Technology such as cloud, internet of things (IoT) and automation are helping companies to digitally transform, but they also add security risks. What can firms do? And what are the top security risks in digital transformation?
Companies are turning to digitisation to stay ahead of their competitors. Yet this often-major shift can see firms implementing new technologies without first ensuring proper safeguards are in place.
Digital transformation is not a choice; it is a process that all firms must go through. But as companies transform their business by taking advantage of technologies such as mobility, internet of things (IoT) and cloud, there are security risks in digital transformation to consider.
It is clear the move to digitally-based services widens the attack surface substantially. For example, the IoT trend increases business efficiency, but it also adds billions of unsecured devices to the network.
At the same time, cloud is seeing firms turning to third-party providers for a range of services. But without proper due diligence, third parties can form the basis of major cyber-attacks.
Take, for example, the 2018 Ticketmaster breach which saw card skimmers Magecart exploit a weakness in a supplier’s code.
“Companies are turning to digitisation to stay ahead of their competitors. Yet this often-major shift can see firms implementing new technologies without first ensuring proper safeguards are in place,” says Emma Stevens, associate solicitor, Coffin Mew.
“Security of business and customer data is considered to be of paramount importance, but there is often a danger that the protection and ownership of this information can be overlooked when implementing new systems,” she says.
Digital transformation: Three top questions answered
What is digital transformation? How best to lead digital transformation? Why does digital transformation matter? We’re going to answer these all important questions for you
This can result in inadvertent problems, says Stevens – and in some cases, following the implementation of GDPR, “unexpected consequences”.
Changing outlook in the security risks in digital transformation
Technology including IoT creates a need to change your corporate security outlook, says Etienne Greeff, CTO and co-founder at SecureData. “There is no longer a traditional perimeter: instead it’s a disparate network of endpoints.”
Adding to this, many connected devices adopted within enterprises are not designed with security in mind. “Some IoT manufacturers might not have software patching processes and vulnerability management programmes in place at all,” Greeff warns. “Yet these endpoints are always on, can be connected to a corporate network, and become an open door through which attackers can infiltrate.”
To secure IoT Greeff advises firms to research their vendor’s policy on vulnerability disclosure and management. “The British Standards Institution has introduced a kitemark for IoT devices which includes enterprise and ‘enhanced security’ categories. This gives IT buyers the ability to spot which companies are keeping to these standards when manufacturing devices.”
Another technology often part of a firm’s digital transformation is artificial intelligence (AI) and its subset, machine learning. Machine learning can and should be employed to solve very specific problems, Greeff says. Therefore, when looking for a cyber security partner, don’t fall for the “machine learning cure-all trap”, he advises.
Of course, part of a company’s digital transformation incorporates new and agile ways of working dubbed “DevOps”. Among the benefits, this approach helps firms implement and deliver digital transformation programmes, says Darron Gibbard, chief technical security officer EMEA North at Qualys: “It helps developers put the software side together faster and get the results out to the IT operations team.”
However, he points out, problems can occur when teams collaborate without bringing security in at the start, in this way the security risks of digital transformation become clear.
In addition, firms should also be aware of their supply chain – and the risks that come with it. Ashley Hurst, partner at Osborne Clarke points out: “Businesses are increasingly partnering and sharing data with technology companies – for example, software-as-a-service (SaaS) platforms and cloud providers – which opens up further supply chain risks in relation to data and information security.”
The risk is compounded by the fact that most third-party tool providers don’t have enterprise-grade security systems, making them easy targets for supply chain attacks. “This most often results in user data theft”,” Pedro Fortuna, CTO and founder at Jscrambler says.
RPA and digital transformation: Blue Prism says it can help you sprint
We sat down with Blue Prism for some agile thinking. This is the first in a series of articles looking at how RPA and digital transformation need each other
Security risks in digital transformation: Examining security practices
In general, other simple steps can improve your security. Mark Hill, CIO at recruitment company Nelson Frank has experienced the security issues that can arise in digital transformation first-hand. He advises firms to take “a long, hard look at your security practices”.
He points out: “The big risk in digital transformation is, your attack vector is now much larger. Data is everywhere, and no longer hidden behind your firewalls.”
Focus slightly less on the ‘castle walls’— your data centre and its perimeter — and more on the ‘treasure in the chest’— your actual data
Greater access from more devices means companies need to focus on two key areas, Hill says. “Firstly, acknowledge that users are your biggest threat: they make mistakes, and they get duped by sophisticated scams. Educate to reduce your risk.
“Secondly, focus slightly less on the ‘castle walls’— your data centre and its perimeter — and more on the ‘treasure in the chest’— your actual data. Think about access management, data loss prevention (DLP), encryption, and strong authentication. Get all this right and you’ll be better off than most.”
Overall, firms undergoing digital transformation need to look at security in a different way, says Jason Hart, CTO of data protection at Gemalto. “You need to understand what your risks are. People might do penetration testing but for me that doesn’t equate to strong visibility and control around governance and security.”
What is digital transformation in business: Everything you need to know
Kicking off Information Age’s Digital Transformation month, we look at everything you need to know about what is digital transformation in business; the challenges, the technologies and above all, how to succeed
Hart advises companies as part of the transformation process to ensure data visibility in order to categorise it and control who has access. In addition, says Hart: “Let’s eradicate static passwords and replace with multi-factor authentication.”
Jason Hart
Meanwhile, according to Gibbard, third-party accounts should be audited. “And the organisations responsible for them have to meet your rules on security standards,” he says, adding: “This isn’t just best practice: The EU Update to General Data Protection Regulation (GDPR) states that any third party has to handle your customer information in a way that complies with security and data protection standards.”
However, at the same time, says Terry Storrar sales director at MCSA, firms need to ensure users have the tools they need to do their jobs. “From the start of taking on a project, examine how you manage the risk. Make sure everyone sings the same song, and you measure security in a uniform way, using the same processes.”
Taking this into account, Simon McCalla, CTO at Nominet says that when embracing new services, firms should ask: “What is the data policy; what is the risk; where is data being stored – and does this add to the risk of GDPR non-compliance?”
Simon McCalla
Meanwhile, George Gerchow, chief security officer at Sumo Logic advocates looking at “progressive ways of doing security”. For example, he advises the use of bug bounties. “Open the door to the hacking community to try and breach you. This helps you to better secure your code.”
At the same time, staff training is especially effective when including techniques such as gamification. “The biggest single mistake is to punish people who download malware or click on the wrong link,” McCalla, says. “If users start to benefit, it becomes something they look out for and forms part of the foundational culture.”
";jQuery("#BH_IA_MPU_RIGHT_MPU_1").insertAfter(jQuery(".single .post-story p:nth-of-type(5)"));//googletag.cmd.push(function() { googletag.display('BH_IA_MPU_INPAGE_MPU_1'); });}else {}});
FAQs
What are the security risks of digital transformation? ›
As organisations transform, they will use more cloud services, AI products, big data analytics, Internet of Things (IoT) devices and more. This in turn increases their exposure to cyber attackers who use the connectivity of these programs to access networks and exploit any vulnerabilities they can find.
What are the 4 key challenges of digital transformation? ›- A lack of in-house expertise. A key principle of digital transformation is the implementation of digital technologies. ...
- Poor employee uptake. ...
- Lack of planning and strategy. ...
- Limited budget.
- Never leave anything unattended in a public area, in a shared living space, or visible for potential intruders. ...
- Use an inconspicuous protective bag or case to carry your laptop and other devices. ...
- Install tracking software to help increase your chances of recovery.
- Ransomware. This is a form of malware (malicious software) that attempts to encrypt (scramble) your data and then extort a ransom to release an unlock code. ...
- Phishing. ...
- Data leakage. ...
- Hacking. ...
- Insider threat.
1) Phishing Attacks
The biggest, most damaging and most widespread threat facing small businesses is phishing attacks. Phishing accounts for 90% of all breaches that organizations face, they've grown 65% over the last year, and they account for over $12 billion in business losses.
The biggest barriers to digital transformation listed were: Employee Pushback. Lack of Expertise to Lead Digitization Initiatives. Organizational Structure.
What are the biggest barriers to digital transformation? ›The inability to experiment quickly is the biggest barrier to digital transformation. This is greatly linked to companies' reluctance to part ways with the way they have been doing things for years. Suddenly changing lanes seems like a huge risk that most businesses aren't willing to take.
What are the 3 main security management strategies? ›- #1. Information Security Management. ...
- #2. Network Security Management. ...
- #3. Cybersecurity Management.
- 1 – Malware. We'll start with the most prolific and common form of security threat: malware. ...
- 2 – Password Theft. ...
- 3 – Traffic Interception. ...
- 4 – Phishing Attacks. ...
- 5 – DDoS. ...
- 6 – Cross Site Attack. ...
- 7 – Zero-Day Exploits. ...
- 8 – SQL Injection.
Given a specific risk, there are five strategies available to security decision makers to mitigate risk: avoidance, reduction, spreading, transfer and acceptance. The goal of most security programs is to reduce risk.
What is the biggest enemy of digital transformation? ›
Organizational silos, the archenemy of productivity and innovation, is the foremost cause of stalling an organization's digital transformation efforts.
How can a company overcome digital change resistance? ›- Switch to learning mode, and encourage employees to do the same. ...
- Train fully, then follow up. ...
- The C-suite should collaborate and stick together. ...
- Have a North Star. ...
- Don't try to fix everything at once. ...
- Don't rely on technology.
- an affordable, good-bandwidth Internet service.
- devices with Internet access to meet everyone's needs.
- educational pathways to use the Internet and other digital technologies.
- a quality technical support.
- Malware.
- Ransomware.
- Distributed denial of service (DDoS) attacks.
- Spam and Phishing.
- Corporate Account Takeover (CATO)
- Automated Teller Machine (ATM) Cash Out.
- Social engineering. Social engineering is considered the prime risk because of the newly popular and diverse social media websites. ...
- Cloud computing services. The new tech trend in computer systems is cloud computing. ...
- Internal risk factors. ...
- HTML security. ...
- APTs. ...
- BYODs. ...
- Malware. ...
- Botnets.
In the past decade, social engineering, ransomware and advanced persistent threats (APTs) are on the rise. These are threats that are difficult to defend against and can cause catastrophic damage to an organization's data.
What are digital security risks and how can they be prevented? ›- Developing cyber security policies.
- Implementing security awareness training.
- Installing spam filters and anti-malware software.
- Deploying Next-Generation Firewalls (NGFW)
- Installing endpoint detection & response (EDR)
A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber-attacks include threats like computer viruses, data breaches, and Denial of Service (DoS) attacks.
What are the 5 types of cyber security? ›- Network Security. Most attacks occur over the network, and network security solutions are designed to identify and block these attacks. ...
- Cloud Security. ...
- Endpoint Security. ...
- Mobile Security. ...
- IoT Security. ...
- Application Security. ...
- Zero Trust.
A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber-attacks include threats like computer viruses, data breaches, and Denial of Service (DoS) attacks.
What are some digital security challenges? ›
- #1. Increase in Cyberattacks.
- #2. Supply Chain Attacks Are on the Rise.
- #3. The Cyber Pandemic Continues.
- #4. Cloud Services Are A Primary Target.
- #5. Ransomware Attacks Are on the Rise.
- #6. Mobile Devices Introduce New Security Risks.
But digital transformation requires comprehensive and robust data security. As more data is moved to the cloud, more data are exposed to the risk of a breach, with no shortage of bad actors willing to exploit vulnerabilities.
What are the main risks around cyber security? ›- Malware attack.
- Social engineering attacks.
- Software supply chain attacks.
- Advanced persistent threats (APT)
- Distributed denial of service (DDoS)
- Man-in-the-middle attack (MitM)
- Password attacks.
As a result, the threat landscape has expanded significantly. The main types of cybersecurity threats that companies face today include malware, social engineering, web application exploits, supply chain attacks, Denial of Service attacks, and man-in-the-middle attacks.
What are the 7 types of cyber security threats? ›- Malware.
- Ransomware.
- Distributed denial of service (DDoS) attacks.
- Spam and Phishing.
- Corporate Account Takeover (CATO)
- Automated Teller Machine (ATM) Cash Out.
- Social engineering. Social engineering is considered the prime risk because of the newly popular and diverse social media websites. ...
- Cloud computing services. The new tech trend in computer systems is cloud computing. ...
- Internal risk factors. ...
- HTML security. ...
- APTs. ...
- BYODs. ...
- Malware. ...
- Botnets.
Staffing shortages, budget allocation issues, and inadequate analytics and filtering are among the challenges organizations will face as they implement a security operations center. A security operations center is an essential part of an organization's threat containment strategy.
How can digital security be improved? ›- Keep Your Software Up to Date. ...
- Use Anti-Virus Protection & Firewall. ...
- Use Strong Passwords & Use a Password Management Tool. ...
- Use Two-Factor or Multi-Factor Authentication. ...
- Learn about Phishing Scams – be very suspicious of emails, phone calls, and flyers.
- Network Security. Most attacks occur over the network, and network security solutions are designed to identify and block these attacks. ...
- Cloud Security. ...
- Endpoint Security. ...
- Mobile Security. ...
- IoT Security. ...
- Application Security. ...
- Zero Trust.
That means it will be targeted by hackers and other cybercriminals.By ensuring strong defenses through XEM and other new security technologies, policies, procedures and training, organizations can experience a security transformation that will enhance their overall digital transformation.
What are the three main goals of security? ›
Included in this definition are three terms that are generally regarded as the high-level security objectives – integrity, availability, and confidentiality.
What is the most important of security? ›Physical Access Control
This is one of the most important aspects of preventive security measures taken at the workplaces across the globe. The workplace security should be robustly controlled through ID based physical restriction for unauthorized access to the workplace or assets of the company.
In the past decade, social engineering, ransomware and advanced persistent threats (APTs) are on the rise. These are threats that are difficult to defend against and can cause catastrophic damage to an organization's data.
What is the most common security risk? ›- 1 – Malware. We'll start with the most prolific and common form of security threat: malware. ...
- 2 – Password Theft. ...
- 3 – Traffic Interception. ...
- 4 – Phishing Attacks. ...
- 5 – DDoS. ...
- 6 – Cross Site Attack. ...
- 7 – Zero-Day Exploits. ...
- 8 – SQL Injection.
Some of the most common misconfigurations are unpatched systems, broken access control, sensitive data exposure and vulnerable and outdated components.