Cybersecurity Risk Management for Directors

There are many posts on corporate directors’ responsibilities toward the organizations where they are board members.  In fact, corporate directors themselves may be targets for hacktivists or cybercriminals and need to make sure they have adequate protection.  This protection should include both home and professional office.  Directors obviously will have access to sensitive insider information that many unauthorized parties would like to get access to.  Many directors will also be targets as High Net Worth (HNW) individuals.  Cybercriminals always target the weakest link; as corporate information security improves, they increasingly will target the home networks of key executives or directors.

Breaches such as Equifax have put so much personal information into the hands of criminals, that individuals increasingly will become targets.  Directors represent a perfect demographic cross-section to be attacked.  Attack vectors may include phishing, ransomware and social media.

Earlier this year, an NSA employee was in the news as hackers apparently stole US government secrets from his home network.  Directors with access to confidential strategic or financial information should make sure their home networks are protected above and beyond the usual consumer grade defenses.    Another attack path may be through tools and services used by directors.  In 2010 attacks were reported against Directors Desk, a NASDAQ meeting portal.  It is not clear if any sensitive information was stolen at that time.

What should directors do?  First, make sure your home network is built to corporate standards.  You need a commercial firewall, not just a consumer router.  Most critically, any devices, especially firewalls and routers should auto-update their firmware.  Auto-update is now included in Windows 10, most smartphones, and many home network devices, but not in older devices.  Anything you put on your network will be found to have vulnerabilities, so this software and firmware update feature is critical to keep hackers out.

Passwords represent a second critical area; many breaches result from theft of user credentials.  You should use two-factor authentication to log in to sites with your financial or personal information.  Applications for your smartphone such as Google Authenticator and Duo Security generate one time tokens that serve as a second factor.  More familiar is the text messaging that many sites still use to send one time codes to users.  This process has been deprecated by the Federal government (because of potential eavesdropping attacks), so use the dedicated security apps, if possible.  Still, other financial sites do not yet have any two-factor authentication available.  For these make sure to use 12 character strong passwords.  Such complex passwords should be managed using password vaults like LastPass or KeyPass.

The last factor to consider is encryption.  Never store any sensitive data online without encrypting it, using a password known only to you.  It is true that collaboration sites like Dropbox do encrypt the data you save there.  But they still have the encryption keys and can view the data.  These keys can be hacked or stolen by a disgruntled employee.  That’s fine for 99% of the information you store online.  But for the other 1%, especially personal or corporate sensitive material, only you should have the encryption key.  Applications like Boxcryptor integrate with Dropbox and enable you to further protect your information.

These three security precautions will help you keep your personal and professional information secure.  Since threats and vulnerabilities are constantly changing, you must keep up to date using the online resources and other peer group information on this topic.

Contact us today to learn how we can assist you in any aspect of your IT security program.

Frederick Scholl

Frederick Scholl is an accomplished Global Senior Information Security Risk Manager. Dr. Scholl earned a BS and Ph.D. in Electrical Engineering from Cornell University. In 1991, Fred founded Monarch Information Networks, LLC to enable forward-thinking organizations to protect their information. Previously, he co-founded Codenoll Technology Corporation (NASDAQ: CODN). He chaired the IEEE committee that wrote the first standard for Ethernet communication over fiber optic links, now used world-wide.

Book an Appointment for Cybersecurity Issues

Request an appointment with Dr. Fred Scholl. We will discuss any cybersecurity issues you have.

More Good Reading

Cybersecurity Thrives in An Organizational Context

The First National Cybersecurity Summit

New Privacy Laws Require Security Professionals Up Their Game

Cybersecurity Workforce Development: Real or Imagined Problem?

Antidote for Fake Everything

Information Security Risks, Gray Rhinos and Black Swans

Managing Information Security On a Limited Budget

Building a Security Start-Up

Cybersecurity Risk Management for Directors

My Reading List for Security Start-Ups

Should Your CIO Learn to Code?

How IT Leaders Can Keep a Seat at the Table

Equifax points out—again—the need for speed in security management

Anatomy of a Security Breach

The Smartest Information Security Companies

Book Review: Play Bigger

Long Term Beneficiaries of WannaCry

RISK: A NEW MOVIE ABOUT JULIAN ASSANGE

TRADE SECRET THEFT CONTINUES UNABATED

TENNESSEE LEGISLATORS MUDDY WATERS AROUND PRIVACY BREACH NOTIFICATION REQUIREMENTS

LEADERSHIP CHECKLIST FOR SECURITY PROFESSIONALS

SIEM VENDORS HAVE IT ALL BACKWARDS

THE SECRET TO GROWING YOUR SECURITY STARTUP

CLOUD JOBS PEAKING?

The Spy Who Couldn’t Spell

IS THERE A CYBERSECURITY PROFESSIONALS SHORTAGE?

No Blue Pill for Cybersecurity Failures

Presidential Cybersecurity Commission Makes Some Good Suggestions

Understanding Intelligence

Align Your Security Program With the Business

Don’t fall victim to BEC

Enterprise Risk Management and Information Security

Evidence Based Risk Assessment: Lessons Learned from the Y-12 Breach

First Conviction for Illegally Distributing Android Apps

Locking Up the Ivory Tower

Cloud Vulnerabilities

More Security Lessons Learned from the Y-12 Breach

Security or Compliance?

Home Disaster Recovery Planning

Cloud Computing: Trust but Verify

Background Checks May Not Be Enough

PERFECT SECURITY STORM FOR LAW FIRMS?

How Not To Be a Cyber Janitor

SECURITY MEMO: IT CAN’T HAPPEN HERE, CAN IT?

Don’t Forget Cloud Availability

Compliance v. Security

GAO Report on Information Security in Federal Government

Lean Security

Mitigate Your Social Engineering Vulnerabilities

HIPAA Security. Are We Making Progress?

Brand Your Security Program

PDCA is Dead

LEARNING FROM PAST MISTAKES

How Better Security Can Create Shared Value

C’est La Vie, You Never Can Tell: Lessons Learned from the HBGary Hack

DDOS Tutorial

The future of information technology

Data Governance Anyone?

Learning from the oil spill disaster

Down the Rabbit-Hole…Again?

Ideas on Risk Management