Technology solutions cyber security icon

Cyber Security Taking a Strategic Approach to Tackle Today's Cyber Security Threats

Cyber security threats have become so prevalent that, regardless of the industry or the size of the organization, every business and institution is susceptible to an attack.

MNP conducted a cyber survey in early 2017 that found "half of Canadian C-suite executives and nearly a quarter of entrepreneurs said their businesses' cyber security was breached in the past year." While 93 per cent of the combined groups said they felt their companies effectively protected customer data, nearly three in five of those polled "either suspect or know for certain" they were victims of hacking attempts.

Cyber security For many companies, it could just be a matter of time before they experience a breach that could impact their reputation or put their entire business at risk.

As the number of attacks grow, it's becoming almost impossible for businesses to implement policies and solutions to prevent every potential threat. A strategic approach to manage cyber security can prevent the most likely attacks and help businesses develop plans to deal with a breach quickly and minimize its impact.

The Most Common Attacks Today

News headlines often draw attention to the most sensational types of attacks. These stories usually involve the theft of large amounts of compromising data or the release of sensitive information online.

A significant number of security breaches never make the news; however, they can cause catastrophic damage and have impacted organizations in every sector of the economy. Some of the most prevalent types of attacks over the last year have included:

  1. "Hacktivism" targeting specific companies for the purpose of revealing company secrets, destroying the company's reputations or hurting companies financially.
  2. Distributed Denial of Services (DDos) attacks where networks are overwhelmed and online services are shut down.
  3. Phishing attacks on employees as a way of bypassing a company's security system to gather login credentials or other valuable information.
  4. Industrial Internet of Things (IoT) attacks that allow an attacker to infiltrate a company's system through internet connected devices.
  5. Ransomware attacks where a malicious software locks all assets, including computers or entire networks, and prevents access to any data or information until a ransom is paid.

Building an Inventory of Risks and Resources

With limited time, budgets and resources to tackle cyber security, there is a very real danger that companies are investing in the wrong security if they simply follow the headlines. Breaches and attacks vary widely by industry. In health care, an attack may focus on connected medical devices or privacy breaches. In finance, protecting customer data and preventing identify theft are key issues. For tech companies, intellectual property and malware need special attention.

While there are immediate steps any organization can take to significantly reduce vulnerability, it's important to take additional steps to understand specific vulnerabilities. A cyber security health check can help businesses identify the greatest vulnerabilities while also capturing a snapshot of the assets that could be lost and assessing the resources needed for protection or to respond an incident. With this information, organizations can set specific priorities and implement a strategic plan to mitigate the risks.

Knowing the potential fall out of an attack can also help prepare teams and resources to react quickly. Having a plan allows organizations to get services back online quickly and keep the impact to customers and to business to a minimum.

Being Realistic and Being Prepared

The 2017 Cyberthreat Defense Report by CyberEdge Group, Canadian companies continue to be optimistic when it comes to cyber security. Based on their data, 74 percent of Canadian respondents indicated that they had been compromised by at least one successful attack in the past year.

Given the numbers, this optimism may be misplaced. Rather than hoping an attack doesn't happen, businesses, regardless of their size, need to be prepared and make security a top priority. A strategic plan also allows companies to develop of effective employee education, build appropriate monitoring systems, and invest in the modern technology to reduce the potential for attacks.

Tomorrow's technology is shaping business today. To learn more about how MNP can help you develop a strategic cyber security plan for your organization, contact Danny Timmins, National Cyber Security Leader, at 905.607.9777 or danny.timmins@mnp.ca.

Download our fact sheet to learn more about what MNP can do for you.

Danny Timmins Headshot

Danny Timmins
National Leader – Cyber Security

Drawing on more than 20 years of experience, Danny is responsible for leading in the delivery of customized, client-focused cyber security managed services, product solutions and professional services. By focusing on deliverables that fit clients' unique business needs and objectives, he helps organizations improve awareness and reduce and manage overall cyber risk.

MNP's Technology Solutions Services

Technology is leading business driver in all aspects of your business operations. From engaging with your customers to leveraging your data and information, advising on infrastructure overhauls, developing custom solutions and protecting against threats online, MNP's Technology Solutions team has the experience, knowledge and skills to help you leverage technology to achieve your goals.

Technology solutions data & information dynamics icon

Data & Information Dynamics

Technology solutions data & information dynamics icon

Data & Information Dynamics

Leveraging the power of big data and putting insights into the hands of people who can make them work for you. Data & Information Dynamics empowers your team to make critical business decisions efficiently and effectively.

Learn more
Technology solutions development & operations icon

Applications & Operations

Technology solutions development & operations icon

Applications & Operations

Implementing a lean, agile and adaptable information technology operation – from application development and support to staffing and cloud strategy. Development & Operations empowers you to put the right pieces in place so your business can run smoothly.

Learn more
Technology solutions digital icon

Digital Services

Technology solutions digital icon

Digital Services

Reaching your customers online in a targeted, personalized and effective way. Digital Services empowers you to create an engaging digital marketing strategy using a rich mix of content creation and user experience to convert leads into customers.

Learn more
Technology solutions technology advisory icon

Technology Advisory

Technology solutions technology advisory icon

Technology Advisory

Aligning your technology strategy with your business objectives and ensuring your infrastructure is prepared to meet your growing demands. Technology Advisory empowers you to execute any project – from a software implementation to an architecture overhaul.

Learn more

Taking a Strategic Approach to Tackle Today's Cyber Security Threats

Read the article