We are only half way through 2017 and we have already seen some big cyber security breaches. Ransomware attacks crippled some businesses and suspicions of election hacks and cyber interference still dominate the news. With businesses relying on data more than ever, ransomware attacks such as the one that occurred at Renault, can have huge implications for day-to-day operations. Data protection is top of mind for everyone and businesses are spending lots of time and money to reduce the occurrences of data breaches.
Research by Deloitte notes that the major impacts of a data breach continue to be felt two years after an event. Their study also notes that the hidden costs, such as reputational damage, losing customers to the competition, increases in insurance premiums, and losses from obstruction of operations, are many times worse than the direct costs such as increased communication to affected customers, technical investigations, and attorney fees1.
The University of North Carolina at Chapel Hill researched 88 companies suffering data breaches which revealed that the market reacts very negatively to data breaches. Companies lose as much as 3% of their market value over the long run as a consequence of data breaches 2. The ripple effect of the breach goes beyond just bad publicity. Markets react negatively regardless of the number of customers impacted as it is viewed as a strategic blunder on the part of the affected company.
The weakest link in the security chain is People
While external cyber-attacks get a lot of publicity, it is important to pay attention to the 6 employee habits that impact data security such as the failure to report lost or stolen devices. Equally important is making sure that security access is cut-off when employees leave the organization.
Employees sharing of passwords (whether intentional or not), with people outside the organization to gain access to resources or to deface the company assets as seen in Matthew Keys’ 3 case, occur frequently. According to a study published by Carnegie Mellon University, it takes companies on average nearly three years to notice an employee is stealing secrets.
Security breaches highlight several flaws in how business processes are designed and operate. HR can play a bigger role in security breach prevention.
There is no 100% effective way to protect ourselves from malicious attacks but educating employees to report lost or stolen devices, regularly update passwords (and to not share them), keep applications up-to-date, and to not open emails and attachments from unknown senders, are simple things that HR can build into employee communications and processes. HR can also champion the automation of business processes such as employee termination, which would automatically shut off employee access to the network and applications when the employee leaves the organization.
Big data has given us a better understanding of our businesses, customers, and competition, but it has also opened the door to big security issues. We can all play a more active role in minimizing these threats.
At StarGarden we have a unique solution to filling in the security loopholes in the organization through automating of service requests for access based on the authority of an employee in the organization. Download Free white paper to find out how HR can help tighten data security in organizations.
References: