Spooky Stats

Cybersecurity might be the last thing on your mind as you are picking out costumes and candy, but cybercriminals are always lurking in the shadows, no matter what day it is. Here are some important statistics you should be aware of to help you better protect yourself and your loved ones from falling victim to cyberattacks this October (Cybersecurity Awareness Month)!

Hackers do not always give you an instant jump scare; they often remain hidden in the shadows. According to the Cost of a Data Breach Report 2021, it takes an average of 287 days to identify and contain a data breach.

A prime example of a hacker lurking unnoticed would be the SolarWinds ransomware attack. The IT and software management company that provides services to businesses and government agencies had a bad actor enter their IT infrastructure in September 2019 and went undiscovered until December 2020. Within the next year, more details were released about the situation. In January 2021, SolarWinds stated they would prioritize cybersecurity in the coming year, and they hired former Facebook and CISA security experts as consultants.

Ransomware is a form of malware (software intentionally designed to cause damage to a computer, server, client, or computer network) that encrypts a victim’s files, and an attacker demands ransom from the victim in order to regain access to their data. According to The State of Ransomware 2021 report , the average cost of ransomware recovery is $1.85 million.

“[Ransomware has] really changed the face of cybersecurity over the last couple years,” Director of Cyber Security Operations Christopher Houseknecht said. “We see it all the time in the news.”

Research from the Cybersecurity and Infrastructure Security Agency (CISA) found that hackers will most commonly execute ransomware attacks through email phishing, Remote Desk Protocol (RDP) vulnerabilities, and software vulnerabilities. Email phishing is when an attacker tricks a user into revealing confidential information using false pretenses, often disguised as being from a person or business the receiver is familiar with. But underneath that familiar face is a cybercriminal waiting to steal your precious personal information.

According to the 2021 Business Email Compromise Report, the most common display names are company name (68%), individual’s name (66%), and a boss or manager’s name (53%). According CSO magazine, more than 80% of cyberattacks involve phishing.

“I received an email from ‘Emil Sayegh’, the CEO of Ntirety, asking me to buy him gift cards.”

No one is safe from these attacks. Just a few weeks after being hired, Ntirety Marketing Specialist Kori Ortiz almost fell victim to a phishing scam , but fortunately had the cybersecurity instincts to question the messages.

“I received an email from ‘Emil Sayegh’, the CEO of Ntirety, asking me to buy him gift cards,” Ortiz said. “I was confused as to why he would ask me this; which was the first red flag. Always trust your gut. If something feels like it’s not right, then it probably isn’t.”

In 2020, a record 86% of organizations were hit by a successful cyberattack, as stated in the  2021 Cyberthreat Defense Report. This is an alarmingly high percentage of people who have had their data snatched from them. There’s no trick here – we must all do our part to protect data. Everyday best practices are the first step, including not sharing passwords, creating strong passwords, and using caution when opening unfamiliar emails and links.

Cybercriminals are always disguising themselves to fool users into thinking they are safe to go about their usual business. With better caution and the help of cybersecurity professionals, these cybercriminals will receive more tricks than treats.

Our Cybersecurity Playbook explains the Five Aspects of Compliant Cybersecurity and gives you a chance to test your business’s cybersecurity posture against these five core components. Download it today and schedule an assessment with us today to learn more about ways that you can prevent potential threats.

What is Cybersecurity?

This question stumps the average person. How does one have a secure cyber-environment? What is going on in computers and IT systems that keep away the hackers?

Cybersecurity according to Merriam Webster is “measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack.” These measures are administered by people, processes, and technology. The people part of cybersecurity are typically an organization’s Information Technology (IT) team who create the processes necessary to provide instruction for identifying and protecting against potential threats.

Ntirety Director of Cyber Security Operations Christopher Houseknecht considers himself a “computer geek” and has been interested in the operation and evolution of the cyber world for the last 25 years growing up with it and today working for our cybersecurity company, Ntirety.

“Everything from what kind of business I conduct on my phone, private, or business related, as well as the kind of things my children do, [cybersecurity] impacts me throughout every aspect of my life,” Houseknecht says.

Houseknecht as well as Chief Technology Officer (CTO) and SVP Development and Engineering Joshua Henderson both described cybersecurity as being in “layers.” Houseknecht says these layers are made up of components such as encryption, antivirus, endpoint detection response capabilities, and separation from the network or internet. Cybersecurity is not one singular layer of protection; there are numerous layers needed to fully protect precious data.

It is always important to have a backup plan. If the first line of defense falls through, your backup plan saves you from scrambling to assess how to handle a situation before it is too late. Similarly, cybersecurity must exist in “layers” so if the bad guys somehow find their way through the first layer, precious data is not lost and stolen.

Product Manager Dave Considine also emphasizes the importance of layered security. Considine describes this as giving someone access to a resource, but limiting what they can do within it. He explains that not everyone in a company should be able to access every resource.

Henderson describes cybersecurity as making sure data is safe and available, up and running for the people who need to and are meant to access it. It is the effort from the people, technology, and processes to keep the cybercriminals out. Houseknecht explains further that technology can only do so much; it is important to have a team of people and processes in place to guide the technology to do what it needs to do.

“[Hackers] don’t care whether you’re just an average Joe using computers to play video games or if you’re running a cybersecurity company.”

CEO Emil Sayegh emphasizes how important it is for businesses to have a comprehensive security plan and a partner operating 24/7 to protect themselves and their clients. He explains that one aspect of cyber protection will not defend against all possible cyber attacks. Phishing, malware, DDoS attacks and more require different solutions.

Handling cybersecurity internally as a business may seem like the easier and cheaper option, but there are so many products that must be invested in and many people constantly monitoring and operating the technology. In the long run, off-the-shelf security products can cost more as they keep piling on as the threats become more complicated and hackers become more sophisticated, not to mention the cost of hiring or training employees to tackle these evolving risks.

“That’s where someone like Ntirety has a really beneficial solution to most customers and companies out there,” Henderson says. “The average company is not going to really want to operate or find the staffing to do it the right way.”

While it is important to bring on a team of qualified individuals to help maintain the safety of normal IT-related business operations, it is crucial to abide by cybersecurity best practices every day on your own. Henderson and Houseknecht both mentioned the importance of having good cyber-hygiene. Cyber-hygiene is how someone presents themselves in the cyber-world. This includes practices such as not sharing passwords, not clicking suspicious links, using two-factor authentication, or not plugging in a USB that you are unsure of where it was from.

Houseknecht also expressed the importance of having resiliency in cyber-matters.

“Never assume it won’t happen to you,” Houseknecht warns. “[Hackers] don’t care whether you’re just an average Joe using computers to play video games or if you’re running a cybersecurity company.”

The recent cyberattack on IT software and management company SolarWinds, is an unfortunate example of a cybersecurity business that was hacked and faced disastrous consequences. The company works with businesses and government agencies, but it’s not just larger companies that need to worry.

So much of our lives exist online now — medical records, academic information, financial details and more are stored online. In addition to this, social media has become a way of connecting with family, friends, and businesses all around the world. There will always be people who will misuse resources and seek to steal private information for personal gain. But that’s where cybersecurity comes in to provide peace of mind through proactively keeping the bad guys out and keeping important data in.

The cyber-world has moved from a “perimeter” to a “distributed mindset,” according to Considine.

The “perimeter” concept of cybersecurity is an outdated approach, sometimes referred to as the “castle mentality,” and is defined as the idea that securing the perimeter of an IT environment (i.e. building castle walls and digging a moat) is enough. It is outdated because it ignores activity within the environment that may be malicious, and it is becoming more and more difficult to secure the perimeter of more advanced cloud and hybrid environments.

“Trust your instincts.”

Cloud services, capability, and computing have eliminated the perimeter mindset. People distributed across the world are able to access the services from anywhere thanks to cloud computing. With this greater access to resources, there is an even greater need for cybersecurity.

In addition to the cyber-world’s shift to distributed mindset, remote work became increasingly more common with cloud computing resources increasing, but especially after the start of the Covid-19 pandemic – pushing a huge portion of workforces to work from home and introducing a whole new slew of cyber-risks. More workspaces have adapted fully remote or partially remote work schedules and your security posture needs to adapt as well.

The effects of data theft can impact not only personal data and the terrible personal consequences that follow, but large businesses and landmarks, a recent example being the Colonial Pipeline. The oil pipeline system that stretches from Texas to New York is responsible for carrying gasoline and jet fuel to the southeastern portion of the United States, and it uses computerized equipment to help manage it. The ransomware attack hindered operations so much to the point that the President of the United States declared a state of emergency. The company ended up paying millions in ransom.

With computers making up so much of our daily social and business functions, cybersecurity must be at the forefront of our minds. Cybersecurity starts with you.

Sayegh urges anyone utilizing a computer or IT environment to be alert and aware to potential threats. Many times, cyber criminals express urgency in getting personal details from you, but Sayegh expresses the importance of always double checking sources, and never being too quick to give out information.
“Trust your instincts,” Sayegh said. “Anything that smells fishy [or is] too good to be true, don’t do it.”