it. Even if someone within an organization knows why, do the others? Don’t assume that everyone knows, especially the business stakeholders who will ultimately determine whether we’re successful or not. Questions we must have good answers for:

  • Why are we doing Vendor Information Risk Management?
  • What’s the purpose of our VISRM program?
  • What will determine success in our Vendor information security risk management program?

Aimless VISRM programs are a waste of money and are frustrating to manage. Vendors who pose significant risk to the organization will be allowed to operate as-is if we don’t have the support of business leaders, and we only get support with a well-defined “why?”

Try this, “We are doing VISRM because:

  • we need to meet our (insert regulation here) compliance requirements.”
  • (insert competitor name here) is doing it.”
  • we don’t want to be found liable for a vendor-related data breach.”
  • we want to be defensible by demonstrating proper due diligence in managing vendor risk.”
  • vendor relationships pose a significant risk, and we must account for the risk in our overall information security risk management program.”

Pick your reason, document it (maybe in a policy or charter) and stick to it in every VISRM thing you do.

#2 – Get buy-in.

Without business buy-in, we’ll be going through the motions at best and getting fired at worst. The best VISRM programs are championed from the top. Take the documented reason for VISRM (from above) and get executive management’s opinion. Refine statements and documentation if necessary and seek their support (not just approval). Without their support, we’re fighting an uphill battle, and it won’t turn out well.

When the business is bought in, good risk decisions can be made, and vendors can be held accountable for remediation (or face termination of the relationship). We won’t be able to push back on vendors without management/business support, and our vendors know it.

#3 – Sooner is better.

VISRM processes must be integrated early into procurement processes while information security risk decisions can still be made. If VISRM is the last or a late step in the procurement process, it may be too late to do anything about risk. If the business has already made necessary accommodations and adjustments for the purchase of the vendor’s goods and/or services, we’ll find it more difficult to conduct a proper risk assessment, and nearly impossible to get the vendor to perform any significant risk remediation.

We’re certain to accept more risk than originally intended and have more vendor relationship risk exceptions when we insert VISRM late into procurement processes.

#4 – Share the work.

VISRM is not a single person’s or team’s responsibility. VISRM is a shared responsibility between the business and information security (or risk) personnel.

Roles and responsibilities for VISRM must be defined, documented, and communicated. It’s common for an organization to assign all VISRM responsibilities to a single person, and this is a poor practice. A single person will not know how every vendor is used or who every vendor contact is.

Applying the concept of relationship manager and risk manager is a good approach. The person, or team within the organization who uses the vendor’s goods or services is the relationship manager and should be the person who completes the classification of the vendor relationship (see #5 below). The person, or team, within the organization who handles the VISRM process is the risk manager.

Distributing the work between relationship managers and risk managers makes the VISRM a collaborative effort between the business and information security (or risk) personnel. It also makes things more accurate and efficient.

#5 – Relationships are unique.

Two types of risk that are important to remember, inherent risk and residual risk.

  • Inherent risk – risk associated with something (a vendor relationship) without accounting for controls to address risk.
  • Residual risk – risk associated with something (a vendor relationship) after accounting for controls to address risk.

Inherent risk (called “impact” in some tools) is used to classify the vendor relationship based on how the vendor is used, usually as “High”, “Medium”, or “Low”. A vendor with access to thousands of sensitive or confidential records poses a higher inherent risk than a vendor who has no access to data (a toilet paper supplier for instance).

It’s inefficient and senseless to treat all vendors the same, a waste of time and resources.

#6 – Keep it simple.

Complexity is the worst enemy of information security. Simplify, but don’t oversimplify. There are only four steps, no more and no less:

  1. Inventory – an accounting of vendor relationships is critical because we can’t possibly secure things we don’t know about. Compiling an inventory for the first time will require some work, and the best place to start is probably the accounting (accounts payable) department. Vendors are paid through invoices, reimbursements, and/or corporate card payments. Once the inventory is compiled, we’ll need to make sure it stays current. This is where we’ll need to insert VISRM into the organization’s procurement processes.
  2. Classification – Keep this simple. Think of ten or fewer questions we could ask to classify a vendor relationship as “High”, “Medium”, or “Low” based on inherent risk. These should be questions that a vendor relationship manager can answer.
  3. Assessment – Higher inherent risk relationships need to be assessed for residual risk (see above). Low inherent risk relationships can probably be ignored while we focus on “High” and “Medium” vendors. The most common method of assessment is a questionnaire.
  4. Decision-Making – When we have a risk, we only have four options:
    1. Accept – risk is acceptable as-is.
    1. Mitigate – risk is unacceptable, and the vendor needs to implement a control or change one.
    1. Transfer – hand risk to someone else, usually through insurance and/or contractual language.
    1. Avoid – risk is unacceptable, and remediation isn’t an option; therefore, the relationship will be terminated.

If our VISRM program doesn’t include these four steps, or includes more than these four steps, we’re probably not doing it right.

#7 – Manage requires measure.

“You can’t manage what you can’t measure.”

Measurements are important for comparison, context, trending, and objectivity.

For example, let’s say we score vendor relationship risk on a scale of 300 (high risk) to 850 (no risk). If scoring is consistently applied within the assessment and between assessments, we can compare risks with each other, we can track risk over time, and we could set objective thresholds for acceptable versus unacceptable risk.

VISRM without measurement is less effective and less defensible.

#8 – Automate without shortcuts.

Automate everything we can without taking shortcuts. The “IS” in VISRM stands for “information security” and information security must account for administrative, physical, and technical controls (and risks). The most common shortcut is to treat information security as an IT or technical issue rather than a holistic business issue.

Think about it. Isn’t it easier to go through the secretary than the firewall, and who cares about the antivirus software running on a server when someone steals the server?

Information security is NOT an IT issue, it IS a business issue.

#9 – Progress over perfection.

VISRM can seem daunting, and it’s impossible if the pursuit is perfection.

The goal is progress, and progress is defensible. Start with building the initial vendor inventory. Next, implement processes to ensure the inventory stays current, meaning integration with procurement process(es). Getting here could take a year in some organizations. Fine. It’s progress.

Set attainable risk management goals. Let’s say we have 1,000 vendor relationships. Maybe an appropriate goal for a twelve-month period is to classify all vendor relationships and conduct a dozen or so “High” risk assessments (step #3 from above). Again, more progress.

Then continue down the path. This is a maturation process and a journey, not a magic process and a teleportation.

Conclusion

The case for VISRM is indisputable, given the facts and regardless of what motivates.

  • Driven by risk – according to some studies as much as 60% of all data breaches come through a vendor relationship, directly or indirectly. The impact ranges from thousands or millions of dollars to bankruptcy.
  • Driven by compliance – most industry regulations require VISRM, including HIPAA, GLBA, and others.
  • Driven by legal liability – the absence of a VISRM program makes the organization less legally defensible in a civil action (resulting from a data breach).

Ignorance will not protect the organization. The most common risks from vendor relationships are data loss, ransomware (or other malware), and network entry through remote access (VPN, RDP, etc.).

The cost of a good VISRM tool like S2Vendor, provided by SecurityStudio, can be a little as $200/month. You can choose to do VISRM now or be forced to do it later. From experience, I can tell you doing it now is a lot less painful.

s2core

Estimate your score or book free demo today

What is Threat Monitoring

SecurityStudio recently announced adding a new feature to S2Me and S2Team called “Threat Monitoring”. It’s wrong to assume that everyone knows what threat monitoring is, so we put together a short article to explain. A threat, and the definition of “threat”, is best understood when they are put into context, and this is where we’ll start.

S2Me and S2Team are both risk management tools. S2Me is for personal risk management and S2Team is for employee personal risk management.

The key to managing risk is understanding risk.

The understanding of “risk” is critical to understanding the concept of information security, privacy, and personal safety. The meaning of risk is also very important to the meaning of threat(s) because they’re interrelated.

Risk is the likelihood of something bad happening combined with the impact of something bad happening.

The “something bad happening” is derived from threats and vulnerabilities. A threat is “a person or thing likely to cause damage or danger” and a vulnerability is a weakness (in protection). Threats, when applied to vulnerabilities, result in risks.

Do you see the relationship? It might be a little clearer when we substitute “something bad happening” in our risk definition. When we do, the definition of risk looks like this:

Risk is the likelihood of a (threat acting upon a vulnerability) combined with the impact of the (threat acting upon a vulnerability). Risks are difficult to predict, but there are many examples:

  • The risk of a compromised bank account.
  • The risk of ransomware.
  • The risk of lost personal information.
  • The risk of lost privacy.

The number of risks we face each day can be great, depending on many factors.

SecurityStudio’s threat monitoring is our method of monitoring threats (“person or thing”) that are likely to cause you damage or danger.

How SecurityStudio’s Threat Monitoring Works

Threat monitoring is an evolving science. Threats are always evolving, techniques to discover threats are always evolving, and SecurityStudio’s solutions are always evolving too.

This first version of our threat monitoring solution is simple and focused. We’re identifying data breaches and incidents where your account or personally identifiable information may have been compromised, then notifying you to take some action in response. We follow a simple four-step process:

  1. Discovery – SecurityStudio systems are constantly scouring multiple reputable online sources for data breach and incident-related information.
  2. Collection – We collect all the breach and incident information we find, compile it, and store it in our own localized data warehouse.
  3. Identification – Multiple times a day, we mine our data warehouse, searching for indicators of compromise related to you (and all other S2Me subscribers).
  4. Notification – If indicators of compromise related to you are discovered, we notify you immediately by email (if you’ve got the feature turned on) and post the information into your secure S2Me portal.
threat monitoring

Display of Threat Monitoring in the S2Me Portal.

For S2Team, the same process is followed with one additional step: compilation of the information in the organization’s management dashboard for ease of management and response.

threat monitoring dashbooard

Display of Threat Monitoring in S2Team.

Everyone (but the bad guys) Benefits from Threat Monitoring

Everyone, except for members of remote tribes, has a digital identity. With a digital identity comes opportunity for an attacker to profit and risk for you to lose something of value. This applies to business leaders, employees, grandparents, parents, kids, and everything in between.

S2Me Threat Monitoring is just one solution you should consider. There is no single source of all threat information.

Benefits for S2Me subscribers:

  • Your digital identity is monitored constantly, so you can rest a little easier knowing that SecurityStudio’s team of cybersecurity experts is keeping an eye out for you.
  • The data we compile is data you can trust; it comes from reputable sources and it’s validated before it ever reaches your inbox or portal.
  • Your identity information is mathematically validated, reducing the chances of false alerts and cluttered inboxes.
  • S2Me is free and always will be. There’s no catch, and you won’t be sold something you don’t need.
  • Checklists keep track of whether you’ve read the threat information, and whether you’ve responded appropriately to the threat.

Benefits for S2Team subscribers:

Employees enjoy all the S2Me benefits (above), in addition to having trusted advisors (the organization’s information security team) to help, and the confidence in knowing nobody else sees their individual S2Me results.

Employers benefit from S2Team by:

  • Knowing which employee accounts may have been compromised quickly enough to respond before damage is done.
  • Receiving immediate notifications of relevant data breaches and incidents.
  • Being able to use relevant data breach and incident information in more effective information security awareness and education campaigns.
  • Fostering a closer partnership with the organization’s user community by showing goodwill and care about employee personal protection (at home including family).

When You’re Notified of a New Threat

Don’t panic. You received a threat notification because we detected your personal information was probably involved in a data breach or incident, but NOT that your personal information was used (yet). In most cases, you have time to respond before damage is done.

The first step is to log into your S2Me account and go to the Threat Monitoring tab.

threat monitoring menu

Here you will find all the data breaches and incidents we know about that concern you. Listed at the top will be the data breach or incident you were most recently notified about, along with additional information. In the example below, we may have received a notification about a data breach related to “Wattpad”.

Wattpad

A short description of the incident is provided along with the data that was compromised and your checklist of actions you should take. The two most common suggested actions are to “Read” the information (and check off that you have) and to change your password (checking off “Password Changed” when you have).

That may be all you need to do, especially if you’re following the other guidance provided in the S2Me personal information security risk assessment.

Do This Now

If you haven’t subscribed to SecurityStudio’s S2Me, do it now. S2Me is the standard personal information security risk management tool used by thousands of people across the globe, and it’s the only tool endorsed by state and local governments in the U.S. The free S2Me guides subscribers through a simple information security risk assessment across ten important topics:

  1. Household Desktop and Laptop Use
  2. Safe Practices for Internet Usage
  3. Choosing and Protecting Authentication
  4. Securing Mobile Devices
  5. Securing WiFi
  6. Secure Gateway
  7. Backing up Data
  8. Internet-of-Things (IoT) and Other Devices
  9. Physical Security
  10. Breach and Incident Response

A completed assessment results in your personal S2Score for tracking your progress as you follow recommendations and build better information security habits.

s2score meter

By default, Threat Monitoring will be turned on when you create your S2Me account and you’ll enjoy all the benefits.

For Employers

Subscribe to SecurityStudio’s S2Team and deploy S2Me to all your employees and customers. Encouraging employees to protect themselves better at home is a welcome opportunity to foster information security collaboration by showing you care. The insights you gain into employee information security habits will become invaluable as you partner to make information security better for everyone.

There’s no better way to secure the remote workplace than by motivating employees to secure their homes and families better.

Loyal customers expect loyalty in return. Organizations, in growing numbers, are providing S2Me to customers and encouraging their customers to protect themselves better. The organization benefits by demonstrating loyalty, and depending upon the type of business, reduced loss.

The Future of S2Me and S2Team Threat Monitoring

This is just the beginning of what SecurityStudio has in mind to improve information security and threat monitoring for everyday people. This first version of Threat Monitoring uses technology and techniques that have been in the marketplace for a while, but now that we’ve establish a solid base to work from, we can truly innovate!

Ideas include:

  • Improving our current threat monitoring model to correlate detected attacker activities beyond the original incident.
  • Monitoring threats related to physical location.
  • Monitoring threats related to social media account usage and security.
  • Monitoring threats related to specific systems and devices in use.
  • Integration with other live Internet activity feeds for more relevance and focus.

Stay connected to SecurityStudio to learn about our latest news!

At SecurityStudio, we are 100% committed to our mission. Our mission is to fix the broken information security industry by focusing our efforts first on where they’re most needed. Our mission always comes first. #MissionBeforeMoney

s2core

Estimate your score or book free demo today

Cybersecurity has never been more important than it is today. Not only is our information more at risk, but so is our privacy, and even our personal safety. Complexity and distraction have contributed to us “taking our eye” off the ball, and there’s no better time than now to act.

What is cybersecurity?

This is a confusing word for some people. Even cybersecurity experts have different explanations of what cybersecurity is.
Cybersecurity is Managing the risk of unauthorized disclosure, modification, and destruction of information through technical means.

The key is managing risk, not eliminating risk. Eliminating risk would require us to eliminate all our information and the electronics we leverage to create, transfer, access, and use it. No more laptops, no iPads, no mobile devices, no Internet, and no data. Obviously, this isn’t feasible, and neither is eliminating risk.

what is cybersecurity

Managing risk means we need to live with the fact that bad things can and will happen; therefore, detecting bad things early and having a prudent response are also important.

Why is cybersecurity more important than ever?

The simple answer is bad things are happening more often and the results are more impactful. We were riding a dangerous trend of increased incidents (ransomware, data breaches, etc.) prior to 2020:

  • Over the past 10 years, there were 300 data breaches involving the theft of 100,000 or more records.
  • There were 1,244 data breaches in 2018 and 446.5 million records were exposed.
  • There were 4.1 billion records exposed in the first six months of 2019 alone.
  • At the beginning of 2019, the World Economic Forum named cyber-attacks as one of the top five risks to global stability.

2020 has certainly been a year like no other, and things haven’t gotten better. The final numbers aren’t in for this year’s cybersecurity incidents, but we inherently know things have gotten worse. There are two primary reasons for higher risk in 2020; complexity and distraction.

Complexity is the greatest enemy of cybersecurity. Most business and home technology environments have gotten too complex to secure properly. Businesses and people struggle to know what things they’re securing, let alone how to secure them. At home the problem is getting worse with each new technology we add. In our lust for new technology and features, we’ve failed to slow down and think about the cybersecurity consequences of our choices. Technology complexity continues to explode with “smart” homes (Alexa, Google Home, Ring, etc.), “smart” cars, interconnected medical devices, and our 275 million “smart” phones.

In terms of impact, our lives have become so interconnected that we can no longer separate cybersecurity from privacy or physical safety.

2020 has been a debacle. We’ve never been more distracted. There are so many significant things going on, that many of us have taken our eye off the cybersecurity ball. COVID-19 flipped our world on its head. Offices closed, leading to an explosion of work-from-home. Schools closed, leading to an explosion in remote learning. Couple these events with health concerns, economic concerns, general uncertainty, and it’s understandable that cybersecurity becomes an afterthought.

If COVID-19 wasn’t a significant enough distraction, 2020 also brought real social justice issues, civil unrest, the presidential election, and disinformation campaigns that bombard our inboxes and social media feeds.

Complexity and life’s distractions in 2020 have made our digital lives a perfect attacker’s playground.

Why are cybercrimes on the rise? How did they evolve over time?

Cybercrimes are on the rise because the opportunities we give attackers are extensive and the return on the attacker’s investment has never been higher. It’s the perfect recipe for their success at our expense.

cybersecurity cybercrimes rise recipe for attacker success

We continue to increase opportunities for attackers through our incessant need for more technology, while at the same time, we’re distracted by life’s events. These things combine to make attacks easier and more successful, leading to increased profit and return for an attacker. The cycle repeats itself when attackers re-invest their profits into better and more frequent attacks.

In previous decades, attacks were less nefarious, and it wasn’t uncommon for an attacker to be motivated by bragging rights or showing off. Those days are long gone, and criminals are organized much like legitimate businesses. Businesses are in business to make money, and so are most attackers. 71% of all data breaches are financially motivated and 25% are motivated by espionage.

The attackers we should all be most concerned about are the ones who are motivated by money and power; these are often organized crime rings and nation-state attackers such as China, Russia, and Iran.

What is the impact of a cybercrime to your organization, team, and/or self?

The impact of cybercrime depends upon several factors; the nature of the incident, your ability to detect and respond to the incident, the intent of the attacker, and the attacker’s ability or skill to carry out their intent. The impact can range from a simple nuisance to bankruptcy, and in rare cases even death.

For small to mid-sized organizations (250-449) employees, the downtime from a data breach varies:

  • 43% reported 0-4 hours of downtime
  • 45% reported 5-16 hours of downtime
  • 12% reported 17-48 hours of downtime

Sadly, 56% of Americans don’t know what steps to take in the event of a data breach (including American businesses), an estimated 60% of small to mid-sized business fail within 12 months of experiencing a data breach, and in 2020 we read about the first (known) death related to ransomware.

The impact of cybercrime varies from low to severe. How low or how severe should not be left to chance because you can (and must) take steps to reduce your risk.

What can you do to protect your organization, your team, and yourself?

The most important thing for all of us is to understand and apply basic cybersecurity principles. The most basic principle starts with risk management. Cybersecurity is risk management. In order to manage risk, you and I must understand (assess) it. Find a good, fundamental risk assessment, and do it. You’ll need to assess risk personally (at home), in your third-party/vendor relationships (the people you share information with), and within your organization.

How can SecurityStudio help?

SecurityStudio is dedicated to our mission of fixing the broken cybersecurity industry by helping people with simple, inexpensive (even free), and effective information security risk management tools.

  • Organization risk management starts with the S2Org tool, used by thousands of organizations of all sizes across all industries.
  • Third-party/vendor risk management starts with our S2Vendor tool; integrated, organized, and automated (without taking shortcuts).
  • Personal risk management (at home) starts with our S2Me tool; 100% free and simplified for everyday people.
  • Work at home risk management starts with our S2Team tool; the most cost-effective insight into employees’ real information security habits.

If complexity is the worst enemy and if cybersecurity is risk management, then we all need simple and affordable risk management tools for everyone to build the best defense, detection, and response capabilities possible.

SecurityStudio is here to help, always dedicated to #MissionBeforeMoney.

s2core

Estimate your score or book free demo today