£5,000,000 versus £40,000

£5,000,000 versus £40,000

A significant proportion of company leaders see Cyber Security as their biggest risk. Understanding the importance of good Cyber Security practices is relatively easy, determining how best to implement those practices isn't. That is where sometimes you need an expert.

exc-5c4e46af21c67c8d50f693f1

A significant proportion of company leaders see Cyber Security as their biggest risk. Understanding the importance of good Cyber Security practices is relatively easy, determining how best to implement those practices isn’t. That is where sometimes you need an expert.

While it may appear that new technologies are creating new opportunities for hackers to cause damage, the converse is, in fact, the truth. The majority of the attacks seen in every day are merely new revolutions of old versions. The internet is cyclical like that.

Organisations must identify where their most significant risks exist, and the data which requires the most protection. One continually evolving risk is Phishing, especially Spear Phishing. Spear Phishing is where individuals, often company executives, are targeted in a manner designed to help secure access to the internal information. Spear Phishing is not just an email-based attack, as is often thought. Spear Phishing is performed over the phone, in person and by letter too. It can be rather hard to defend against, and no technology can help.

A new client first came to us after a failed £5 million security initiative. They were sold a lot of point solutions, and it just did not work for them. The problems were numerous for the client, many of the suggested measures did not get implemented, and there was continual resistance from the business. They saw security as a hindrance to performing their jobs. So they brought us in to see if we could turn the initiative into a success.

We started by involving all of the departments in the security journey. We worked with each department to identify what information they used and stored and what parts of the information needed protecting. By understanding what needed protecting as a departmental level, we could use a prioritised approach to security, thus gaining a more comprehensive plan moving forward as well as a buy-in.

Our client had already identified Phishing and their biggest concern, so we built an education program around Phishing. We avoided performing Phishing attacks and appointing blame to those who failed it. Instead, we used the positive and celebrated those who spotted the attack. Within three months the success rate had risen to 4% to more than 92%. And because we used a prioritised approach to securing the sensitive information within the clients’ environments, the information was secured, so the 8% did not pose any increased risk to security.

So what did £40k buy them? That was the cost of a one-year Continual Cyber Assurance program. During the year we delivered many key services:

  • Scheduled, regular vulnerability assessments

  • Quarterly external and six monthly internal penetration tests

  • Review of all their policies, processes and procedures

  • Security Awareness workshops and lunch time sessions

  • 4 “breakfasts with a hacker” (a kind of show and tell with our pentesters)

For more information on our Continual Cyber Assurance service, you can visit the service pages here.

  • Recent Articles
Author Details
Founder & CEO at Hedgehog Security

Peter has been in the Information Security world since 1999 and in IT in general since 1996. His work history contains a unique blended balance between the development of exceptional technical capabilities and business knowledge. Peter is a proud father of twins and enjoys GT endurance racing on the weekends.

We would like to keep you informed about our services. Please tick the options below to receive occasional updates via

  • penetration testing steps
    Peter talks to FindMyUkCasino
  • Malware
    SB Tech Breach

    Last week saw SB Tech Breached by the hacking group Maze. It seems that every week the group are announcing more victims.  GameOn asked our CEO Peter Bassill, to give us some insight into the attack. The GameOn article is here.

  • Privacy
    Howto VPn

    In our “How to securely” series we asked our followers what tools they would like a simple guide on to help them stay secure online. There seemed to be a lot of confusion as to what a VPN is and why you should or should not use one. So we asked Peter to help.

  • WhatsApp
    How To Whatsapp Safely

    WhatsApp is among the fastest-growing instant messengers out there, and almost a social network in its own way. But if you are using it, there are some steps you should take to protect your security and privacy.

  • Morrisons Breach Update

    The UK’s highest court ruled that Morrisons can not be liable for a criminal act of a person seeking to harm their business. On April 1st, 2020, a panel of five justices unanimously ruled that Morrisons was not “vicariously liable”.

  • Remote Working Considerations

    With the current pandemic situation, we all need to be taking remote working considerations. While adjusting the work paradym, it is vital to keep a mind’s eye on the security and safety of the businesses information assets

  • Securing Zoom
    How To: Securing Zoom

    In this guide we are looking at how to go about securing zoom. Since the onset of the global pandemic, we have seen surge in “zoom bombing”. This is where people with malicious intent look for in-progress zoom meetings to join and cause trouble.

  • Software Security
    Dell EMC iDRAC memory corruption Vulnerability

    A critical vulnerabiltiy has been identified in Dell EMC iDRAC7, iDRAC8 and iDRAC9. Some unknown processing is affected by this issue. Manipulation with an unknown input can lead to stack based memory corruption.

  • Hiscox Sues for Failing to Disclose Data Breach

    On March 27th, Hiscox Insurance Company Inc. filed a complaint against law firm Warden Grier for concealing a data breach that occurred back in 2016.

  • Software Security
    Privilege escalation on Nginx Controller up to 3.1.x Controller API

    A critical vulnerability has been identified in Nginx Controller up to 3.1.x (web server,) affecting an unknown code block of the component Controller API.

Share on facebook
Facebook
Share on google
Google+
Share on twitter
Twitter
Share on linkedin
LinkedIn
Share on pinterest
Pinterest
Scroll to Top