Ambition Issue 46 (May/June 2021)

Page 62

Columnist Laura Gillespie, Partner, Pinsent Masons (Belfast)

Murky World of Cyber Criminals Laura Gillespie looks at how cyber criminals could hold your business to ransom.

the myriad of practical and legal issues are addressed. Emails may not be available, payroll may not be capable of being run, staff may be unable to do any work at all. It is essential that the response can still be co-ordinated at board level to include actually communicating with one another and external advisers. Forensic IT support can assist with assessing the extent of the damage and how best to restore from back-ups, if they are held. However, in some situations, whether no back-ups are available, they are also encrypted or it will simply take too long to restore, some businesses feel they have no option but to consider engaging with the threat actor to seek a decryption key through a ransom payment. Negotiations can and sometimes do ensue. In fact, some cyber criminals will see the value in good “customer service” to encourage other victims in the future to engage. Such dialogue clearly comes with its own risks, not least that the business commits an offence by making payment to sanctioned organisations. The ramifications are broader still – if personal data is caught up on the attack (HR files, ability to pay salary, for example), then unless the people affected are unlikely to have their rights and freedoms impacted by the incident, a report will have to be made to the Information Commissioner’s Office within 72 hours of becoming aware. In some circumstances, it may also be necessary (in law) to tell the people concerned that the attack has occurred.

T

he pandemic has seen a surge in the reliance upon technology in most aspects of business and professional life; almost all businesses rely more than ever on technology to function and it is this reliance that has presented the latest opportunity for cyber criminals. A recent UK government report into cyber security breaches found that four in ten businesses report having suffered a cyber security breach in the last 12 months. In that time, the dedicated Pinsent Masons cyber team in Belfast has supported clients in all sectors, responding to many forms of cyber security incident. We share some insights. Ransomware – a showstopper Cyber criminals enjoy the luxury of not having to leave home to cause havoc; that can be done from the comfort of their armchairs. There has been a surge in ransomware attacks, leading the UK National Cyber Security Centre to issue a warning of the increased threat in February. Typically, these sorts of attack involve the threat actor gaining access to IT systems and encrypting them, rendering all the content inaccessible to the business and holding that information to ransom. This can be a complete showstopper, as if the business relies on those systems to function, it essentially becomes paralysed. The only option to remedy the situation is either restore the IT system from back-ups (if available and not also encrypted), or to seek decryption.

Learning from experience Ransomware attacks are targeted against all sorts of businesses, and all sizes too. To best equip your business in the face of this growing threat you should: 1. Review IT security and document your process. Make sure patches and updates are applied and consider how best to protect business-critical or sensitive information – this may involve using encryption on certain parts of your IT infrastructure. Ensure your staff are trained and understand the importance of following IT security policies and protocols. 2. Keep regular back-ups (and separate to your network and systems). It is obviously crucial to also know how to restore from these back-ups in a secure way, preventing any system from becoming re-infected. 3. Prepare for an incident. Know how you will communicate if systems are down, who will take the lead and how to contact key advisers such as insurers, legal advisers and forensic support. In the initial hours of an attack, it will be crucial to have a clear response strategy not only seeking to minimise the business continuity risk, but also to manage the risks to business and personal information as well managing any communications with the attacker.

The good, the bad and the ugly Not all cyber criminals share the same motivation. “White hat hackers” can and do explore vulnerabilities in IT systems, looking for back doors and outdated technologies but with the intent only of ensuring the business rectifies the situation. However, the hardened cyber criminal has a more malicious intent. Looking back 12 months on how ransomware attacks were being carried out, typically, the threat actor would encrypt the system and on occasions, leave a ransom demand hoping to elicit a payment for decryption. However, if a business was able to restore systems and didn’t engage, the attacker often simply moved on to their next victim. That has changed. There is a real and growing trend whereby cyber criminals now deploy ransomware, make their demand and demonstrate “proof of life”. Usually, this amounts to providing extracts of personal data which have been taken from the IT system and when the ransom demand is made, so the threat is made of release of the information either into the public domain, or onto the dark web. The threat therefore is not only to ongoing business continuity, but also of the potential fines and compensation claims which may arise from a personal data breach.

The murky world of cyber crime is evolving constantly and lurks in many dark corners. Ensure you have reviewed your business’s preparedness in facing that challenge. Pinsent Masons has launched “Cyturion”, a response platform for preparing for and responding to cyber attacks.

Responding to a ransomware attack When an attack occurs, a clear plan of action is needed to ensure

60


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Jim Fitzpatrick

3min
pages 98-100

Dine & Wine - Chris Rees

4min
page 97

Belfast Office Payescape Announces New Partnership with UKG

6min
pages 93-95

Business Class Motoring

7min
pages 90-92

John Ferris

4min
pages 88-89

Openreach to Create 100 New Apprentice Roles

2min
pages 86-87

Best in Class

9min
pages 76-79

Richard Kirk

4min
pages 82-83

Empowering our Local

5min
pages 80-81

John Ryan

10min
pages 70-75

John Campbell

4min
pages 68-69

Leading by Example

5min
pages 64-67

The Test of Time

6min
pages 48-51

Going for Growth

4min
pages 60-61

Laura Gillespie

4min
pages 62-63

The Post-Pandemic Fit Out

6min
pages 44-47

A Cleaner Future

9min
pages 56-59

Constructive Law

6min
pages 52-55

Set for Action on Climate Change

5min
pages 40-43

Squaring Up NI’s Circular

4min
page 39

Marta Gajewska

4min
page 38

QES Survey

6min
pages 36-37

Why Quality and Quantity Matter

4min
pages 30-31

Niall Devlin

3min
page 28

NI Chamber in Conversation With

6min
pages 34-35

Encirc is New Chamber Patron

2min
pages 32-33

CEO Update

3min
page 29

Michael Jennings

2min
pages 26-27

My Ambition is to

3min
pages 14-15

Campaign BT Announces Refurbishment of

2min
pages 10-11

Stairway to Seven

3min
pages 20-21

Holiday at Home Tourism

3min
pages 8-9

Jane Shaw

4min
pages 12-13

A World of Opportunity

6min
pages 22-25

Kate Marshall

4min
pages 18-19

Bill Roy

4min
pages 16-17
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.