Understanding Each Link of the Cyberattack Impact Chain

It's often difficult to fully appreciate the impact of a successful cyberattack.
Other consequences aren't so obvious - from a loss of customer trust and potential business to stolen data that may surface as part of another cyberattack years later.
These are all elements of a cyberattack's impact chain, which starts with the initial breach and frequently has no clear endpoint.
Cyberattacks have an array of potential causes and effects.
Whether an employee falls for a phishing email or hackers crack a password, a single vulnerability can cause a devastating cyberattack that severely disrupts operations and customer experiences.
By explaining the impact chain of potential cyberattacks with cybersecurity awareness training, CISOs and other security leaders will help employees understand what's at risk and how important they are to keeping the organization safe.
The Wide-Ranging Consequences of Cyberattacks In September, MGM Resorts announced that it had been targeted by a cyberattack that knocked out websites for many of its properties, shut down its booking system and disrupted many customer-facing operations - from digital room keys to ATMs and slot machines.
This is yet another powerful reminder that cyberattacks can have a crippling impact on everything from customer experiences and internal processes to the bottom line.
IBM reports that employee training is among the most effective ways to reduce the financial impact of a cyberattack - more so than cybersecurity insurance, threat intelligence or even encryption.
Employees pose significant risks at every link of the cyberattack impact chain - just as training reduces the total costs of data breaches, a security skills shortage is a major factor in increasing these costs.
Building these skills requires organization-wide training, which adapts to changing circumstances, focuses on each employee's unique psychological profile, and maintains engagement with highly relevant and entertaining content.
Understanding the Entire Cyberattack Impact Chain There are two ways to assess the cyberattack impact chain: Causes and effects.
To build stakeholder support for CSAT, CISOs have to show the board how much damage cyberattacks are capable of causing.
CSAT content must inform employees about the effects of cyberattacks to help them understand the risks companies face.
It's even more important for company leaders and employees to have a firm grasp on the causes of cyberattacks.
Cybercriminals are experts at exploiting employees' psychological vulnerabilities - particularly fear, obedience, craving, opportunity, sociableness, urgency and curiosity - to steal money and credentials, break into secure systems and launch cyberattacks.
Psychological susceptibilities like these are critical links in the cyberattack impact chain, so they must be addressed with consistent and effective CSAT. It isn't enough for CISOs and other company leaders to inform employees about the most urgent cyberthreats they face and hope for the best.
Each employee's specific behavioral patterns must be addressed; content should be clearly connected to employees' individual roles, the tactics cybercriminals deploy and the most effective defense mechanisms; and companies should consistently track employee performance and conduct organization-wide assessments of their cybersecurity readiness.
When companies focus on the full cyberattack impact chain, they will have a better understanding of why cyberattacks succeed and what risks they pose.
While this awareness helps CISOs, company leaders, and employees prepare for the potential aftermath of a cyberattack, it serves a more fundamental purpose: It stops cyberattacks from succeeding in the first place.


This Cyber News was published on securityboulevard.com. Publication date: Wed, 06 Dec 2023 14:43:06 +0000


Cyber News related to Understanding Each Link of the Cyberattack Impact Chain

Understanding Each Link of the Cyberattack Impact Chain - It's often difficult to fully appreciate the impact of a successful cyberattack. Other consequences aren't so obvious - from a loss of customer trust and potential business to stolen data that may surface as part of another cyberattack years later. ...
1 year ago Securityboulevard.com
Software Supply Chain Security Checklist - In the ever-evolving landscape of digital innovation, the integrity of software supply chains has become a pivotal cornerstone for organizational security. Software supply chain security is not just about protecting code - it's about safeguarding the ...
10 months ago Feeds.dzone.com
How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
2 months ago Aws.amazon.com
New "MITRE ATT&CK-like" framework outlines software supply chain attack TTPs - A new open framework seeks to outline a comprehensive and actionable way for businesses and security teams to understand attacker behaviors and techniques specifically impacting the software supply chain. The Open Software Supply Chain Attack ...
1 year ago Csoonline.com
Cyberattack on health services provider impacts 5 Canadian hospitals - A cyberattack on shared service provider TransForm has impacted operations in five hospitals in Ontario, Canada, impacting patient care and causing appointments to be rescheduled. TransForm is a not-for-profit, shared service organization founded by ...
1 year ago Bleepingcomputer.com
Purpose. Partnership. Impact. - Last month, Cisco announced we exceeded our ten-year goal to positively impact one billion lives - more than one year early. The announcement was just the first step in our commitment to share the stories within our journey to one billion lives, and ...
10 months ago Feedpress.me
CISA Announces Renewal of the Information and Communications Technology Supply Chain Risk Management Task Force - The Task Force, chaired by CISA's National Risk Management Center and the Information Technology and Communications Sector Coordinating Councils, is a public-private partnership composed of a diverse range of representatives from public and private ...
10 months ago Cisa.gov
Nissan is investigating cyberattack and potential data breach - Japanese car maker Nissan is investigating a cyberattack that targeted its systems in Australia and New Zealand, which may have let hackers access personal information. Details of the attack have not been published but the company informed customers ...
1 year ago Bleepingcomputer.com
Kwik Trip finally confirms cyberattack was behind ongoing outage - Two weeks into an ongoing IT outage, Kwik Trip finally confirmed that it's investigating a cyberattack impacting the convenience store chain's internal network since October 9. This outage has been causing widespread IT system disruptions and is ...
1 year ago Bleepingcomputer.com
Mortgage giant Mr. Cooper hit by cyberattack impacting IT systems - U.S. mortgage lending giant Mr. Cooper was breached in a cyberattack that caused the company to shut down IT systems, including access to their online payment portal. Mr. Cooper is a mortgage lending company based out of Dallas, Texas, that employs ...
1 year ago Bleepingcomputer.com
Memorial University recovers from cyberattack, delays semester start - The Memorial University of Newfoundland continues to deal with the effects of a cyberattack that occurred in late December and postponed the start of classes in one campus. MUN is the largest public university in Atlantic Canada, with an academic and ...
11 months ago Bleepingcomputer.com
Long Beach, California turns off IT systems after cyberattack - The Californian City of Long Beach is warning that they suffered a cyberattack on Tuesday that has led them to shut down portions of their IT network to prevent the attack's spread. Long Beach is the home to approximately 460,000 people and is the ...
1 year ago Bleepingcomputer.com
American Family Insurance confirms cyberattack is behind IT outages - Insurance giant American Family Insurance has confirmed it suffered a cyberattack and shut down portions of its IT systems after customers reported website outages all week. American Family Insurance is an insurance company focusing on commercial and ...
1 year ago Bleepingcomputer.com
The Role of XBOMs in Supporting Cybersecurity - Everyone in an organization plays an important role in ensuring that their products and services are delivered safely to their customers. Whether you're producing software or hardware, part of the manufacturing process, or anywhere in the software ...
11 months ago Securityboulevard.com
Data Theorem releases API Attack Path Visualization for enhanced API and Software supply chain security - Data Theorem has introduced the API Attack Path Visualization capabilities for the protection of APIs and the software supply chain. This latest enhancement of its API Secure solution empowers organizations with a comprehensive understanding of the ...
1 year ago Helpnetsecurity.com
US mortgage lender loanDepot confirms ransomware attack - Leading U.S. mortgage lender loanDepot confirmed today that a cyber incident disclosed over the weekend was a ransomware attack that led to data encryption. LoanDepot is a major nonbank mortgage lender in the United States, with over $140 billion in ...
11 months ago Bleepingcomputer.com
SW Ontario hospitals confirm patient data compromised in cyberattack - As the fallout from last week's cyberattack against five southwestern Ontario hospitals continues to spread, the organizations confirmed Tuesday that patient information was stolen and they now fear the blackmailers might publish it online. TransForm ...
1 year ago Windsorstar.com
Ace Hardware says 1,202 devices were hit during cyberattack - Ace Hardware confirmed that a cyberattack is preventing local stores and customers from placing orders as the company works to restore 196 servers. Ace Hardware is a hardware store retailer-owned cooperative that operates 17 distribution centers and ...
1 year ago Bleepingcomputer.com
Guardians of Finance: loanDepot Confronts Alleged Ransomware Offensive - Among the leading lenders in the United States, loanDepot has confirmed that the cyber incident it announced over the weekend was a ransomware attack that encrypted data. In the United States, LoanDepot is one of the biggest nonbank mortgage lenders. ...
11 months ago Cysecurity.news
Protecting credentials against social engineering: Cyberattack Series - Our story begins with a customer whose help desk unwittingly assisted a threat actor posing as a credentialed employee. In this fourth report in our ongoing Cyberattack Series, we look at the steps taken to discover, understand, and respond to a ...
1 year ago Microsoft.com
Securing the Supply Chain - Before a supply chain can be improved, it must be understood. Rather than attacking one target, it is more effective to manipulate the supply chain to gain access to multiple targets. The 2013 Target breach was an example of a supply chain attack, as ...
1 year ago Securityweek.com
UK, ROK sound alarm over North Korean supply chain attacks The Register - The national cybersecurity organizations of the UK and the Republic of Korea have issued a joint advisory warning of an increased volume and sophistication of North Korean software supply chain attacks. "In an increasingly digital and interconnected ...
1 year ago Theregister.com
How AI could bolster software supply chain security - SAN FRANCISCO - While supply chain risks remain prevalent across enterprises of all sizes, Synopsys' Tim Mackey said AI tools will enable developers more than attackers - at least for now. Supply chain security was a significant topic that speakers ...
6 months ago Techtarget.com
ACM will no longer cross sign certificates with Starfield Class 2 starting August 2024 - AWS Certificate Manager is a managed service that you can use to provision, manage, and deploy public and private TLS certificates for use with Elastic Load Balancing, Amazon CloudFront, Amazon API Gateway, and other integrated AWS services. Starting ...
5 months ago Aws.amazon.com
West Virginia students returning to class after days-long outage following cyberattack - Nearly 20,000 students in West Virginia were forced to miss classes on Monday due to a cyberattack that crippled their school. Berkeley County Schools said on Friday it was experiencing an internet and phone outage on Friday and spent the weekend ...
1 year ago Therecord.media

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)