Page 3 - TenInsight_issue6
P. 3

2     June 2019   |   Issue 6                                                                                   3




 How do geopolitical cyberattacks   Is your company taking due


 affect the average UK SME?  diligence seriously?





 It is not unusual these days to hear about a corporate or public entity being subject to a cyberattack
 or losing large quantities of data. The attacks garnering most attention are, characteristically, not   When 75% of our background checks identify flags, a simple Google
 perpetrated by a bored teenager (a so-called ‘’script kiddie’’) but are instead state-sponsored and   search isn’t enough.
 geopolitical in nature.
       In 2002, Yahoo discovered that CEO Scott   During this research we identified a   Detailed examination of databases,
 One of the more recent attacks includes   Security and Resilience, highlighted that   protocols does the company have in   number of near misses, where clients had   online resources, and interviews with
 the Australian government cyberattack   China’s attacks characteristically target   place? What is their reputation like?   Thompson could not have obtained a   been poised to appoint a professional   carefully chosen individuals and sources,
 in February 2019, linked to Iranian cyber   big data sets and bounce off others by   Do my third parties use other third   bachelor’s degree in computer science   who, at first glance, seemed like the   is the only way companies can be
 espionage group ‘Iridium’ – a group also   hacking through a service provider.   parties? If a data breach occurs, how do I   from Stonehill College, as the course   ideal candidate but turned out to be less   certain to minimise risks when engaging
 believed to be responsible for a similar   Hypothetically speaking, if the UK   communicate externally and internally?   was not offered until four years after   than desirable. Our findings included   with a new senior hire, partner or
 attack against the UK government in 2017.   he graduated. In 2018, the world’s
 government used Amazon Web Service   According to the 2019 Cyber Security   largest luggage maker, Samsonite, also   allegations of insider trading, sexual   business.  Interestingly, there are several
 Other geopolitical cyberattack examples   (AWS) to store its data, China could target   Breaches Survey, the number of   announced its CEO had stepped down   harassment, fraud, drug taking, undeclared   mechanisms in place online for people
 include the WannaCry ransomware in   large data sets in AWS to seize this. As   businesses reporting cyberattacks   following allegations he lied on his   insolvencies, court litigation, ties to   to hide their backgrounds: for example,
 2017, the supposed Russian interference   a small pest control business in the UK,   decreased from 43% the previous year to   resumé.  sanctioned individuals and companies; all   companies which bury negative online
 in the US 2016 presidential election, North   using AWS cloud to store all personal data   32% this year. However, it appears that   of which clearly demonstrate the need for   profiles for a fee, as well as the Right to be
 Korea’s attacks against SWIFT and Bitcoin,   relating to your clients, your company’s   businesses and charities that have been   These are just two high-profile examples,   background checks before employment   Forgotten law codified in the EU’s General
 and the numerous Russian assaults on   data could be compromised in the attack.   targeted now appear to be experiencing   whereby both companies, as market   to help safeguard your organisation’s   Data Protection Regulation (GDPR).
 Ukrainian infrastructure.   Would you have a plan in place for this   more attacks than in prior years.  leaders in their sectors, overlooked the   reputation.  It further proves that using standard
 scenario?   details of their most senior executives’
 The effects of these geopolitical   Such a high percentage of attacks   No more Google searches   search engines will not recover scrubbed
 cyberattacks are often under-estimated   It is important to understand that   suggests it is not a case of if you will suffer   CVs. This resulted in not only financial   data, however, an experienced due
 always seem to be misunderstood, as   although you may not be the direct target   a data breach, but when.  losses but, most importantly, it had an   Whether it’s through an in-depth   diligence analyst is trained to spot the
 people often forget about the incident   of a nation-state hack, it is possible to be   Most importantly, do not underestimate   embarrassing impact on the company’s   interview with a former colleague which   signs and collect factual information.
 after a couple of days of bad press. The   affected indirectly – having a plan in place   the effects of a cyberattack on your   public image. Skeletons can be found in   reveals criminal activity or undeclared   Due diligence is a very complex and
 long-term ramifications of such an event   will help mitigate the consequences of the   company and employees, and never   even the safest closets.   financial issues identified through official   challenging undertaking.  A thorough
 are often not truly comprehended by   breach.   undervalue the importance of a thorough   How much due diligence is   records, relying on a Google search to   background check into senior executives
 smaller businesses in the UK.              identify these kinds of risks is unwise –
 Primarily, you need to understand your   and up-to-date company plan in   enough?  none of the red flags we identified during   and new hires should entail rigorous
 The 2019 Cyber Security Breaches Survey   own cyber vulnerabilities: does your   minimising the effect of a macro-scale   Having the right background information   the 600+ background checks in 2018 were   interrogation and analysis of information
 shows 31% of micro and small businesses   company adhere to the most basic   cyberattack. Be prepared – you never   allows organisations to work with   found through a Google search.  gathered from a range of open sources,
 have encountered breaches or attacks in   cybersecurity principles? In their Cyber   know if you will be the next target.  confidence, compliance and assurance.   such as: subscribed databases; press
 the last 12 months. Despite the statistics,   Essentials programme, The National   At TenIntelligence, we provide a range   Our Due Diligence Team completed over   articles; company registries; court
 most SMEs feel they are not at risk of   Cyber Security Centre (NCSC) has useful   of services and jargon-free advice to   600 background checks during 2018. As   Due diligence results  searches; public records and documents;
 being a target – there is a general air of   guidelines for making sure you are safe   organisations who require assistance to   reference checks; employment and
 unrealistic optimism that being a small   – the information is written plainly and is   protect their company. If you would like to   part of our analysis into these checks, we   education verifications, as well as social
 company is a form of protection. After   accessible for most.  have a conversation about your security   implemented a simple traffic light system,   media platforms. It is critical to identify all
 all, they think, why would China want to   Undertaking third-party risk management   position, or need help in reaching an   giving each background check a status   the possible risks, as the additional cost
 know how many rats were caught by a   is also important. Ask yourself and your   applied standard, contact us via    of Red, Amber or Green. Red showed   for the supplementary phases is minimal
 small Kent-based pest control business?   a significant red flag had been found;   compared to the possible losses incurred
 team – how well do you know the   info@tenintel.com.  Amber confirmed that discrepancies
 At the ITC Annual Security Conference,   provider of your cloud-based security   were identified; whilst Green meant there   from a bad business decision.
 Paddy McGuinness, former UK Deputy   solution? Do you know where in the   Sean Nichol   were no issues identified on their CV or   For more information regarding our due
 National Security Adviser for Intelligence,   world your data is stored? What security   Associate (Cyber and Forensics)  diligence service, please email us via
       application form.  From our research, a                                  info@intel.com. Our team is looking
       total of 75% cases were identified as an                                 forward to providing assurance and help
 Useful links:   Amber (69%) or Red flag (6%). This means                       your organisation make informed decisions.
 1.The 2019 Cyber Security Breaches Survey: https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2019  during the open source phase, a further
 2. Cyber security advice for SMEs by the National Cyber Security Centre https://www.ncsc.gov.uk/section/information-for/small-  investigative phase is required, or the   Katie Frodsham
 medium-sized-organisations  scope might also need to be expanded   Red  Green  Amber  Litigation Support and Assurance Director
       into additional jurisdictions.       6%         25%         69%          katie.frodsham@tenintel.com

 Due Diligence | Investigations | Protection  www.tenintel.com  www.tenintel.com  Due Diligence | Investigations | Protection
   1   2   3   4