What are the threats to information security?
When they hear 'threats to information security', most people immediately think of cyberattacks, organized crime, and espionage. And it's true: criminal attacks – in particular on digital systems – pose a serious threat with far-reaching consequences.
But you shouldn't think only of bad actors. Even a company's employees can represent a threat to information security, intentionally or by accident. Further threats include defective systems and processes and physical threats through natural disasters.
Key points:
- Information security can be compromised through natural forces, a company's own employees, systems, processes, and cyber crime.
- When hackers strike, it's usually to blackmail companies into paying a ransom or simply steal data necessary to launch further hacks.
- Social engineering, insecure passwords, remote working, shadow IT, and insecure cloud solutions are examples of the most common vulnerabilities.
Physical threats
In March of 2021, a fire broke out in a five-story OVH data centre in Strasbourg. 12,000 servers went up in flames, more than 100,000 websites across the world crashed, and data lost in the blaze will never be recovered. The economic consequences were devastating.
Many of OVH's customers had neglected to ensure their data was recoverable. In short, there were no copies, and the companies were at a loss.
This is why one task of information security is business continuity management. Companies must remain operational, even if data stored in a data center is lost—a risk that any good risk analysis should discover. When choosing a data center or a cloud solution that processes business-critical information, one crucial factor in terms of information security is a high uptime guarantee.
Threats from employees
Negligence, poor training, and lack of awareness among employees are among the most frequently mentioned factors that facilitate cyber crime. Companies must ensure that staff are aware of cyber risks. The UK cyber security breaches survey states that phishing attacks made up 80% of all cyber-attacks in 2023. Most cyber actors use social engineering techniques to gain access to the target organization's networks. Therefore, training is crucial to preventing phishing attacks and avoiding vulnerabilities.
Cases of data theft by (former) employees rarely make it into the public awareness. Typically, a company is most vulnerable to employee data theft during the onboarding and offboarding processes. New employees with extensive access to sensitive company data (e.g., Heads of IT or higher management) should be subjected to background checks. Employees should always hand back any information assets in their possession when they leave a company.
Often, however, not even intentional data theft makes employees a threat to information security. Instead, it is the 'human factor' itself that poses the greatest vulnerability, particularly in cases of insufficient training resulting in a lack of awareness and staff taking risky shortcuts to meet deadlines.
Threats due to systems and processes
Unless the systems for storing and processing data are fit for purpose, the objectives of information security will always remain out of reach. Take the objective of integrity, for example: to ensure the integrity of a company's data, its IT systems must make it impossible for data to be manipulated without being noticed.
Suppose your company uses a tool that doesn't prevent changing the number of an outgoing invoice after it's already been submitted. In that case, this might result in incoming payments being allocated to the wrong account.
Even self-programmed solutions can be prone to error when data is mistakenly overwritten, duplicated, or otherwise modified. When that happens, your data no longer meets the integrity requirement. So, your IT tools have to function effectively, alone and alongside other systems.
Threats due to cyber crime
The global average cost of a data breach in 2023 was 4.45 million dollars—a 15% increase over three years. One thing is certain: Cyber crime is on the rise and gets more expensive by the day. It primarily affects companies by stealing sensitive data, spying on digital communication, and digital sabotage.
30% of all businesses in the UK have identified data breaches or attacks in the last 12 months, according to The Cyber Security Breaches Survey.
Phishing attacks are considered the most disruptive type of attack, but impersonation also has a high potential for damage. Consequences include website disruption, temporary loss of access to files or networks, corrupted systems, and stolen data.
The easiest way and first step to protect against cyber crime is to train employees, carry out regular security updates and store data in a secure location. This is also an information security task: the acquisition, development and maintenance of secure systems.
What hackers want
Losing information such as customer or corporate data through ransomware attacks, for example, can weaken a company for hours, days, or even weeks, causing damage both to its competitiveness and its reputation.
Most cyberattacks aim to pressure victims into paying a ransom for stolen or encrypted data sets. Hackers who steal email login data can use it to launch additional phishing attacks and steal sensitive information from the victim's colleagues and business partners. In another increasingly popular strategy known as 'crypto-jacking', the criminal hijacks an unwitting victim's computing power, mining cryptocurrency for personal gain.