The Real Cost of Cybersecurity: Avoiding Overspending While Addressing the Basics 

In today’s digital landscape, cybersecurity is a critical concern for organizations of all sizes. With an increasing number of cyber threats, companies often feel pressured to invest heavily in advanced cybersecurity tools and services. However, this rush to implement high-end solutions can lead to overspending, especially when basic cybersecurity measures are overlooked. This article explores the pitfalls of overspending on cybersecurity and emphasizes the importance of foundational security practices. 

The High cost of Cybersecurity Missteps

Statistics Highlighting the Issue 

Recent reports underline the significant time and resources required to handle cybersecurity breaches. According to the IBM / Ponemon Institute’s “Cost of a Data Breach Report 2023,” it takes organizations an average of 207 days to identify a breach and an additional 70 days to contain it, totaling 277 days (over nine months). This prolonged period can have severe financial and reputational impacts on businesses. 

Additionally, the 2024 Verizon Data Breach Investigations Report (DBIR) reveals that 68% of breaches involve human error, and 14% are due to unpatched vulnerabilities. These statistics underscore a critical issue: many breaches occur due to basic security lapses that could be mitigated with fundamental cybersecurity practices. 

The Vendor Trap 

Many organizations fall into the trap of purchasing expensive cybersecurity solutions, often influenced by vendors who promote high-end tools and services. While these solutions can be effective, they are not always necessary, especially when the basic cybersecurity measures are not in place. This misallocation of resources can lead to significant overspending without addressing the root causes of vulnerabilities. 

Essential Cybersecurity Measures 

Patching and Updates 

Regularly updating and patching software is one of the most effective ways to prevent cyber attacks. Unpatched systems are a primary target for cybercriminals, as evidenced by the surge in vulnerability exploitation noted in the Verizon DBIR. Organizations should prioritize timely updates to close security gaps. 

Two-Factor Authentication (2FA) 

Implementing two-factor authentication adds an extra layer of security, making it more difficult for attackers to gain unauthorized access. 2FA should be used for all critical systems to enhance protection. 

Regular Backups 

Maintaining and testing regular backups is crucial for data recovery in the event of a breach. Ensuring that backups are up-to-date and stored securely can help organizations quickly restore operations and minimize downtime. 

Awareness Training 

Human error is a significant factor in many breaches. Regular cybersecurity training for all employees can reduce the risk of phishing attacks and other social engineering tactics. Educating staff on best practices and potential threats is essential for creating a security-aware culture. 

Endpoint Protection 

Deploying and regularly updating antivirus and endpoint security solutions is fundamental to protecting devices from malware and other threats. Endpoint protection should be part of a comprehensive cybersecurity strategy. 

Balancing Security Investments 

While advanced cybersecurity tools and services can offer enhanced protection, they should not replace basic security measures. Organizations need to assess their specific needs and ensure that foundational practices are firmly in place before investing in high-end solutions. Here are a few steps to balance security investments: 

1. Evaluate Vendor Proposals: Scrutinize vendor offerings to ensure they meet your organization’s specific needs without unnecessary costs. 

2. Prioritize Basic Security: Focus on fundamental protections, such as patch management and employee training, before investing in advanced tools. 

3. Continuous Improvement: Regularly review and update your cybersecurity practices to adapt to evolving threats and ensure that basic measures remain effective. 

Conclusion 

Overspending on cybersecurity without addressing the basics can leave organizations vulnerable and financially strained. By prioritizing fundamental security measures and making informed decisions about advanced tools, businesses can achieve a more effective and cost-efficient cybersecurity posture. 

Patches and Data Theft

Greg Price

If you use a Windows-based computer, you are aware of Patch Tuesday and also the dark side of Windows patching. To say Microsoft’s patching process is riddled with issues would be a kind gesture.

The last several Windows 10 updates were buggy, and, in some instances catastrophic if installed. I often envision the Microsoft patching process as a game of whack-a-mole: one issue is addressed, another bursts onto the scene and the cycle seems to loop continuously.

In October 2019, Microsoft released a new update that was designed to remedy a printer driver issue from the previous update. However, many users encountered the nightmare for all Windows users: The Blue Screen of Death. If you’re not familiar with the Blue Screen, I’ll summarize. Your PC stops functioning completely.

In October, those who encountered the dreaded Blue Screen had to roll back their machines to a previous version of Windows, if they did so within ten days of installing the update. As usual, miscellaneous applications and settings had to be restored, but at least you could resurrect your PC.

Fast forward a few months and Microsoft did it again; an update is causing major problems for some.

The February Windows 10 update, KB4532693, contains almost 100 different bug fixes and some enhancements to improve user interaction, but there’s another problem lurking among the update.

Your data is deleted.

Yeah, you read that correctly, not a Blue Screen of Death, arguably, something worse. Reports from many Windows forums reveal that Windows 10 will sometimes fail to load user profiles correctly following the installation of the February update. As a result, personal files and settings disappear. Some researchers suggest the issue is related to the mechanism Windows uses to install the update. A temporary user profile is created by the update process and the profile isn’t waived, rather, Windows gets “stuck” in the temporary profile, resulting in loss of data to your other profiles.

In the forums that I reviewed, users who experienced the issue didn’t lose all data; however, in all instances when the error occurred, all files saved to the Desktop, custom wallpapers and icons vanish.

Microsoft hasn’t issued a response to the complaints, yet. However, Windows 10’s rollback feature appears to address the problem.

If you observe the issue, I suggest rolling back to the most previous working version of Windows 10. The steps follow.

Click the Start button and select settings. Go to “Update & Security”, then select Recovery. Under “Go back to the previous version of Windows 10”, choose “Get started”. Follow the instructions. Eventually the PC will prompt for a restart, and, your device should revert.

But, please note, Windows 10 can only rollback within a ten-day window following an update – if you miss the timeframe, the rollback option is no longer available.

For me, I advocate for keeping devices updated. It’s a solid method for securing a device against known vulnerabilities and ensures that you have the latest features and functionality. Microsoft’s poor history with updates is disconcerting. Many people are afraid to enable auto-updates due to the continued failures, more strikingly, large organizations fear Microsoft patches – the looming concern of “breaking” the business is a palpable anxiety.

I don’t know how Microsoft tests and manages quality for the patches. I recognize that their software is wildly popular and testing every permutation and application isn’t a reasonable expectation; however, exposing users to a seemingly incompetent process only erodes confidence and instills a reticence to staying current. In fact, Windows users often litter discussion forums with questions of “who’s done it”, hoping to find the poor soul who jumped before looking.

Let’s hope Microsoft recognizes that new features don’t outweigh reliable, safe operations.

Shifting gears, a bit, MGM Resorts recently announced a data breach. The breach occurred in July 2019, resulting in data compromise of nearly 11 million guests.

MGM didn’t specifically express the number of affected guests; however, a cybercrime monitoring firm offered that 10.6 million people had their information breached.

According to a statement from MGM Resorts, they discovered the breach last summer. The stolen data was stored in a cloud server. Among the data were basic “phone book information”. Apparently, names, email addresses, phone numbers and physical addresses were the main items stored in the cloud server. A much smaller number of guests’ driver license, military ID and passport information were exposed.

ZDNet revealed the personal information theft, indicating that it was accessible on a hacking forum. After the ZDNet report, MGM Resorts published a statement in which they acknowledged the event. The statement indicated that they hired two cybersecurity companies to assist in the investigation and pledged to upgrade the security systems.

MGM Resorts further stated, “We are confident that no financial, payment card or password data was involved in this matter.” MGM indicated they notified guests according to state data breach laws. Law enforcement is also working the incident, no indication of the cybercriminal was offered, and, no one has overtly issued claim to the breach.

Given that most state data breach notification laws do not require victims to be notified when the stolen information is limited to basic data, such as directory information, it’s likely that many of those affected have no idea their information exists among the breached data.

If you’ve stayed at an MGM Resort property recently, I suggest you follow basic fraud monitoring techniques; even though no financial data seems to exist among the data, we only know what has been released and stated. Taking a few precautions isn’t a bad idea.

Check your financial accounts for fraudulent activity. If you observe something odd, contact your financial services provider and seek a review. If you employ credit monitoring, check your credit reports. If you don’t, request a free report. Again, if you notice something peculiar, report it.

And lastly, consider changing your passwords. Despite the relatively low quality of the data, password guessing success increases as the volume of pertinent data increases.

Watch those patches and check your financial records. Be safe.

Secure You

Greg Price

This article was originally published in The Tropolitan on October 16, 2019.

Held each October, National Cybersecurity Awareness Month is a collaborative effort between government and industry. The primary goal of the effort is to provide citizens access to resources to stay safe and secure online, all while strengthening the Nation’s cyber posture.

In short, we seek to raise cybersecurity awareness among the consumers of technology.

The 2019 theme is “Own IT. Secure IT. Protect IT.”

As an individual, you play a vital role in the security of not only your own information, but those of your communities. Whether at work, school, or recreation, the importance of taking proactive steps to enhance cybersecurity can’t be understated.

I’ve worked in a variety of capacities in cybersecurity for over 25 years. As a security practitioner, I’ve witnessed firsthand the incredible potential and danger of technology.

Continue reading “Secure You”