Reasonable Risk - What is it?

 

A cyber-attack happens every 39 seconds (Vuleta, 2022). For this reason, businesses have a legal obligation to implement a “reasonable security posture” (Alliant Cyber Security, 2019). They must provide adequate security to keep private and sensitive data safe. Because of the quickly changing landscape of cyber-security threats, it’s difficult to expressly define what measures are deemed “reasonable security.” Consequently, “reasonable security” definitions are kept very high level and vague. Legal action can and has been taken against companies who became victims of cyber-attacks.

In 2017, shareholders issued a derivative law suit against the credit reporting agency, Equifax (Alliant Cyber Security, 2019). The shareholders won the suit after proving Equifax:

1.      Failed to implement an adequate patching process

2.      Failed to use adequate encryption levels

3.      Failed to implement adequate authentication process

4.      Failed to adequately monitor their network for security breaches

5.      Stored sensitive data in easily accessible public channels

6.      Relied on obsolete, outdated software

7.      Failed to archive obsolete data

There are many standards that can be used to help determine and implement an adequate level of computer system security. The Center for Internet Security Critical Security Controls (CIS CSC) details a reasonable security posture, upon which secure environments are able to be built (Alliant Cyber Security, 2019). In 2016, California Attorney General, now Vice President Kamala Harris released the California Data Breach report 2012-2015 that among other things stated that the 20 controls in the CIS CSC define a minimum and adequate level of information security. California set a precedence by requiring proof that the companies security baseline is at an adequate level to protect its customers, hopefully other states will follow their example.

There needs to be a balance between security and the ability to perform work. A few years ago, our company hired an external security consultant to come in and make our network as secure as possible. One consultant came in, we were told to give him access to everything, and he spent about 3 weeks in our lab, we had very little insight into what he was doing. At the end of the 3 weeks, he briefed management, and left. We were told our network was now super secure and we should continue to support the environment. As soon as we logged in, we quickly noticed there was very little on the network that was actually still functioning. The network was so secure, nothing was working. For starters, none of our security applications worked such as: antivirus, Windows patching, Tripwire, and Logrhythm. Some of the very software that was needed to help protect our network was no longer functioning. Email and print services didn’t work, among other things needed for users to perform their basic daily duties. We spent the next few months peeling back the layers of security he had applied to the network, just to make the basic services function again so the users can work. This is one example of what happens when reasonable risk is not defined and accepted by the company, and security is defined solely by a security consultant.

 

References

Cybersecurity risk: What does a "reasonable" posture entail? Alliant Cybersecurity. (2019, October 18). Retrieved March 16, 2022, from https://www.alliantcybersecurity.com/cybersecurity-risk-what-does-a-reasonable-posture-entail-and-who-says-so/

Vuleta, B. (2022, January 17). 55+ scary but useful cybersecurity statistics in 2022. Find Best Law Jobs in the US in 2022. Retrieved March 16, 2022, from https://legaljobs.io/blog/cybersecurity-statistics/

Comments