Page 2 - TenInsight_issue6
P. 2

2                                                                                                                      June 2019   |   Issue 6                                                                                   3




       How do geopolitical cyberattacks                                                                                       Is your company taking due


       affect the average UK SME?                                                                                             diligence seriously?





       It is not unusual these days to hear about a corporate or public entity being subject to a cyberattack
       or losing large quantities of data. The attacks garnering most attention are, characteristically, not                  When 75% of our background checks identify flags, a simple Google
       perpetrated by a bored teenager (a so-called ‘’script kiddie’’) but are instead state-sponsored and                    search isn’t enough.
       geopolitical in nature.
                                                                                                                              In 2002, Yahoo discovered that CEO Scott   During this research we identified a   Detailed examination of databases,
       One of the more recent attacks includes   Security and Resilience, highlighted that   protocols does the company have in                                    number of near misses, where clients had   online resources, and interviews with
       the Australian government cyberattack   China’s attacks characteristically target   place? What is their reputation like?   Thompson could not have obtained a   been poised to appoint a professional   carefully chosen individuals and sources,
       in February 2019, linked to Iranian cyber   big data sets and bounce off others by   Do my third parties use other third   bachelor’s degree in computer science   who, at first glance, seemed like the   is the only way companies can be
       espionage group ‘Iridium’ – a group also   hacking through a service provider.   parties? If a data breach occurs, how do I   from Stonehill College, as the course   ideal candidate but turned out to be less   certain to minimise risks when engaging
       believed to be responsible for a similar   Hypothetically speaking, if the UK   communicate externally and internally?   was not offered until four years after   than desirable. Our findings included   with a new senior hire, partner or
       attack against the UK government in 2017.                                                                              he graduated. In 2018, the world’s
                                            government used Amazon Web Service   According to the 2019 Cyber Security         largest luggage maker, Samsonite, also   allegations of insider trading, sexual   business.  Interestingly, there are several
       Other geopolitical cyberattack examples   (AWS) to store its data, China could target   Breaches Survey, the number of   announced its CEO had stepped down   harassment, fraud, drug taking, undeclared   mechanisms in place online for people
       include the WannaCry ransomware in   large data sets in AWS to seize this. As   businesses reporting cyberattacks      following allegations he lied on his   insolvencies, court litigation, ties to   to hide their backgrounds: for example,
       2017, the supposed Russian interference   a small pest control business in the UK,   decreased from 43% the previous year to   resumé.                      sanctioned individuals and companies; all   companies which bury negative online
       in the US 2016 presidential election, North   using AWS cloud to store all personal data   32% this year. However, it appears that                          of which clearly demonstrate the need for   profiles for a fee, as well as the Right to be
       Korea’s attacks against SWIFT and Bitcoin,   relating to your clients, your company’s   businesses and charities that have been   These are just two high-profile examples,   background checks before employment   Forgotten law codified in the EU’s General
       and the numerous Russian assaults on   data could be compromised in the attack.   targeted now appear to be experiencing   whereby both companies, as market   to help safeguard your organisation’s   Data Protection Regulation (GDPR).
       Ukrainian infrastructure.            Would you have a plan in place for this   more attacks than in prior years.       leaders in their sectors, overlooked the   reputation.                   It further proves that using standard
                                            scenario?                                                                         details of their most senior executives’
       The effects of these geopolitical                                        Such a high percentage of attacks                                                  No more Google searches             search engines will not recover scrubbed
       cyberattacks are often under-estimated   It is important to understand that   suggests it is not a case of if you will suffer   CVs. This resulted in not only financial                        data, however, an experienced due
       always seem to be misunderstood, as   although you may not be the direct target   a data breach, but when.             losses but, most importantly, it had an   Whether it’s through an in-depth   diligence analyst is trained to spot the
       people often forget about the incident   of a nation-state hack, it is possible to be   Most importantly, do not underestimate   embarrassing impact on the company’s   interview with a former colleague which   signs and collect factual information.
       after a couple of days of bad press. The   affected indirectly – having a plan in place   the effects of a cyberattack on your   public image. Skeletons can be found in   reveals criminal activity or undeclared   Due diligence is a very complex and
       long-term ramifications of such an event   will help mitigate the consequences of the   company and employees, and never   even the safest closets.         financial issues identified through official   challenging undertaking.  A thorough
       are often not truly comprehended by   breach.                            undervalue the importance of a thorough       How much due diligence is            records, relying on a Google search to   background check into senior executives
       smaller businesses in the UK.                                                                                                                               identify these kinds of risks is unwise –
                                            Primarily, you need to understand your   and up-to-date company plan in           enough?                              none of the red flags we identified during   and new hires should entail rigorous
       The 2019 Cyber Security Breaches Survey   own cyber vulnerabilities: does your   minimising the effect of a macro-scale   Having the right background information   the 600+ background checks in 2018 were   interrogation and analysis of information
       shows 31% of micro and small businesses   company adhere to the most basic   cyberattack. Be prepared – you never      allows organisations to work with    found through a Google search.      gathered from a range of open sources,
       have encountered breaches or attacks in   cybersecurity principles? In their Cyber   know if you will be the next target.  confidence, compliance and assurance.                                such as: subscribed databases; press
       the last 12 months. Despite the statistics,   Essentials programme, The National   At TenIntelligence, we provide a range   Our Due Diligence Team completed over                               articles; company registries; court
       most SMEs feel they are not at risk of   Cyber Security Centre (NCSC) has useful   of services and jargon-free advice to   600 background checks during 2018. As   Due diligence results        searches; public records and documents;
       being a target – there is a general air of   guidelines for making sure you are safe   organisations who require assistance to                                                                  reference checks; employment and
       unrealistic optimism that being a small   – the information is written plainly and is   protect their company. If you would like to   part of our analysis into these checks, we                education verifications, as well as social
       company is a form of protection. After   accessible for most.            have a conversation about your security       implemented a simple traffic light system,                               media platforms. It is critical to identify all
       all, they think, why would China want to   Undertaking third-party risk management   position, or need help in reaching an   giving each background check a status                              the possible risks, as the additional cost
       know how many rats were caught by a   is also important. Ask yourself and your   applied standard, contact us via      of Red, Amber or Green. Red showed                                       for the supplementary phases is minimal
       small Kent-based pest control business?                                                                                a significant red flag had been found;                                   compared to the possible losses incurred
                                            team – how well do you know the     info@tenintel.com.                            Amber confirmed that discrepancies
       At the ITC Annual Security Conference,   provider of your cloud-based security                                         were identified; whilst Green meant there                                from a bad business decision.
       Paddy McGuinness, former UK Deputy   solution? Do you know where in the   Sean Nichol                                  were no issues identified on their CV or                                 For more information regarding our due
       National Security Adviser for Intelligence,   world your data is stored? What security   Associate (Cyber and Forensics)                                                                        diligence service, please email us via
                                                                                                                              application form.  From our research, a                                  info@intel.com. Our team is looking
                                                                                                                              total of 75% cases were identified as an                                 forward to providing assurance and help
         Useful links:                                                                                                        Amber (69%) or Red flag (6%). This means                                 your organisation make informed decisions.
         1.The 2019 Cyber Security Breaches Survey: https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2019  during the open source phase, a further
         2. Cyber security advice for SMEs by the National Cyber Security Centre https://www.ncsc.gov.uk/section/information-for/small-  investigative phase is required, or the                       Katie Frodsham
         medium-sized-organisations                                                                                           scope might also need to be expanded   Red      Green       Amber        Litigation Support and Assurance Director
                                                                                                                              into additional jurisdictions.       6%         25%         69%          katie.frodsham@tenintel.com

       Due Diligence | Investigations | Protection                                                www.tenintel.com            www.tenintel.com                                                      Due Diligence | Investigations | Protection
   1   2   3   4