Ransomware has spent quite a bit of time in the spotlight as a major culprit of data breaches. There is however, another threat that while not as sensational as ransomware, can be just as risky. That threat is people. Of all the data breaches reported in the UK during Q1 2016, ICO data reveals that 62 percent were caused by human error. In fact, ransomware wouldnโt be as prevalent as it is if it werenโt for people like you and me making blunders such as accessing insecure web pages, downloading infected software or clicking a phishing link in an email.
[easy-tweet tweet=”People accessing insecure web pages are responsible for ransomware being prevalent.” hashtags=”cloud, tech”]
Unfortunately, the cost of human mistakes is larger than one might think. According to research by the University of Portsmouth,ย fraud and human error are costing UK organisations around ยฃ98.6 billion a year. The actual number is even larger, as the reported figure doesnโt include undiscovered or unreported incidents.
While some might think that storing data in the cloud keeps it from being vulnerable to ransomware, theyโre wrong. Ransomware can encrypt files on hardware and cloud services alike. Of course, data in the cloud is always susceptible to human error. Minimising the risk your employees pose to cloud data begins with education. However,ย figures from Experianย reveal that only 46 percent of companies enforce obligatory security training for all employees. Among those that do offer employee security training,ย 43 percent only provide basic trainingย that omits many of the serious data breach risks their businesses face.
[easy-tweet tweet=”While some might think that storing data in the cloud keeps it from being vulnerable to ransomware, theyโre wrong” hashtags=”tech, cloud”]
When educating your employees, focus on the following principles to help ensure your staff follow cybersecurity best practices.
Handle data with care.
The majority of incidents attributable to human error are associated with sheer carelessness or lack of knowledge about how to properly handle data. To prevent unauthorised access to data, employees should consider who else might be able to view the information they store in the cloud. They should avoid storing sensitive data on a shared drive or cloud network thatโs accessible by people who arenโt authorised to access the data being uploaded. Any sensitive data files must always be encrypted, regardless of where theyโre stored.
Quickly identify phishing emails.
[easy-tweet tweet=”Teach employees to look for these common characteristics of phishing emails” hashtags=”cloud, tech”]
An unsettling number of employees are falling victim to phishing attempts. According toย research from Verizon, people opened 30 percent of phishing messages, up from 23 percent last year. Of that 30 percent, 13 percent also opened the attachment, giving malware a clear path to the network. Teach employees to look for common characteristics of phishing emails:
Poor design
Incorrect spelling and grammar
Requests for personal details
Suspicious attachments
URLs that donโt match the companyโs primary domain (to view a URL without clicking a link, users can hover over the link with their cursor)
Respond appropriately to a suspected ransomware attack.
If employees suspect a device theyโre working on has been impactedย by ransomware, itโs critical that they stop working on the device immediately and notify IT. Ransomware wipes files within a set amount of time, delaying action could result in data loss. Even if you have backups and are able to recover your systems, restoring the production environment can take as long as a few days, which could lead to costly downtime.
For example,ย Lukas Hospital in Neuss, Germany, had complete backups of all systems in place, but when it wasย plagued with TeslaCrypt 2.0 ransomware, the hospital estimated that it would take up to 48 hours before its IT environment was fully functional again. As a result, 20 per cent of the hospitalโs surgeries had to be rescheduled, and less critical care had to be temporarily shifted to other hospitals.
Apply security patches.
New security threats are continually surfacing, exploiting vulnerabilities in hardware and software. To protect their systems against these threats, users need to apply system patches immediately when prompted. Even delaying the updates by a few days could increase the likelihood of the system and network falling victim to ransomware attacks and other cybersecurity risks.
Create secure logins.
Employees need to create sentence-based complex passwords that involve special characters, numbers and a mix of lower- and uppercase letters (e.g. โTo be or not to beโ becomes โ2BorNot2B_ThatIsThe?โ).
Whenever possible, use two-factor authentication to increase security.
Avoid shadow IT.
As if the risk posed by human error and ransomware alone werenโt enough, shadow IT only aggravates the threat. Research from Cisco reveals that CIOs estimate that their organisation has 51 public cloud applications in use, but the actual number is more like 730. If your employees are uploading restricted data to an unauthorised cloud application โ such as Google Drive, Dropbox and Evernote โย without proper encryption, this increases your security risk.
Encourage yourย employees to enlist ITโs help in selecting and implementing cloud solutions. The IT department should be empowered to act as a trusted adviser rather than merely a strict policy enforcer, which will minimise the likelihood of employees resorting to shadow IT.
Follow your organisationโs security policies.
Having clear, enforceable security policies in place helps your employees knowย whatย data they have permission to view and handle andย howย theyโre allowed to view and handle that data. With most UK businesses (95 percent, according to a BT study) using mobile devices for work purposes, a bring-your-own-device (BYOD) policy is a must.
Your BYOD policy should address issues such as data security, remote management, data transfer, backups, data wipe and technical support (office or field based). If you work with a managed services provider for your IT support, ensure that the vendor can assist with developing and supporting your BYOD program.
Retrain after a breach.
Having employees who are educated in security best practices reduces the chance of unauthorised access to data as well as ransomware compromising your data and network, but itโs not a fool-proof solution. Employees do still make mistakes. Unfortunately, Experian has discovered thatย a whopping 60 percentย of businesses that have experienced a breach make the error of not retraining staff after a breach has taken place. If a breach occurs, review what went wrong and have your employees go through security training again, with special emphasis on weak areas.
Employees ought to observe cybersecurity best practices, but you should do your part by ensuring your IT infrastructure is designed to protect against ransomware and other threats. To protect your perimeter, implement a network solution thatย includes intrusion detection and prevention (IDS/IPS), deep packet inspection and perimeter anti-virus, and malware blocking.
Also be sure to back up your systems. If ransomware takes your systems hostage, paying the ransom is never recommended, as it only encourages hackers, so the key to recovering your IT environment is aย reliable disaster recovery as service (DRaaS) solution that creates and updates a complete image of your system as frequently as you specify, sometimes even as often as every 15 minutes.
[easy-tweet tweet=”Whatever backup or #DRaaS solution you choose, files should remain encrypted in transit and at rest.” hashtags=”cloud”]
Whatever backup or DRaaS solution you choose,ย files should remain encrypted in transit and at rest.ย Also verify that the vendor offers service level agreements (SLAs) that ensure that your data can be restoredย within yourย recovery time objectives (RTOs) and that provide adequate recourse in the unfortunate event that data is lost.
Although ransomware is a legitimate threat and is certainly deserving of the mediaโs attention, often the more immediateย โย and more easily managedย โย risks can be within the organisation rather than outside it. Educating your employees and doing your part to protect your network are excellent starting points for preventing a data disaster.
Matt Kingswood is the Head of Managed Services of nationwide Managed IT services providerย IT Specialists (ITS).
ITS is part of the US Reynolds and Reynolds company which has a strong heritage in data backup and recovery services. In his position, Matt is responsible for developing Managed IT services within the UK and is currently focused on the next generation of cloud and recovery products, BlackCloud and BlackVault.
Matt has more than 20 years of experience in the information technology industry, and was formerly CEO of The IT Solution โ a full service IT Supplier acquired by ITS. Since joining ITS, he has led efforts to introduce a range of managed services based on the new ITS cloud platform. Previously Matt had a career in technology for several top tier investment banks before founding and selling several companies in the IT services industry.
Matt has an MBA from The Wharton School of the University of Pennsylvania and a Masterโs in computer science from Cambridge University.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok