Is your software an open goal for cyber attacks?
For our increasingly data-driven and digitally-reliant businesses, cyber security is a major and growing threat. From Heartbleed to eBay, every week appears to bring a new story about cyber threats and the risks to online security.
In the past year alone, 93 per cent of large corporations and 87 per cent of small businesses reported a cyber breach, according to government figures, with each breach estimated to cost up to £850,000, not to mention damage to the organisation’s reputation. Organisations are beginning to take steps to protect themselves and improve their resilience to cyber attacks, but many are building flawed or incomplete defences.
Sir Iain Lobban, Director of GCHQ, stated that a staggering 80 per cent of cyber attacks could be stopped through basic information risk management, but experience suggests that few organisations get it right. IT systems that are not locked down, hardened or patched will be particularly vulnerable to an easily preventable attack. Employees’ use of ICT also brings risks to business, so it is critical for all staff to be aware of their personal security responsibilities.
Security training and awareness can increase levels of expertise and knowledge and foster a security-conscious culture. These actions, however, will not eliminate cyber risks. They are a physical and reactive approach to security but companies also need to look at more proactive measures such as securing applications at the software code level.
With the rise of open-source software, code-level security is becoming an increasingly important issue. More and more companies are choosing to write their own code in-house, utilising open-source software, and while this can bring cost savings and greater application flexibility, it can also introduce significant security risks. Building security considerations into application design at the outset – by reducing the potential attack surface, creating trust zones and restricting data access, for instance – can all minimise the application’s vulnerability to cyber threats. These built-in defences can be more effective than later bolt-ons.
To achieve this, development teams need to understand potential security threats and how to create applications that are resilient to attack. However, expert software developers are not necessarily experts in software security. Training can bridge the gap and teach developers the key principles of secure-by-design coding. MASS works closely with organisations to assess their online security and advise IT teams on security threats and practices, ranging from social hacking and spearphishing, to Zero Day vulnerabilities, malware and Trojans as well as employees’ own devices and behaviours. Training programmes like ThreadStrong, offered exclusively by MASS in the UK, provide advanced security-focused e-learning for professional developers, to help them create applications that are inherently more resilient to attack.
Effective cyber security depends on holistic defences. While many organisations are rapidly improving their physical infrastructure and security policies, code-level security is often overlooked, creating a potentially costly vulnerability.
Andy Lipinski is Secure Information Systems Director at MASS, a specialist IT security provider and part of the Cohort Group. MASS offers free online health checks to help companies benchmark their cyber security capabilities and provides advisory and training services to improve resilience.
|To start a discussion topic about this article, please log in or register.|
"The benefits of footing the bill to put a British astronaut in space amount to more than just a restorative for national pride"
- Most new diesel cars have high emissions, study finds
- Automotive cyber-security concerns 'could shape future car design'
- ‘Plug and play’ biomass technology could save power station
- Text message tweak to appointment alerts could save NHS millions
- EU mobile roaming charges to be scrapped
- UK transport infrastructure investment on the rise