What Businesses Need to Know About Cybersecurity in 2024

Kim Klinsport of Foley & Lardner LLP; Kamran Salour of Lewis Brisbois Bisgaard & Smith LLP; and Gene Yoo of Resecurity
Share via

This business advisory panel is produced by the L.A. Times B2B Publishing team in conjunction with Foley & Lardner LLP; Lewis Brisbois Bisgaard & Smith LLP; and Resecurity.

Corporate cybersecurity breaches continue to escalate, and the threats (and fines) are growing as we become increasingly reliant on cloud-based computing and other online innovations. With hundreds of thousands more employees working from home and with devices containing sensitive data leaving offices and entering homes at an exponential rate, those concerns have exponentially increased.

While tools to prevent breach incidents have become more sophisticated, so have the methods of hackers and cybercriminals. What actions can business owners take to protect their private data and that of their customers and employees? How can C-suiters and IT teams sleep better at night when there are so many mounting threats to our digital security?

The Los Angeles Times B2B Publishing team turned to three uniquely knowledgeable cybersecurity experts for their thoughts and insights about the threats businesses face in today’s digital world and what executives can do to safeguard the privacy of their organizations, employees, customers and other stakeholders.

Q: Are cybersecurity threats increasing in 2024? Why or why not?

BAR_2-19

Gene Yoo, CEO, Resecurity: Cybercrime will increase in 2024 since the existing mature and well-known threats will remain effective, and threat actors will leverage and target new technologies such as AI in 2024. AI is a technology with great potential value for companies and individuals. However, it also introduces a unique set of risks that must be evaluated and appropriately mitigated. As AI will provide value to companies, it will also offer value to cybercriminals conducting attacks. For example, NextGen Phishing. Cybercriminals use their R&D time and budget to target AI platforms, models and users. There are also mature and well-known threats that will continue in 2024. For example: Threat actors targeting software developers; extortion – ransomware; breaches via the supply chain; cybercrime-as-a-service; and threat actors are targeting and using cloud infrastructure.

Q: Are some industries hit harder than others by data breaches? If so, which industries?

BAR_2-19

Kim Klinsport, Partner, Office Managing Partner Los Angeles, Foley & Lardner LLP: Certain industries are generally targeted more than others because of the kind of personal information that they process – e.g., financial services or healthcare. Or because of the type of impact a breach may have – e.g., critical infrastructure or system controls like power plants, water treatment plants or food manufacturing. The difference is the bad actor’s motive: whether it be for the sake of potential profit by selling personal information on the dark web, to conduct an attack or seek information on another country, or for the sake of disruption alone.

Q: Do you think it is important for organizations to have an incident response plan? If so, what should it include?

BAR_2-19

Kamran Salour, Co-Chair, Data Privacy & Cybersecurity Practice, Lewis Brisbois Bisgaard & Smith LLP: A plan is important. Many organizations, however, have incident response plans that are too detailed and contain too many steps, rendering them impractical. An incident response plan should be readily actionable. Substantively, an incident response plan should identify: (i) how the organization defines an incident; (ii) how it detects an incident; (iii) how to contain an incident; and (iv) when a detected incident should be escalated to the incident response team. Procedurally, the incident response plan should identify the members of the incident response team (including insurance broker, carrier, legal counsel) and their respective roles/responsibilities. And don’t forget it must also explain ways to communicate with the team and employees using non-work emails or cell numbers and to have off-network access to the details of the incident response plan in case the network is down.

Q: How has the cybersecurity landscape changed in the last few years?

Yoo: Businesses must adopt the latest cybersecurity technologies and practices to safeguard their digital assets and operations, especially given their various challenges. The cybercrime ecosystem has evolved and matured, providing attackers with easy access to various services, enabling them to conduct attacks with minimal effort and cost, and making it easier to monetize their attacks. The current economic situation has forced many industries, including IT and cybersecurity, to cut budgets and reduce staff. This financial strain has made it challenging for organizations to invest in essential security measures and technologies. Unfortunately, this challenge is further exacerbated by the increased risk of a company being impacted by a cybersecurity event during a recession.

Q: What’s your advice for companies that are analyzing their current cybersecurity measures?

Salour: I offer three pieces of advice. First, companies should utilize third-party cybersecurity experts to help identify cybersecurity gaps and identify and prioritize the company’s cybersecurity needs. Second, companies should understand that cybersecurity is not static; cybersecurity needs and decisions will change, thus cybersecurity should be evaluated periodically. Third, companies should make cybersecurity decisions collaboratively. The IT/security team should work with the business team to implement cybersecurity measures. Although a difficult balance to achieve, cybersecurity measures must advance business operations, not hinder them.

Q: Do mobile devices present security risks?

Klinsport: Yes. First, mobile devices are still IoT devices at some level without physical controls, and so they are susceptible to probing and other analysis in the hands of the threat actors. However, mostly the threat actor in that case is looking for some personal gain, like access to protected content from their streaming service or access to security tokens that provide access to credit cards or other financial data. The bigger threat from mobile devices for businesses still comes from the lack of physical control over company data accessed or stored in mobile devices. If a laptop gets stolen, the data stored on it may be accessed by the thief. And employees and other insiders could copy data accessed by mobile phones or laptops. However, most of this is mitigated through the use of mobile device management software.

Q: Are certain cyber threats unique to small businesses versus larger businesses?

Yoo: Many large companies have improved their security measures to protect themselves against cyber threats. However, small businesses are more vulnerable and frequently targeted by sophisticated attackers. Unfortunately, most small businesses lack the expertise to defend against these threats successfully. As a result, they often believe that running antivirus software is enough to protect them from cyber-attacks, which is not valid. In addition, small businesses have become a popular target for attackers because they are often linked to a larger supply chain, which is the primary target of the attacker.

Klinsport: Most smaller businesses simply don’t have the resources that bigger businesses have to adequately defend against the threats that they face. These can result in not patching systems or having end-of-life firewalls in place. In our practice, many of them don’t believe that they are processing personal information, but they are under the broader definition we are seeing in many of the new state laws, such as the California Consumer Privacy Act. And the threats are not just against personal operation – many organizations, big and small, do not take into account the value of their intellectual property or the impact that a cyberattack may have on business operations. And when they get hit, smaller businesses are much less likely to have an incident response plan or have the resources to recover from the attack.

Q: What are the main barriers and challenges businesses face when addressing cybersecurity?

Salour: The biggest challenges businesses face when addressing cybersecurity are mindset challenges and implementation challenges. From a mindset standpoint, certain businesses still view cybersecurity as an obligation independent of the businesses’ needs. This creates a disconnect between cybersecurity and business operations, making it more likely that the businesses’ cybersecurity protections are inadequate. This disconnect can also sow seeds of distrust between the business and the cybersecurity department. From an implementation perspective, let’s face it, adequate investment in cybersecurity can be expensive. Many businesses want to improve their cybersecurity infrastructure but simply cannot afford to do so. That said, inadequate investment has far more far-reaching consequences in the event of a cybersecurity incident.

Yoo: Organizations often overlook cybersecurity and fraud threats while launching a new product or service, making them vulnerable to exploitation by threat actors. To prevent this, organizations must plan for monitoring and operational mitigations during the product design and initial development phases instead of considering it an afterthought. Despite having the highest recorded level of participants in the cybersecurity workforce, there still needs to be a significant gap in the number of skilled professionals required to defend organizations effectively. The demand for cybersecurity professionals with the right skills is increasing, but hiring and retaining such qualified employees remains a significant challenge.

Q: What role do you think AI will play in terms of the cybersecurity landscape moving forward?

Klinsport: AI will play a significant role in cybersecurity threats – both on the protection side and on the attack side of the equation. There are already cybersecurity products that use AI to protect against internal and external threats. But now we are seeing the power of generative AI available for threat actors to analyze target systems for vulnerabilities and develop exploits. In addition, we are seeing the threat actors launch AI-based attacks against individuals – imagine a phone call from an AI-generated “family member” who needs money that sounds exactly like your family member because they’ve trained it on voice clips from around the internet or from an AI-generated “Sally, from account services” that now interacts with you in real-time and is indistinguishable from a real person to obtain your credit card information.

Yoo: AI is set to revolutionize the field of cybersecurity by serving as a powerful tool for defense. Its ability to automate tasks and enhance detection and prediction capabilities makes it an asset for defenders. However, threat actors are also harnessing the power of AI to automate and improve their attacks. They target AI models, platforms, users, and training and production data. New security considerations must be implemented to safeguard AI systems from this rapidly evolving threat.

Q: What are some key considerations when purchasing cyber liability and crime insurance?

Salour: Two considerations come to mind. The first consideration is cost, which is always front of mind. But it is important to evaluate cost in the context of the business impact. If a company has a policy with a $25,000 deductible, it likely means that the company will pay most or all of its incident response costs out-of-pocket. Similarly, a policy with a $10,000 limit for ransom payments is usually insufficient to cover the entire ransom demand. The second consideration is the preferred vendors chosen by the cyber carrier. If there is a specific law firm or forensic firm that the company wants to use, the company should validate that they are on the cyber carrier’s vendor panel. And if not, the company should obtain the requisite approvals that it can use off-panel vendors before an incident occurs.

Q: What are some of the biggest mistakes companies make when attempting to protect themselves from breaches?

Yoo: Many companies rely on outdated security measures and technologies, such as solely relying on anti-virus software to protect their systems from being breached. However, anti-virus software is a legacy technology, and while it does offer some level of protection, it could be more effective at defending a company from being breached. According to Resecurity’s analysis of botnet logs, over 95% of PCs infected with malware were running anti-virus software at the time of the infection. Even months after infection, over 80% of the infected PCs remained compromised despite the presence of anti-virus software.

Klinsport: Two of the biggest mistakes companies make when attempting to protect themselves from breaches are: (1) not practicing their incident response plan and (2) not adequately training employees. Companies should put their incident response plan to the test through a tabletop exercise to make sure that everyone who has a role in the incident response plan knows exactly what to do in the event of a breach or other cybersecurity incident. In addition, companies need to take the time to make sure that their employees are well-trained as to how to spot phishing attempts and avoid creating cybersecurity vulnerabilities. Companies should make sure that employees have resources to help them understand cybersecurity risks and best practices not only because it could help prevent an incident from happening in the first place but also because there are a variety of laws that require it.

Salour: In my experience, there are several mindset mistakes that companies make. For example, some companies believe they are too small to be a target of a cyber-attack and, therefore, do not invest in cybersecurity. Other companies outsource network security and blindly assume that the third-party network security company is both infallible and immune to its own cyber-attack. Still, some companies focus exclusively on preventing an attack while missing out on opportunities to minimize the impact of an attack. This sets the company up for a difficult and complex mitigation effort; a cyber-attack is inevitable, and the company is ill-prepared when an attack occurs.

Q: How serious a problem is hardware hacking?

Klinsport: Hardware hacking is the ultimate “final frontier” in hacking. Simply put, having access to the hardware allows you to monitor and probe information that is not normally accessible, and that can lead to the discovery of vulnerabilities that can be exploited remotely. But it’s mitigated with physical security – most critical hardware used by businesses is protected by physical security measures, like in locked data rooms. But with the rise of IoT devices, a lot more hardware devices are easily accessed by threat actors. Imagine a connected thermostat that communicates with a local utility company so that the utility company can adjust temperature settings on high-use days. If the threat actor can discover a vulnerability there, then they could issue commands to other similar devices to keep the temperature really warm (which could affect the health of at-risk people) or go into overdrive to overload the grid.

Q: What’s the most dangerous cyber threat that you think businesses will have to deal with in 2024?

Yoo: The most dangerous cyber threat in 2024 is predicted to be AI. Companies implementing AI need to properly plan or address how attackers will target their AI systems and related processes. Additionally, defenders and security companies must be adequately prepared for how threat actors will benefit from AI, how they will target a company’s AI system, and what parts of their supply chain will use AI that threat actors can target.

Q: What is the best course of action for a company that is victimized by ransomware?

Salour: The simple and admittedly self-serving answer is to call me. Beyond that, the company should compartmentalize its response into two distinct, yet parallel paths, business and legal. From a business perspective, it is essential to: (i) stop the spread of the ransomware by disconnecting Internet access to the servers and workstations; (ii) collect forensic evidence (images and logs) of the impacted servers and workstations; and (iii) remediate the threat (make sure it no longer exists) before reconnecting the impacted servers and workstations to the network. From a legal perspective, engage a cybersecurity attorney (I’m one – hint, hint). That attorney can help manage communications with employees and customers about the attack and determine the company’s contractual, regulatory and statutory notification obligations.

Q: As a trusted advisor to businesses, what are some of the key pieces of advice you share with clients in terms of protecting themselves against cyber threats?

Klinsport: Our best piece of advice: Be prepared. We advise and help our clients develop comprehensive incident response plans, test out those plans through tabletop exercises and train employees. When something does go wrong or a client experiences a cybersecurity incident, we work with them to make sure that they are complying with all of the applicable laws in reporting the incident, notifying affected individuals and doing what we can to help minimize any exposure or further damage. A cybersecurity incident is a complex and very scary thing to experience, and we pride ourselves on being able to move quickly to help our clients protect their customers, businesses and intellectual property.

Salour: To adequately protect a business against cyber threats, the business cannot have a singular focus on “preventing” an attack. An attack is inevitable. Of course, a business should take steps to reduce the likelihood of an attack. But an equal focus should be on minimizing the impact of an attack, so if a threat actor does access the environment, the threat actor’s impact is limited. How? Implement appropriate access controls. Limit the amount of data stored, know where data is stored and encrypt sensitive data. Establish backups off-site and take steps to make sure that the backups are actually backing up. A layered approach makes it harder for the threat actor to access the environment and move around it after access, which together means the company has a better chance of success against cyber-attacks.

This conversation with the experts on cybersecurity in 2023 is produced by the L.A. Times B2B Publishing team in conjunction with Chant Vartanian, Founder and Chief Executive Office of M-Theory Group; Grayson Milbourne, Security Intelligence Director of OpenText Cybersecurity; and Lilit Davtyan, CEO of Phonexa.

seductrice.net
universo-virtual.com
buytrendz.net
thisforall.net
benchpressgains.com
qthzb.com
mindhunter9.com
dwjqp1.com
secure-signup.net
ahaayy.com
tressesindia.com
puresybian.com
krpano-chs.com
cre8workshop.com
hdkino.org
peixun021.com
qz786.com
utahperformingartscenter.org
worldqrmconference.com
shangyuwh.com
eejssdfsdfdfjsd.com
playminecraftfreeonline.com
trekvietnamtour.com
your-business-articles.com
essaywritingservice10.com
hindusamaaj.com
joggingvideo.com
wandercoups.com
wormblaster.net
tongchengchuyange0004.com
internetknowing.com
breachurch.com
peachesnginburlesque.com
dataarchitectoo.com
clientfunnelformula.com
30pps.com
cherylroll.com
ks2252.com
prowp.net
webmanicura.com
sofietsshotel.com
facetorch.com
nylawyerreview.com
apapromotions.com
shareparelli.com
goeaglepointe.com
thegreenmanpubphuket.com
karotorossian.com
publicsensor.com
taiwandefence.com
epcsur.com
southstills.com
tvtv98.com
thewellington-hotel.com
bccaipiao.com
colectoresindustrialesgs.com
shenanddcg.com
capriartfilmfestival.com
replicabreitlingsale.com
thaiamarinnewtoncorner.com
gkmcww.com
mbnkbj.com
andrewbrennandesign.com
cod54.com
luobinzhang.com
faithfirst.net
zjyc28.com
tongchengjinyeyouyue0004.com
nhuan6.com
kftz5k.com
oldgardensflowers.com
lightupthefloor.com
bahamamamas-stjohns.com
ly2818.com
905onthebay.com
fonemenu.com
notanothermovie.com
ukrainehighclassescort.com
meincmagazine.com
av-5858.com
yallerdawg.com
donkeythemovie.com
corporatehospitalitygroup.com
boboyy88.com
miteinander-lernen.com
dannayconsulting.com
officialtomsshoesoutletstore.com
forsale-amoxil-amoxicillin.net
generictadalafil-canada.net
guitarlessonseastlondon.com
lesliesrestaurants.com
mattyno9.com
nri-homeloans.com
rtgvisas-qatar.com
salbutamolventolinonline.net
sportsinjuries.info
wedsna.com
rgkntk.com
bkkmarketplace.com
zxqcwx.com
breakupprogram.com
boxcardc.com
unblockyoutubeindonesia.com
fabulousbookmark.com
beat-the.com
guatemala-sailfishing-vacations-charters.com
magie-marketing.com
kingstonliteracy.com
guitaraffinity.com
eurelookinggoodapparel.com
howtolosecheekfat.net
marioncma.org
oliviadavismusic.com
shantelcampbellrealestate.com
shopleborn13.com
topindiafree.com
v-visitors.net
djjky.com
053hh.com
originbluei.com
baucishotel.com
33kkn.com
intrinsiqresearch.com
mariaescort-kiev.com
mymaguk.com
sponsored4u.com
crimsonclass.com
bataillenavale.com
searchtile.com
ze-stribrnych-struh.com
zenithalhype.com
modalpkv.com
bouisset-lafforgue.com
useupload.com
37r.net
autoankauf-muenster.com
bantinbongda.net
bilgius.com
brabustermagazine.com
indigrow.org
miicrosofts.net
mysmiletravel.com
selinasims.com
spellcubesapp.com
usa-faction.com
hypoallergenicdogsnames.com
dailyupdatez.com
foodphotographyreviews.com
cricutcom-setup.com
chprowebdesign.com
katyrealty-kanepa.com
tasramar.com
bilgipinari.org
four-am.com
indiarepublicday.com
inquick-enbooks.com
iracmpi.com
kakaschoenen.com
lsm99flash.com
nana1255.com
ngen-niagara.com
technwzs.com
virtualonlinecasino1345.com
wallpapertop.net
casino-natali.com
iprofit-internet.com
denochemexicana.com
eventhalfkg.com
medcon-taiwan.com
life-himawari.com
myriamshomes.com
nightmarevue.com
healthandfitnesslives.com
androidnews-jp.com
allstarsru.com
bestofthebuckeyestate.com
bestofthefirststate.com
bestwireless7.com
britsmile.com
declarationintermittent.com
findhereall.com
jingyou888.com
lsm99deal.com
lsm99galaxy.com
moozatech.com
nuagh.com
patliyo.com
philomenamagikz.net
rckouba.net
saturnunipessoallda.com
tallahasseefrolics.com
thematurehardcore.net
totalenvironment-inthatquietearth.com
velislavakaymakanova.com
vermontenergetic.com
kakakpintar.com
begorgeouslady.com
1800birks4u.com
2wheelstogo.com
6strip4you.com
bigdata-world.net
emailandco.net
gacapal.com
jharpost.com
krishnaastro.com
lsm99credit.com
mascalzonicampani.com
sitemapxml.org
thecityslums.net
topagh.com
flairnetwebdesign.com
rajasthancarservices.com
bangkaeair.com
beneventocoupon.com
noternet.org
oqtive.com
smilebrightrx.com
decollage-etiquette.com
1millionbestdownloads.com
7658.info
bidbass.com
devlopworldtech.com
digitalmarketingrajkot.com
fluginfo.net
naqlafshk.com
passion-decouverte.com
playsirius.com
spacceleratorintl.com
stikyballs.com
top10way.com
yokidsyogurt.com
zszyhl.com
16firthcrescent.com
abogadolaboralistamd.com
apk2wap.com
aromacremeria.com
banparacard.com
bosmanraws.com
businessproviderblog.com
caltonosa.com
calvaryrevivalchurch.org
chastenedsoulwithabrokenheart.com
cheminotsgardcevennes.com
cooksspot.com
cqxzpt.com
deesywig.com
deltacartoonmaps.com
despixelsetdeshommes.com
duocoracaobrasileiro.com
fareshopbd.com
goodpainspills.com
hemendekor.com
kobisitecdn.com
makaigoods.com
mgs1454.com
piccadillyresidences.com
radiolaondafresca.com
rubendorf.com
searchengineimprov.com
sellmyhrvahome.com
shugahouseessentials.com
sonihullquad.com
subtractkilos.com
valeriekelmansky.com
vipasdigitalmarketing.com
voolivrerj.com
zeelonggroup.com
1015southrockhill.com
10x10b.com
111-online-casinos.com
191cb.com
3665arpentunitd.com
aitesonics.com
bag-shokunin.com
brightotech.com
communication-digitale-services.com
covoakland.org
dariaprimapack.com
freefortniteaccountss.com
gatebizglobal.com
global1entertainmentnews.com
greatytene.com
hiroshiwakita.com
iktodaypk.com
jahatsakong.com
meadowbrookgolfgroup.com
newsbharati.net
platinumstudiosdesign.com
slotxogamesplay.com
strikestaruk.com
trucosdefortnite.com
ufabetrune.com
weddedtowhitmore.com
12940brycecanyonunitb.com
1311dietrichoaks.com
2monarchtraceunit303.com
601legendhill.com
850elaine.com
adieusolasomade.com
andora-ke.com
bestslotxogames.com
cannagomcallen.com
endlesslyhot.com
iestpjva.com
ouqprint.com
pwmaplefest.com
qtylmr.com
rb88betting.com
buscadogues.com
1007macfm.com
born-wild.com
growthinvests.com
promocode-casino.com
proyectogalgoargentina.com
wbthompson-art.com
whitemountainwheels.com
7thavehvl.com
developmethis.com
funkydogbowties.com
travelodgegrandjunction.com
gao-town.com
globalmarketsuite.com
blogshippo.com
hdbka.com
proboards67.com
outletonline-michaelkors.com
kalkis-research.com
thuthuatit.net
buckcash.com
hollistercanada.com
docterror.com
asadart.com
vmayke.org
erwincomputers.com
dirimart.org
okkii.com
loteriasdecehegin.com
mountanalog.com
healingtaobritain.com
ttxmonitor.com
nwordpress.com
11bolabonanza.com