{"id":3934,"date":"2015-05-12T18:16:42","date_gmt":"2015-05-12T18:16:42","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=3934"},"modified":"2020-02-26T18:54:40","modified_gmt":"2020-02-26T16:54:40","slug":"business-continuity-risks","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/business-continuity-risks\/3934\/","title":{"rendered":"Business Continuity Risks"},"content":{"rendered":"<p>Kaspersky Lab hosted the <a href=\"http:\/\/cybersecurity.kaspersky.com\/\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Cybersecurity Summit 2015<\/a> in Singapore this April, dedicated to enterprise IT Security challenges \u2013 and <a href=\"https:\/\/www.kaspersky.com\/enterprise-it-security\" target=\"_blank\" rel=\"noopener nofollow\">solutions<\/a>.<\/p>\n<p>The motto for the event was: \u201cBusiness under attack: adapting to the inevitable\u201d. Enterprises <a href=\"https:\/\/business.kaspersky.com\/attacks-towering-the-number-of-corporate-targets-increased-2x-in-2014\/3461\" target=\"_blank\" rel=\"noopener nofollow\">are targeted, of course,<\/a> but in some cases \u2013 given the amount and sophistication of threats \u2013 companies don\u2019t have to be targeted to become victims. We now live in the world of \u201cwhen\u201d, not \u201chow\u201d, and that\u2019s what the Kaspersky Security Summit is about, among other things.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Risks to business continuity #enterprisesec<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F1Rks&amp;text=Risks+to+business+continuity+%23enterprisesec\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>The most advanced and sophisticated threats tend to emerge at the enterprise level, where criminals are hunting for the \u201ctop prizes\u201d such as secret and highly sensitive information valued at millions, or access to corporate banking accounts where millions are stored. After these advanced hacking techniques are successful at the enterprise level, criminals start using them against\u00a0lower-level targets. Among the recent examples \u2013 Carbanak APT: the eventual attacks on ATMs have been preceded by the massive \u201crecon\u201d operations to gather and analyze data.<\/p>\n<p>Working the cyberthreats at the enterprise level we are almost certainly capable of mitigating them at any other level, too.<\/p>\n<p>One of the key areas of focus and responsibility for the enterprise CIOs is, of course, the continuity of the business. Certainly not the only one, but for a large business its continuity is especially critical. Processes should not halt; every interruption will have dramatic and long-playing repercussions. Especially when it comes to a larger businesses: restarting everything and restoring it to normal requires huge efforts \u2013 just imagine stopping and then relaunching an entire array of production lines or halting and then relaunching logistic processes.\u00a0A large enterprise with lean processes \u2013 ordering, production, shipments \u2013 suddenly experiences a severe interruption because of a certain cyberincident: one of its departments systems go offline, the entire company experiences heavy drawbacks, and direct and indirect losses, and so do its partners.<\/p>\n<p>Just because of a single piece of nefarious code.<\/p>\n<p>Another good \u2013 if not extreme \u2013 example here is a successful cyberattack on industrial systems, SCADA or even PLC, that effectively halts production lines. Industrial networks were considered more secure because of higher isolation from public networks. But 35% of all cyber incidents there happen because of malware attacks; and that malware arrives on USB sticks or injected through third party software and firmware. Moreover, today\u2019s industrial systems were often\u00a0built without an \u201cIT security-in-mind\u201d approach \u2013 a design flaw which was not at the time these systems were\u00a0built.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-3944\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2017\/05\/06020326\/slide31-1024x528.png\" alt=\"slide3\" width=\"1024\" height=\"528\"><\/p>\n<p>A simpler example would be a potent DDoS attack that cripples entire data centers, or knocks them out\u00a0of commission: even if just a single entity leasing that data center facilities are targeted, overkills are numerous. What is more troubling is that downtime may be too long for all affected parties: almost every fifth cyber incident takes longer than 24 hours to recover, which is absolutely unacceptable for anyone, especially large enterprises.<\/p>\n<p>One of the charts in my keynote today (see below), shows major risk factors for business continuity:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-3941\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2015\/05\/06020325\/slide2-1024x533-1.png\" alt=\"slide2\" width=\"1024\" height=\"533\"><\/p>\n<p>The first group of risk factors include such external causes as malware outbreaks that may happen on desktop, mobile or virtual environments, unless those are properly secured; DDoS attacks that are aimed to disable customer-facing services such as online registrations, ticketing, etc. Today, the truth is even grimmer: there are sophisticated DDoS attacks that may be launched against any online service, including non-public ones.<\/p>\n<span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/cVjhwDRSQGU?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span>\n<blockquote class=\"twitter-pullquote\"><p>#Cyberattacks on any given organization are merely a question of time<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F1Rks&amp;text=%23Cyberattacks+on+any+given+organization+are+merely+a+question+of+time+\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Internal factors aren\u2019t to be discarded either: unless employees have a notion of information hygiene, cyberattacks and malware incidents capable of interrupting the business continuity are very likely. Attempts at cyberattacks are inevitable. Their success, in turn, depends on how well-prepared the businesses are to stand against them, and how well suited their IT security is.<\/p>\n<p>Our key message is that to prepare for the inevitable, you need to rethink your IT Security. As IT security has become a broad issue, it is time to invest in a comprehensive security suite that is provided by a trusted partner with deep security intelligence \u2013 such as <a href=\"https:\/\/www.kaspersky.com\/\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Lab<\/a>.<\/p>\n<p>Learn more about Kaspersky Lab new Enterprise portfolio at <a href=\"https:\/\/www.kaspersky.com\/enterprise-it-security\/\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/www.kaspersky.com\/enterprise-it-security<\/a>.<\/p>\n<p>Check out our Enterprise Security Vision:<\/p>\n<p><iframe loading=\"lazy\" style=\"border: 1px solid #CCC;border-width: 1px;margin-bottom: 5px\" frameborder=\"0\" height=\"355\" marginheight=\"0\" marginwidth=\"0\" scrolling=\"no\" src=\"\/\/www.slideshare.net\/slideshow\/embed_code\/key\/kaT3eVnMqG4aOz\" width=\"425\"> <\/iframe><\/p>\n<div style=\"margin-bottom: 5px\"><strong> <a title=\"Kaspersky Lab new Enterprise Portfolio\" href=\"\/\/www.slideshare.net\/KasperskyLabGlobal\/kaspersky-lab-new-enterprise-portfolio\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Kaspersky Lab new Enterprise Portfolio<\/a> <\/strong> from <strong><a href=\"\/\/www.slideshare.net\/KasperskyLabGlobal\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Kaspersky Lab <\/a><\/strong><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Lab hosted the Kaspersky Cybersecurity Summit 2015 in Singapore this April, dedicated to enterprise IT Security challenges \u2013 and solutions. The motto for the event was: \u201cBusiness under attack:<\/p>\n","protected":false},"author":308,"featured_media":15679,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3021],"tags":[2307],"class_list":{"0":"post-3934","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-kaspersky-cybersecurity-summit-kcss"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/business-continuity-risks\/3934\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/business-continuity-risks\/3934\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/business-continuity-risks\/3934\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/kaspersky-cybersecurity-summit-kcss\/","name":"Kaspersky Cybersecurity Summit. KCSS"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/3934","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/308"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=3934"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/3934\/revisions"}],"predecessor-version":[{"id":26537,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/3934\/revisions\/26537"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/15679"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=3934"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=3934"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=3934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}