Cybercrime and Resiliency
Cybercrime is growing year after year. It is a big business and the major players in cybercrime operate as a business. They even have research groups, user manuals, and "franchises" for people who want to start up their own cybercrime business. AI has reduced the cost to commit cybercrime and is allowing many opportunistic attacks. Are you ready to be attacked? The costs of a cybercrime attack can be in the millions and many businesses have failed after such an attack.
The cost of being attacked can be quite large and vary by the type of attack. Some attackers want the data you have while others simply want to steal money or demand ransom. Scams are mainly targeted against individual employees who have the right to move money. Larger attacks are for stealing sensitive data or for demanding ransom. Supply chain attacks are intended to get criminals into larger corporations through an attack on a supplier who might not have the same security.
Nearly everybody is vulnerable to phishing attacks. Sophisticated techniques and AI are currently being used to allow for well-crafted phishing attempts including AI generated phone calls using corporate officer voices.
The speed of business depends on trust. Cybercrime misuses that trust in order to commit crimes. After many attempts to train people, it does not seem to be possible to train employees to not fall for phishing attempts. Everyone will fall for some scam.
A better defense assumes that people will fall for scams or phishing attempts and works to limit the damage. For example, family members can be trained to say a specific phrase to show that they are really the person calling (breaking the "fake relative call" scam). Corporate employees can be taught to ask for a specific authorization phrase before transferring money based on a phone call.
A "defense in depth" is used to limit how much damage any one failure can inflict. Each layer in requires a different type of access control. Yes, this does add costs to day to day operations, but that cost has to be contrasted with the costs of any possible cybercrime.
A resilient system is one that can be attacked and quickly recover without a huge cost. These systems have to be maintained, updated, and monitored to remain resilient. Bugs, new employees, new procedures, etc. all contribute to new openings that can be used by attackers to gain entry. Resiliency is a constant effort.
Because the costs of data storage have dropped, it is possible for most organizations to have all their data saved in ways that can preserve the corporation through any ransom attack. It is very difficult for a ransom attack to encrypt data on permanent media that is offline during the attack.
It is not possible to prevent cybercrime attacks. However, it is possible to limit their effectiveness and for a business to design their systems and operations in order to survive multiple attacks.