The Frightening Rise of Cyber Attacks that Cross Organizational Boundaries

The Frightening Rise of Cyber Attacks that Cross Organizational Boundaries

If you’re looking for a scary story, put down the H.P. Lovecraft novel and pick up the 11th edition of The Global Risks Report 2016, courtesy of the World Economic Forum.

The cyber attack threat takes center stage in North America, standing out as the most likely risk by far. The report reflects the perceptions of nearly 750 experts and decision-makers in the World Economic Forum’s constituencies surveyed in late 2015.

The risks perceived as the most likely to beset various regions this year include:

  • Social volatility
  • Interstate conflicts
  • Economic instability

The truth is that governments, businesses, organizations, and citizens in most parts of the world face pretty much the same dangers from cyber threats as their North American counterparts.

The Grant Thornton International Business Report 2015, for example, shows that cyber attacks are estimated to have cost Asia Pacific businesses $81 billion in the preceding 12 months, while firms in both the EU and North America saw revenue losses just over $60 billion.

Cascading Effects

Cyber dependency is a global trend in a world where digital businesses reside in increasingly connected, smarter and more automated environments.

That means that an entity’s risk is increasingly tied to that of other entities, making it harder for any single party to fully protect itself. This raises “the odds of a cyber attack with potential cascading effects across the cyber ecosystem,” the report states.

Consider also the impact of other risks that can lend more fuel to the cyber-attack flames. “Chronic and resurgent violence, conflicts, and economic and social volatility will remain prominent features of the current and future reality,” the report notes. Such conditions only make it easier for bad actors to gain new recruits to conduct cyber-attacks, be they criminal or terrorist in nature.

Raise Your Defenses

The World Economic Forum’s 2015 Executive Opinion Survey, out of 140 global economies, 18 put cyber-attacks on their list of top three risks and eight consider them a risk of highest concern for doing business. These are Estonia, Germany, Japan, Malaysia, the Netherlands, Singapore, Switzerland, and the United States.

Growing awareness is a good thing, but improved readiness to face these attacks is even better. If there’s a happy ending to this scare story, it is that defenses can be improved, although organizations must first fully grasp the extent of their cyber-security risks and the investments required to better manage those risks and build resilience.

The Global Risks report recommends actions that businesses can take to better defend themselves, such as:

  • Fostering greater cooperation throughout their value chains
  • Sharing cyber breach data with law enforcement
  • Building up security for under-protected areas like machine-to-machine connections

It’s unlikely that every organization can prevent every cyber attack, but companies should emphasize methods to identify and effectively mitigate them by streamlining mechanisms for:

  • Early detection
  • Response and recovery
  • Rapid mitigation
  • Better manage the consequences

That sounds like a good plan to us, and hopefully it’s one that organizations of every stripe will waste no time putting into action.

About David Venable

VP, Cybersecurity, Masergy
David Venable, Vice President of Cyber Security at Masergy Communications, has over 15 years experience in information security, with expertise in cryptography, network and application security, vulnerability assessments, penetration testing, and compliance. David is a former intelligence collector with the National Security Agency, with extensive experience in Computer Network Exploitation, Information Operations, and Digital Network Intelligence. He also served as adjunct faculty at the National Cryptologic School.

We use cookies to improve your web experience, better understand how our site is used, and personalize advertising. By continuing to use this site you are giving us your consent to do this. Read more and make cookie choices by visiting our privacy policy.