In this digital age, technology is a double-edged sword in cybersecurity. Strong and sophisticated tools and systems are needed to protect sensitive information. However, overreliance on technology opens multiple risks.
We explore the pitfalls of an overreliance on technology in cybersecurity strategies by looking at previous incidents and the strategy gaps that were exploited and provides insights into how organisations can avoid falling into the same pitfalls.
Among the very first risks that come with dependence on technology is a false sense of security. Too often, companies invest millions of shillings in state-of-the-art tools for cybersecurity, if these technologies will help in safeguarding their data. However, this puts many firms in a state of complacency, overlooking human vigilance and other proactive measures.
One such example can be drawn from the Equifax data breach that hit in 2017. Equifax, one of the largest credit reporting agencies, suffered from a massive data breach whereby personal information belonging to nearly 147 million individuals was exposed.
The vulnerability in the Apache Struts web application framework that was exploited by the attackers had been recently patched through a vendor update. However, Equifax had not installed this update as of the attack.
Even though it was armed with the technology that would have stopped it, the firm's reliance on past systems and not updating them in a timely fashion paved the way for one of the largest data breaches in history. This incident brings home the criticality associated with patch management and the dangers of 'techno-optimism.'
No single technology is infallible. Even advanced cybersecurity systems can be vulnerable, offering opportunities for cybercriminals. Defenders must be right always, attackers only once.
In Organisations in the Consumer, Industrial Products, and Services (CIPS) sector, there's a similar risk in overreliance on industrial control systems, supply chain software, or automated tools.
A striking example is the 2013 Target breach, where attackers accessed internal systems via a third-party HVAC contractor.
Through this system, they obtained credit card data of over 40 million customers. This case shows the risks of third-party vendor compromise and depending solely on threat detection systems for breach identification.
The first line of defence against cyber threats is employees. Being over reliant on technology can make one negligent about proper training and awareness among staff, making the occurrence of human error more probable.
In 2014, hackers belonging to the Guardians of Peace cyber group infiltrated Sony Pictures, compromising sensitive employee data, tens of thousands of emails, and several unreleased movies.
The attackers used spear-phishing emails that were more of human exploitation than technological to hack into Sony's network. This establishes the case for how a rigorous training programme is supposed to exist hand in hand with a strong security culture.
To eliminate problems associated with technological dependency, it is important to include talent and experienced consultation in cybersecurity strategies. Experienced consultation provides valuable insight and experience, which no technology can perform.
For instance, Cisco developed a predictive analytics tool that utilised machine learning to assess patterns of network traffic to identify anomalies that could be indicative of threats.
This proactive measure has allowed Cisco to reduce the incidence of successful cyber-attacks to near zero while improving operational efficiency.
The success of such tools depends on skilled professionals developing and managing them. The ability to retain and compensate talent is important in driving change towards innovation in cybersecurity.
Retention of skilled professionals able to design and administer these systems and processes is key in sustaining the defences against cyber threats.
CIPS sector should take note of the following to avoid falling prey to technological dependence:
Diversify technology solutions: An organisation must avoid falling into the trap of dependency upon any one technology or vendor. Apply duplication so that in case of failure of one, others can seamlessly step in for support.
Hire and retain skilled cybersecurity professionals - invest in their talent. Offer them competitive compensation and a great work environment to make sure that the best are retained.
Provide continuous best-practice training on cybersecurity to employees. Let them know about new threats and how to act in case of an attack.
Regular security audits should be carried out, and systems should always be kept updated with the latest patches and updates.
By fully acknowledging the risks associated with technological dependency, therefore, having a balanced approach that involves human innovation, continual improvement, and a holistic strategy that brings together people, technology, and process will ensure better protection on the part of an organisation against these ever-evolving threats.
The writers are a Partner and a Senior Associate in PwC's Consulting & Risk Services.