With concerns that the Iranian government is planning to carry out cyber-attacks on major private organisations and critical U.S. infrastructure, the pressure is on these sectors to prepare ahead before it’s too late.

BlackBerry’s Head of Cybersecurity Consulting, Barry Dempster, comments on how businesses can prepare ahead if reports are correct that cyber-attacks are going to happen.

 

Barrie Dempster, Head of Cybersecurity Consulting, BlackBerry:

Maintaining a robust cybersecurity program remains the best course of action to mitigate risk. To strengthen defenses, organisations should “go hack themselves”. Bringing ethical hackers into the business and letting them loose to sniff out vulnerabilities and simulate a real-world cyber-attack uncovers many gaps in security that are missed by routine checks. Ethical hackers use the same tools, techniques and methodologies as a malicious hacker and some might surprise businesses.

Security consultants and IT need to partner with their business leaders to assess the risk and needs within the cybersecurity program and address issues identified at the source. This can often be process improvements or security controls applied to an organisation’s supply chain to prevent weak or vulnerable systems being implemented in the first place.

This invaluable insight into where your business’ risk lies, offer enterprises a roadmap to develop a cybersecurity plan that is effective and appropriate for the organisation, its technologies and processes. The businesses who develop and maintain comprehensive incident response plans will be best placed in the event of the potential breach, while those without may have no choice but to resort to panic.

This transmission (including any attachments) may contain confidential information, privileged material (including material protected by the solicitor-client or other applicable privileges), or constitute non-public information. Any use of this information by anyone other than the intended recipient is prohibited. If you have received this transmission in error, please immediately reply to the sender and delete this information from your system. Use, dissemination, distribution, or reproduction of this transmission by unintended recipients is not authorized and may be unlawful.