Wednesday, 24th April 2019
Logo

Semior executives are the weakest link

New report sets out awareness of vulnerability as a major problem amongst senior executives.

A new report from The Bunker, the UK’s most secure cloud, managed services and data centre provider, has highlighted that senior executives are still often the weakest link in the corporate cybersecurity chain and that cybercriminals target this vulnerability to commit serious data breaches.


According to the white paper, Are You the Weakest Link? How Senior Executives Can Avoid Breaking the Cybersecurity Chain, many senior executives ignore the threat from hackers and cybercriminals and often feel that security policies in their respective organisations do not apply to their unique position. However, in reality, their often privileged access to company information make their personal accounts extremely valuable to exploit and heightens the need for extra care. In addition to highlighting the common mistakes made by senior executives, the white paper lists the top security areas that should be prioritised to ensure cybersecurity resilience.

Phil Bindley, Managing Director, The Bunker said:

“In tackling and mitigating the security threat, a critical issue is a failure to securely back up email data. Many businesses assume that a cloud-hosted service, such as Office 365, comes with automatic back-up and security provisions. Unfortunately, it does not.

“Unless stated and agreed, vendors do not guarantee complete system security or data backup as standard, so organisations need to be careful and have a full understanding of the SLAs in place. We advise people to replace the word ‘cloud’ with ‘someone else’s computer’, to get a better perspective of the risks that need to be mitigated when deploying a cloud-based service”.

All employees -especially those at the top of the corporate ladder- need to realise that cybercriminals use social engineering, email phishing and malware to access personal accounts, and C-level staff especially need to avoid becoming the weakest link in the cybersecurity chain by adhering to regularly updated, company-wide security policies regarding data sharing and backup.

He continued: “Cloud offers a highly secure and cost-effective platform to defend against threats and malicious attacks. However, data stored in a public cloud typically resides outside the protection of an organisation’s internal systems and many vendors do not automatically back-up data or implement security and privacy controls as standard, making it a perfect entry-point for cybercriminals to exploit.

“Reviewing corporate policies, with a focus on people, premises, processes, systems and suppliers will provide valuable insights into which areas to improve, and by championing a ‘security first’ corporate culture, organisations and their senior executives will be well positioned to avoid the high financial costs, reputational damage and unexpected downtime that could result from a cyberattack or data breach,” he concluded.

Keysight has published the third annual Security Report from Ixia, its cybersecurity and visibility...
BakerHostetler’s privacy and data protection team has released its 2019 Data Security Incident Respo...
With Gemalto, Thales will cover the entire critical decision chain in a digital world, from data gen...
New CloudFlow solution enables organizations to seamlessly manage security control layers across all...
Egress has published the results of its first Insider Data Breach survey, examining the root causes...
LogRhythm’s platform to optimise and simplify security workflows at UK education provider.
The clock starts ticking immediately following a cybersecurity incident with the first 24 hours vita...
The compliance report feature helps companies to easily see what data polices and security options a...