Skip to main content
Opens in a new tab External site

March 2023 / 5 Min Read

Cyber Attacks: How to Rapidly Detect, Respond and Contain Damage

 

How can firms stay on top of cyber threats in an increasingly digitalized world?

 

Key Takeaways

  1. Cyber attack is one of the top five risks that business leaders are most focused on.
  2. Embracing risk is the only option, with prepared business leaders continuing to make long-term investments in long-tail risks.
  3. Business leaders are embracing counsel from both internal and external sources to mitigate cyber risk.

In the face of rising inflation and an ongoing energy crisis, leaders still recognize cyber attacks as one of the top five threats to their business. According to Aon’s Executive Risk Survey 2022, 40 percent of business leaders are focusing their efforts on managing cyber risk. Despite the urgent challenges this brings to the table, leaders are not pulling back on cyber preparedness.

Emerging Cyber Security Threats

As many as 83 percent of organizations have experienced more than one data breach in their lifetime, averaging upwards of US$4 million in damages. Even sophisticated security measures are falling short and quickly becoming obsolete as attackers continue to adapt and evolve. Once a breach occurs, it can often remain undetected for long periods, taking an average of nine months2 and causing significant damage in the meantime.

Threat #1: Social engineering attacks
Phishing, compromised business emails, third-party software vulnerabilities, and stolen or compromised credentials were the costliest cyber threats for businesses in 2022, totalling about US$20 billion and resulting in business interruption losses, infrastructure destabilization, private data leaks, theft of proprietary information, loss of reputation, and much more.

Threat #2: Evolving work models
Forbes3 estimates that by 2025, 70 percent of the workforce will be working remotely at least five days a month. Such rapid digital evolution of business models across all industries has made cyber risk a persistent threat to the ‘new normal’.

Threat #3: Interconnected risks across business ecosystems
Businesses are now exposed to rising interconnected risks not just from within an organization’s own network, but also countless vulnerabilities in a complex ecosystem of physical and digital vendors, partners, supply chains, and even open-source code.

How to embrace risk and build cyber resilience

Top business leaders know that now is not the time to slash cyber security budgets with 69 percent of organizations planning to increase their cyber security spending. For 90 percent of well-prepared leaders, the current economic climate has increased their appetite for addressing risk.

Because vulnerabilities exist inside and outside an organization, fully addressing cyber risk requires an enterprise-wide, cross-functional approach that extends beyond its network perimeter. In addition to the Chief Information Officer and Chief Information Security Officer, cyber security should be the responsibility of executive level and departmental leaders.

A strategic and integrated approach involves pre-defined roles and cross-functional communication across the organization, with the aim of building organizational resilience as opposed to preventing incidents. Strategies should encompass:

Cyber security and phishing training for all employees

Create a cyber secure culture where enterprise security is the responsibility of all technology users, and train employees to spot and report suspicious incidents.

Multifactor authentication and limited access controls

Add additional requirements to the login process to limit the damage of stolen credentials, segment the network to reduce the spread of malware, and limit access privileges.

IT security controls, software patching, detection tools

Ensure all systems are up-to-date, vulnerabilities are patched, and detection tools and alerts are properly configured, and log all activity.

Involving incident response and functional experts

Hire professional cyber threat hunters who are trained to anticipate situation-specific threats, and pre-arrange digital forensic experts, legal counsel, crisis communicators, and ransom negotiators.

Threat hunting, threat intelligence, and supply chain due diligence

Systematically hunt generic and targeted threats within the network, test third-party software, and monitor the deep and dark webs for threats and leaked assets.

Vulnerability testing and attack simulations

Stage simulated attacks using real-world breach techniques to evaluate the organization’s ability to prevent, detect, and respond to threats, and use metrics to inform cyber security strategies and budgets.

Business continuity, disaster recovery planning, and third-party risk management

Regularly review and update incident response playbooks, business continuity plans, and disaster recovery plans, test response through realistic simulations, enforce third-party risk assessments, and hold post-incident reviews.

Cyber resilience strategy must work hand-in-hand with risk transfer and external counsel

Even the best precautions can fail to keep attackers permanently at bay. Traditionally considered to have secure and protected systems, the financial sector has been particularly prone to cyber attacks in 2022, as in outages in New Zealand for ANZ bank and attacks on Japanese cryptocurrency exchange, Liquid6. Globally, there were various high-profile incidents of bank theft using the SWIFT electronic payment messaging network. The Sunburst hack of 2020 also shows how a backdoor supply-chain attack compromised organizations with best-in-class cyber security practices. These included key US government agencies as well as Microsoft, Intel, cyber security firm FireEye, and more.

Because cyber attacks can never be fully circumvented, no cyber resilience strategy is complete without risk transfer. This involves assessing and quantifying the organization’s cyber risk exposure and risk tolerance and incorporating these into long-term strategy. Appropriate cyber insurance coverage can then be obtained for areas such as indemnification for loss, liability, regulatory omissions, physical damage, and more. This approach also reinforces the corporate risk management mindset and influences cyber security controls and best practices across the organization.

Another key differentiator in leaders’ quest for sustained cyber resilience is a willingness to engage a good external advisor or consultant to help make better decisions and address risk. Resisting the impulse to delay capital investment in response to short-term risks, well-prepared leaders are open to bringing in consultants to help strengthen an organization’s response to real-world threats.

 

Mitigating Cyber Risk

Build cyber resilience strategy

Ensure appropriate cyber insurance coverage

Partner with external advisors and consultants

Today’s business risks are interconnected, challenging leaders to respond to emerging threats with agility. Only in addressing top risks such as cyber security can organizations head into uncertainty with confidence.

For more information on Cyber risks, download our 2022 Executive Risk Survey.

Related Solutions:

Aon Cyber Solutions
The Cyber Loop – A Model for Sustained Cyber Resilience

 

1 IBM’s 2022 Cost of a Data Breach Report
2 IBM’s 2022 Cost of a Data Breach Report
3 Forbes: This Is the Future of Remote Work In 2021
4 Infosec: 2022 cybersecurity spending trends: Where are organizations investing?
5 ZDNET: ANZ New Zealand back online after outage from DDoS attack
6 CNBC: More than $90 million in cryptocurrency stolen after a top Japanese exchange is hacked

Disclaimer

This material has been prepared for informational purposes only and should not be relied upon for any other purpose. You should consult with your own legal and information security advisors or IT Department before implementing any recommendation or guidance provided herein.

 

General Disclaimer
The information contained herein and the statements expressed are of a general nature and are not intended to address the circumstances of any particular individual or entity. Although we endeavor to provide accurate and timely information and use sources we consider reliable, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act on such information without appropriate professional advice after a thorough examination of the particular situation.

Terms of Use
The contents herein may not be reproduced, reused, reprinted or redistributed without the expressed written consent of Aon, unless otherwise authorized by Aon. To use information contained herein, please write to our team.