Best Practices for Cyber-Resilience in Uncertain Times
Cyber resilience is an essential component of modern-day life in corporate America. It is critical that companies of all sizes take reasonable steps to prepare for an adverse cyber event that is, in all likelihood, inevitable in today’s business climate. The COVID-19 pandemic has brought with it a heightened cyber threat to companies that have increasingly embraced remote employment, as well as to critical industries including medical manufacturers and suppliers, financial services, healthcare, and others. Industry data indicates that cyber criminals have recently increased phishing campaigns and malware attacks. In times such as these, it is prudent for a company to evaluate its cyber-risk management and resilience practices – its ability to execute and deliver its business function following an adverse cyber event.
This January, in a continued effort to foster cybersecurity awareness, the Security and Exchange Commission released its latest examination observations: Cybersecurity and Resiliency Observations from the Office of Compliance Inspections and Examinations (“OCIE”). While the intended audience is market participants, the observations and lessons contained in the report provide easy to digest action points that are consistent with best practices with which most organizations should comply.
In developing its report, the OCIE examined thousands of transactions across a variety of industries as well as how industry participants attempt to stay informed concerning cyber-related risks and practices. While there is not a “one-size-fits-all” approach to cyber-resilience, the OCIE identifies numerous areas of best practices. The OCIE recommends that a company’s practices address critical issues including governance and risk management, access rights to and control of data, data loss prevention, mobile security, incident response and resiliency, vendor management, and training.
As with many policies, in order to effectively implement its protocol, corporate leadership must prioritize cyber-resiliency and commit to the development and execution of relevant policies as an integral part of its business plan. The OCIE recommends incorporating “(i) a risk assessment to identify, analyze, and prioritize cybersecurity risks to the organization; (ii) written cybersecurity policies and procedures to address those risks… [including a paper copy] and (iii) the effective implementation and enforcement of those policies and procedures.” The process of developing these policies must begin with allotting time for review and input by senior corporate leadership, and must also ensure internal and external communication with key decision makers, employees, vendors and customers.
A company must also evaluate access rights and controls as part of its risk assessment. This process should involve (i) identifying the location of data – including sensitive client and employee data – throughout the organization; (ii) placing appropriate restrictions on systems in order to limit data access to necessary and authorized users; and (iii) establishing controls for monitoring and preventing unauthorized access to data. According to the OCIE, organizations can – and should – take simple steps in this area by, for example, periodically requiring password changes, adopting multifactor authentication, monitoring failed login attempts, and continually updating data access restrictions.
Best practices, of course, also require a company to update and monitor for deficiencies in technological protections. Corporations must also restrict vendor access to data, develop practices for ensuring that vendors who obtain data access have developed and adhere to appropriate cyber-risk management policies, and should develop contract and insurance protections.
Importantly, the OCIE identifies examples of specific practices that organizations have adopted to minimize the risk of a cyber-attack and to be best prepared to respond, in the event of such an attack. Clearly, the risk of an adverse cyber-event cannot be ignored, and corporations across the country must engage appropriate experts and practitioners to develop, implement and update its policies. The OCIE observations and recommendations serve as yet another reminder of the critical importance of cyber-resilience in this modern age.
 The report in its entirety can be found at: https://www.sec.gov/news/press-release/2020-20.
- In Defense of Long-Term Care Facilities: Immunity, and What to do if There is Not Any
- Changes to Punitive Damages Coming to Missouri
- Retro-Fitting Reservations: The Re-Opening of Restaurants Amidst the COVID-19 Crisis
- Florida's Religious Re-Opening: Guidance For Faith Based Institutions To Mitigate Liability In Epidemic/Pandemic Events
- The Future of E-Cigarette Litigation: Is There One?
- Re-Opening States and Businesses and the Role OSHA May Play
- COVID-19 Pandemic Negligence Claims Update: Developing Legal Immunity for Health Care Professionals
- Michigan Governor Signs Executive Order Cutting Red Tape for Motor Carriers During the COVID-19 Pandemic
- Will Drug and Medical Device Manufacturers Combating COVID-19 be Subject to Tort Liability?
- Malpractice Mitigation: Utilizing Professional Standards as a Defense to Claims of Negligence in Epidemic/Pandemic Events
- Professional Liability
- Class Action
- Insurance Coverage
- Insurance & Reinsurance Litigation & Counseling
- Complex Commercial Litigation
- Cyber Risk & Liability
- Toxic Tort
- Professional Development
- Product Liability
- Social Media & Privacy
- Employment Litigation & Counseling
- Construction Litigation & Counseling
- Workers' Compensation
- Pharmaceutical & Medical Device Litigation
- Discrimination, Harassment & Hostile Workplace Claims
- Medical Negligence & Healthcare Liability