Danger zone: Cyber criminals know big time money is not safe
Cyber crime is one of the most perennial issues that is haunting the current governments and businesses globally. Besides causing huge financial losses to companies, it also causes irreparable damage to the entity’s market reputation.
The oil-rich Middle Eastern region is on the radar of cyber criminals, who are always looking for vulnerable targets. According to industry experts, in many cases, cyber attack is detected months after its actual launch, thereby making it difficult to control the damage.
Energy: new target of cyber criminals
As per the estimates, energy is overtaking banking and finance as a target for cyber-criminals in the Middle East. But companies in the energy sector are leaving themselves significantly more open to a successful attack, leading international experts have told the Security in Energy conference that was held recently in Abu Dhabi.
Ibrahim Al Shamrani, Executive Director of Operations at Saudi Arabia’s National Cyber Security Center, said 300 new malware samples were being discovered each day, and that his organisation was facing a growing number of attacks on the energy industry.
“The energy sector is trending to be the second most targeted sector in the country in 2017, behind the government and ahead of the financial and telecommunications sectors,” Al Shamrani said. “However, attackers are three times more successful in compromising energy companies than they are in the financial sector. In this era, if oil and gas companies think they haven’t been attacked, or even compromised, I can tell them, you are not looking hard enough.”
Incurring huge financial losses
Recent figures from McAfee estimate the global cost of cyber-related crime, or illicit activity, is between $375 billion and $550 billion per year.
Don Randall, former Head of Security and Chief Information Security Officer (CISO) at the Bank of England, said he believed that figure was probably around $400bn, and growing at between 10 and 20 per cent per year.
“When we look at the types of issues that could affect the oil and gas or energy industries, the three principles are still hacking, phishing, and false identity,” said Randall. “It doesn’t matter if you’re in the financial sector, in energy, utilities, the government, or anything else – the cyberattack will be the same, it’s just the consequences that are different.”
Tough nut to crack
For those making attacks, the chances of getting caught are low. Randal said that in the first six months of 2017, there were 350,000 attacks reported in the UK, but it’s estimated that figure only represents 40 per cent of the actual number of attacks taking place. He added that only 10 per cent of reported attacks are then investigated by law enforcement, and only 1.5 per cent result in any kind of judicial process.
In his Bank of England role, Randall helped develop new security protocols, including the creation of a specific Information Security Division, headed by himself as the Chief Information Security Officer, reporting directly to the board.
That model is now widespread in banking, completely separating the department that runs the IT infrastructure, from the team responsible for recognising and responding to threats.
“I think we have to be quite radical in how we structure the responsibility and role of those who are there to police cyber activities,” Randall said. “Seriously look at who is policing your IT, and ask is that the same person who is managing it, maintaining it, implementing it, and looking after it – and potentially covering it up? That’s the issue. You’ve got to work in harmony with the IT department, but you’ve got to have an independence there.”