Don’t be caught unawares by a cyber attack: Richard Hilton

In a world that is being driven by emerging Artificial intelligence (AI) technology, challenges a company now faces are not only visible ones like interest rates, inflation, energy and the cost of living, but also cyber-attacks and ransomware.

Cybersecurity is now a multi-million-pound industry.

With 69 per cent of surveyed IT decision-makers stating that they have seen, or will see, their cybersecurity budgets increase between 10-100% in 2024.

Key Insights from the National Cyber Security Centre (NCSC) show that AI poised to amplify cyber threats, increasing both their volume and impact.

Hide Ad
Hide Ad
Richard Hilton is private sector chief security officer at Claritas Solutions.Richard Hilton is private sector chief security officer at Claritas Solutions.
Richard Hilton is private sector chief security officer at Claritas Solutions.

All types of threat actors, from state to non-state, are leveraging AI to varying degrees with AI enhancing reconnaissance and social engineering tactics, making them more effective.

While sophisticated AI-driven cyber operations are on the horizon, they’re currently limited to well-resourced actors. UK businesses faced a 32 per cent cyber-attack or breach rate in 2023, with medium-sized companies bearing the brunt. The financial ramifications are staggering, with reported losses exceeding £736m, and attacks occurring as frequently as once a week for 31 per cent of businesses, with Cybercrime Magazine reporting that 60 per cent of small companies close within 6 months of being hacked.

Sometimes there seems to be a disconnect at the executive level in the actual understanding on how today’s businesses run. Non-digital-native businesses for a long time have seen Information

Technology as peripheral department (pun intended), non-core and most importantly, a cost centre, not contributing to the businesses bottom line. When I say conventional businesses, I mean businesses that, across the managerial level, still emphasise a reliance on heavily established, often manual processes, opposed to those that embrace technology as integral to their business model and operations.

Hide Ad
Hide Ad

The easiest way to reconcile these beliefs is to start with 2 simple questions - if we turned off the IT systems right now, how long would your business be able to operate? And if the only point of recovery was a restoration of a backup, how far back could you go before the business becomes unviable? Effectively unable to recover from the operational costs of the loss, but also the loss of

data that would need to be re-keyed to bring back to the present day. Not taking the loss of reputation into account.

Understanding a catastrophic operational outage of your IT systems that a ransomware or malware attack would cause, is where you should start if you want to quantify the costs of the measures you should put in place to ensure the survival of your business. Spend accordingly to the level of loss you could incur.

Generally, attacks are not instigated at the point of infiltration. The skilled protagonists will leave the malware in place for a number of weeks or months. Hence, when you start the recovery process the

Hide Ad
Hide Ad

malware is embedded in your backups. It’s also worth highlighting that the company being hacked might not be the end target, it could be the client base they are targeting and want access to.

Each company has to determine the impact of the risks it poses to them and plan accordingly.

Your policies and capabilities need to match your business objective, and every company should have a recovery process. Cyber-crime will only continue to increase, and we all have to do our best to mitigate its impacts.

Richard Hilton of Claritas Solutions

Comment Guidelines

National World encourages reader discussion on our stories. User feedback, insights and back-and-forth exchanges add a rich layer of context to reporting. Please review our Community Guidelines before commenting.