Everyone from the CFO to the entry-level security newb is susceptible to a phishing scam. Yes, even those who have spent their careers in IT and security can fall victim to these persistent and highly sophisticated scams.
When a client is the recipient of a scam that came from your enterprise, though, the consequence is not only to your network security but also to the public's perception and trust of your business, especially if you are a financial services company.
Bill Ho, cybersecurity expert and CEO of Biscom, was recently a victim of a phishing scam. While Ho said he receives scam emails all the time, this one was different. "It came from someone I'd been working with. A financial services company with whom I would be sharing confidential financial data. That made me think about the relationship with that company," Ho said.
Of great concern for Ho was the reality that this wasn't just a friend or a colleague. "This was a business relationship at a level that required a lot more confidentiality," he said.
"Phishing affects more than just your company. It can erode trust in clients, vendors, coworkers, partners, and more."
Bill Ho, cybersecurity expert and CEO of Biscom
When these potentially disastrous situations do occur, the manner in which a company responds is critical to maintaining their business relationships. "First they need to realize they may never regain that trust; however, like any crisis situation, communication is important," Ho said.
"Phishing," said Ho, "affects more than just your hardware. It can erode trust in clients, vendors, coworkers, partners, and more. Which means a loss in clients, a loss in revenue, and a loss of confidence in said employee from an internal perspective."
To use an analogy, Ho said, "A restaurant that has had its name in the headlines for an E.coli outbreak from contaminated lettuce has likely gone out of its way to sterilize the facility, contact vendors, and manage the public perception of their response to the health concerns." Likely, that restaurant is now the safest place to eat, but are people going back there? When? How long does it take to rebuild that public trust?
Ho said, "If the third party doesn't feel like you are responding quickly, they lose trust. It's important to be transparent and provide as much information as possible."
He also offered the following points to consider in thinking about detection and incident response:
It's not so much about prevention as it is detection, so have an intrusion detection strategy. It used to be people wanted to prevent it, but detection results in a much faster response. Detect it early before it causes too much damage. Detection is a shared responsibility across the organization.
Sign up for Computerworld eNewsletters.