External BCAW resources

The Business Continuity Institute

BCAW 2017

On this page you will find a collection of external resources that help demonstrate the theme for the week by highlighting the importance of being cyber resilient, or perhaps the cost of not being cyber resilient. Click on the links below to discover more. Don't forget you can also find plenty of other resources relating to business continuity by accessing our Virtual Expo.

Cyber Security. Evolved.

Although focussing on the technical aspects of a cyber security incident, this video by Deloitte provides an excellent depiction of the lengths some hackers will go to in order to access your sensitive data.

Databarracks ransomware recovery guide

Ransomware is malware that, upon infection, prevents access to certain elements of your systems until a ransom is paid to the attackers. There are many different strains of ransomware, which variously encrypt data and system files, through a range of possible attack vectors. Once infected, you have two options: pay the ransom or restore clean data from before the breach. The Databarracks ransomware recovery guide details the step-by-step process for managing the incident and restoring data. It also outlinea the technical foundation that must be laid ahead of time - specifically how to configure backup or replication schedules in order to minimise downtime and data loss.

City of London Police ransomware protection alert

Following the ransomware cyber attack on Friday 12 May which affected the NHS in the UK and many other organizations globally, the City of London Police’s National Fraud Intelligence Bureau has issued some advice and urges individuals and businesses to follow this protection advice. In order to protect the public and businesses from ‘WCry’ or ‘WannaDecrypt0r’ ransomware, the National Crime Agency (NCA) is working closely with a range of partners both in the UK and overseas. The NCA leads the UK law enforcement response to cyber threats and is investigating this incident with the National Cyber Security Centre (NCSC).

Top 8 priorities for cyber security and BCM leaders

Many times over, we have heard business leaders say they agonize over managing cyber security risk and shielding their organizations from an attack. There is a need to integrate response strategies to the organization’s business continuity program and MetricStream's Top eight priorities for cyber security and BCM leaders in 2017 offers some insight into how to achieve this.

Ransomware and businesses 2016

Ransomware has quickly emerged as one of the most dangerous cyber threats facing both organizations and consumers. Ransomware and businesses 2016 notes that organizations need to be fully aware of the threat posed by ransomware and make building their defences an ongoing priority. While a multilayered approach to security minimizes the chance of infection, it’s also vital to educate end users about ransomware and encourage them to adopt best practices. As ransomware gangs continue to refine their tactics, organizations cannot become complacent. Businesses should continue to review and improve their security in the face of this rapidly evolving threat.

Common cyber attacks: reducing the impact

Your organization’s computer systems - and the information they hold - can be compromised in many ways. It may be through malicious or accidental actions, or simply through the failure of software or electronic components. And whilst you need to consider all of these potential risks, it is malicious attack from the internet that is hitting the headlines and damaging organizations. Common cyber attacks: reducing the impact has been produced by CESG (the Information Security Arm of GCHQ) with CERT-UK, and is aimed at all organizations who are vulnerable to attack from the internet. The paper helps CEOs, boards, business owners and managers to understand what a common cyber attack looks like.

Verizon data breach investigations report

Cyber espionage is now the most common type of attack seen in manufacturing, the public sector and education, warns Verizon's Data breach investigations report. Much of this is due to the high proliferation of propriety research, prototypes and confidential personal data, which are hot-ticket items for cyber criminals. In addition, organized criminal groups have escalated their use of ransomware to extort money from victims with this year’s report showing a 50% increase in ransomware attacks compared to last year. Despite this increase and the related media coverage surrounding the use of ransomware, many organizations still rely on out-of-date security solutions and aren’t investing in security precautions.

Varonis data risk report

There is an alarming level of exposure for corporate and sensitive files across organizations, including an average of 20% of folders per organization open to every employee. The ​Varonis data risk report was the result of over a thousand risk assessments for customers and potential customers on a subset of their file systems. It identified where sensitive and regulatory data resides, reveals over-exposed and high risk areas, and makes recommendations to increase their data security posture. One of the findings was that nearly half of organizations had at least 1,000 sensitive files open to every employee, while one in five had 12,000 or more sensitive files exposed to every employee.

State of the phish report

The Wombat Security State of the phish report not only looks at data around tens of millions of simulated phishing emails sent last year, but survey data from both infosec professionals and end users to gain a better idea of what the impact and understanding of phishing was in 2016. While not a scientific study, this report does offer important insights into what proactive organizations are doing to better train their end users to identify and avoid phishing messages. Three quarters of infosec professionals still report their organizations being victims of a phishing attack and half said the rate of attacks is increasing.

Dell end-user security survey 2017

Not only are many employees likely to share confidential information, but they are doing so without proper data security protocols in place or in mind. Today's workforce is caught between two imperatives: be productive and efficient on the job, and maintain the security of the organization's data. To address data security issues, organizations must focus on educating employees and enforcing policies and procedures that secure data wherever they go, without hindering productivity. The Dell end-user security survey indicates there is a lack of understanding in the workplace regarding how confidential data should be shared and data security policies.

Cyber security breaches survey 2017

As part of National Cyber Security Strategy 2016–20215, UK businesses need to comprehend the nature and significance of the threats they face. The UK Government's Cyber security breaches survey was run to help businesses understand what other similar businesses are doing to stay cyber secure, and supports the Government to shape future policy in this area. The survey builds on the findings first established in the 2016 survey and covers: business awareness and attitudes towards cyber security; approaches to cyber security, including estimates of business spending; the nature and impact (including estimated costs) of cyber security breaches; and differences by size, sector and region.

Cyber security: ensuring business is ready for the 21st century

The digital world presents many opportunities for business, not least the reduction of costs, a better customer experience, and an ability to trade globally. This reliance on technology comes alongside a trust that it will be secure, safe and robust. This is vital in an environment where goods and services are traded in real time and where huge amounts of personal data are at risk from hackers and human error alike. Cyber security: ensuring business is ready for the 21st century from the Institute of Directors and Barclays reveals a worrying number of UK businesses have no formal plan to protect them from cyber attack.

The growing threat of DDoS attacks to UK businesses

As cyber-attacks on UK organizations continue to increase in frequency, knowing how to stop them before they impact your business has never been so important. A particularly popular and dangerous type of threat is a distributed denial-of-service (DDoS) attack. But the problem is too many businesses think ‘it won’t happen to us’ and suffer as a result of lack of investment in protection services. Take a look at Daisy Group's infographic showing how dangerous an attack could be to your business.

What to do if you receive a DDoS ransom note

One of the most common motivations for a DDoS attack is extortion, where an attacker threatens to take down a site unless the victim pays, typically in the form of a Bitcoin transaction. Unfortunately, these types of extortion attempts are increasing in both intensity and volume. In recent years, a hacking group called ‘Lizard Squad’ has been responsible for sending demands to a number of high-profile companies, including Sony and Instagram. Read Daisy Group's advice on how to deal with such an incident.

Cyber security in the NHS

The need for the NHS to secure its IT systems has never been greater. This year has seen an unprecedented number of attacks on the NHS, from ransomware and malware shutting down entire IT systems, to the hacking of patient data by criminals. Daisy Group's new infographic clearly sets out why it pays to assess your cyber security measures.

The cyber threat to UK business

The cyber threat to UK business is an assessment by National Crime Agency (NCA) and National Cyber Security Centre (NCSC) of the biggest cyber threats to UK businesses. Emphasising the need for increased collaboration between industry, government and law enforcement in the face of a growing and fast-changing threat, the report discusses the trend of criminals imitating the way suspected nation state actors attack organizations. It also highlights increased levels of aggressive and confrontational cyber crime, particularly through DDoS attacks combined with extortion, and ransomware.


Cost of data breach study: global analysis

The IBM and Ponemon Institute's latest Cost of data breach study: global analysis showed that the average total cost of a data breach for the 383 companies participating in the research increased from $3.79 to $4 million, and the average cost paid for each lost or stolen record containing sensitive and confidential information increased from $154 in 2015 to $158. In addition to cost data, the global study looked at the likelihood of a company having one or more data breach occurrences in the next 24 months, and the answer was an estimated 26% probability of a material data breach involving 10,000 lost or stolen records.


Data breach digest

Data breaches are becoming more complex and are no longer confined to just the IT department, but are now affecting every department within an organization. Each breach leaves a lingering, if not lasting imprint on an enterprise. Every year, Verizon investigates hundreds of cyber crimes and helps organizations recover fast. In the Data breach digest, they share some of their most interesting cases — anonymized of course — so you can learn from the lessons of Their 16 cyber crime case studies cover the most lethal and prevalent threats you face — from partner misuse to sophisticated malware. They set out the measures you can take to better defend your organization and respond quickly if you are a victim of an attack.


300 billion passwords report

As the total universe of passwords grows to 300 billion by 2020, organizations across the world face a massively increasing cyber security risk from hacked or compromised user and privileged accounts. In 2016 alone more than 3 billion user credentials/passwords were stolen — that’s 95 credentials and passwords stolen every second. This 300 billion passwords report aims to assist cyber defenders and educate the wider global community through a statistical analysis of the massive password expansion and associated challenges that lie ahead.


The rise of ransomware

Businesses consider ransomware a very serious threat, however most are ill prepared to handle an attack, according to a new study conducted by the Ponemon Institute on behalf of Carbonite. The rise of ransomware details the malicious software’s cause and effect chain and offers solutions to mitigate ransomware risks. The majority of IT professionals believe that backup is critical to their ransomware protection strategy with 68% of IT professionals in companies that experienced a ransomware incident saying it is essential (30%) or very important (38%) to have full and accurate backup as a defence against future ransomware incidents.


Cyber security report

Over one-third of organizations that experienced a data breach in 2016 reported substantial customer, opportunity and revenue loss of more than 20%. 90% of these organizations are improving threat defence technologies and processes after attacks by separating IT and security functions (38%), increasing security awareness training for employees (38%), and implementing risk mitigation techniques (37%). Cisco’s 10th annual Cyber security report highlighted challenges and opportunities for security teams to defend against the relentless evolution of cyber crime and shifting attack modes.


Global information security survey 2016-17

Global organizations are more confident than ever that they can predict and resist a sophisticated cyber attack, but are falling short of investments and plans to recover from a breach in today’s expanding threat landscape. An overwhelming majority of power and utility executives say their cyber security function does not fully meet their organization’s needs, according to the EY Global information security survey 2016-17. That number continues to rise compared with last year (86% in 2015) as companies struggle to manage increased risk from growth in digital and connected devices.