Insights on Cyber-Security, Prevention, and Preparation
By Faris Faris, Chief Information & Technology Officer, Distribution & Supply Chain Systems Expert
In my role as CIO/CTO, I am deeply engaged in various aspects of technology. Over the course of my career, I have successfully led teams in implementing cutting-edge technology solutions across corporate offices and warehouses, driving improvements in efficiency and productivity. This involved introducing new business systems such as ERP and WMS implementations, CRM solutions, barcode and voice picking technology, as well as investments in real-time delivery tracking and proof of delivery solutions. However, like many IT professionals, cyber-security is a pressing concern that demands careful attention.
Safeguarding Your Business and Employees:
It’s undeniable that cyber-security, data retention, and backups are critical components of our IT operations. Through my extensive experience spanning nearly 25 years, I have witnessed that many companies tend to under-invest in these crucial areas, often realizing the impact only after encountering negative consequences. It is crucial to emphasize the significance of addressing these concerns with our leadership team and partners. One effective approach is to contextualize the need for these solutions by demonstrating how they align with our business revenue on an hourly basis. Increasing awareness about the financial implications of potential cyber threats, such as ransomware attacks and the absence of reliable backup solutions, is crucial. Additionally, empowering our employees to serve as the primary line of defense is essential for safeguarding our company from cyber threats. Utilizing software to conduct phishing campaigns and leveraging AI-driven systems to understand employees’ click patterns are effective strategies for keeping our staff vigilant.
Engaging with Managed Security Service Providers (MSSPs) and Security Operations Centers (SOCs) can be a strategic step when internal resources are limited
Considering the evolving tactics deployed by attackers, emphasizing the continuous education and cyber awareness of our staff has become even more critical. It’s not a matter of “if” but “when” our organization will be targeted. Therefore, there should be a focus on fortifying our environments to deter attackers from breaching our systems. While comprehensive protection cannot be guaranteed, adopting security best practices such as scheduled complex password resets, multi-factor authentication, network traffic monitoring, and regular security patches is imperative. These measures play a pivotal role in strengthening our operating systems, software, and networks against potential threats.
During my interactions with peers from other industries, the challenge of lacking internal security expertise has frequently emerged. Engaging with Managed Security Service Providers (MSSPs) and Security Operations Centers (SOCs) can be a strategic step when internal resources are limited. Moreover, cultivating collaborative relationships with security experts can substantially aid in planning and implementing preventive maintenance for our hardware and applications.
Being Prepared:
Having discussed the measures to protect your company and employees, it’s important to address the response to a potential compromise. I have found it extremely valuable to be as prepared as possible for an incident or event, operating under the assumption that if it can happen, it will.
In addition to having strong cyber insurance, it is advisable to have several key contacts lined up. Firstly, it is crucial to secure a forensic firm specializing in incidents and events. Negotiating an annual retainer with the forensic firm and making them readily available is a proactive step. Many firms also offer the flexibility to utilize the retained hours for other investigative situations, such as smaller events.
Secondly, it is essential to identify and have breach counsel (a law firm) ready for deployment in the event of a security breach. You wouldn’t want to be scrambling to find these resources when your company is compromised.
Thirdly, allocating individuals within your organization to support you during such incidents is imperative. This is not the time to be a hero; drawing on the support of your management team to communicate with internal staff and external sources is critical. Typically, personnel from HR, Finance, and Operations would be involved, working with the internal team, breach counsel, and forensic firm.
Lastly, it is essential to have a well-defined incident response plan in place, test it annually, and keep it up to date.
While these measures may not completely resolve all your issues, they are instrumental in maintaining control of the situation and facilitating a smoother path forward.