5 Costly Mistakes CEOs Make Before & After Cyberattacks

CEOs who fail to follow cybersecurity best practices can wreak disastrous consequences for their organization and customers. This is especially true for small and medium-sized businesses where CEOs wear many hats. To avoid and recover from cyber attacks, CEOs need to be aware of these common cybersecurity mistakes.

Cybersecurity Mistakes to Avoid

Mistake #1: Not Having an Incident Response Plan

A study conducted by the Ponemon Institute on behalf of IBM revealed that 77 percent of organizations don’t have a consistent cybersecurity incident response plan, and more than half of the organizations that do have a plan don’t test it regularly. 

“Failing to plan is a plan to fail when it comes to responding to a cybersecurity incident,” said Ted Julian, Vice President of Product Management and Co-Founder, IBM Resilient. Indeed, the time it takes an organization to detect and respond to a cybersecurity incident correlates with the financial, operational, and reputational impact of the incident. 

Solution: If your organization doesn’t have an incident response plan yet, then the time to create one is now. A well-thought-out incident response plan must encompass all stages of the incident response process, from preparation through detection, response, and recovery, to post-incident follow-up. The plan must be regularly tested to iron out as many kinks as possible before it’s put to use.

Backup Checklist Mockup

Losing access to critical business data can bring your operations to a costly standstill. But by implementing a proven backup framework, you ensure you can recover quickly and minimize costly downtime. Prepare for everything from cyberattacks to natural disasters now. 

Mistake #2: Not Investing in Cybersecurity Awareness Training

Statistically, almost nine in 10 (88 percent) data breach incidents are caused by employees’ mistakes, as revealed by a joint study from Stanford University Professor Jeff Hancock and security firm Tessian. Often, employees make basic cybersecurity mistakes, such as sharing passwords in plain text form or connecting to unsecured public Wi-Fi networks, because they’re not aware of the risks associated with them.

Solution: As a CEO, you need to find the time and money for cybersecurity awareness training that covers everything from password best practices to the risk of using public Wi-Fi and more. When conducted regularly, and in an easily digestible manner, cybersecurity awareness training can prevent employees from being the weakest link in the cybersecurity chain.

Even if you consider yourself to be a cybersecurity expert, you should still attend the training sessions so that employees have no reason to doubt their importance.

How to Create a Cybersecurity Awareness Training Program Ebook

Learn how to implement an engaging and successful cybersecurity awareness training program.

Mistake #3: Not Following Cybersecurity Best Practices

CEOs can get away with many things regular employees can’t, but not following cybersecurity best practices isn’t among them. Cybercriminals see CEOs as highly valuable targets, and they use increasingly sophisticated techniques to target them.

One particularly damaging technique cybercriminals often use to attack CEOs is called business email compromise (BEC). As its name suggests, this technique exploits the fact that most CEOs rely on email when communicating with employees and business partners alike. Using publicly available information gathered from the web or obtained in a previous data breach, attackers impersonate a trusted sender with the goal of tricking the CEO into disclosing sensitive information or authorizing a wire transfer payment.

Solution: CEOs can effectively protect themselves against BEC and other threats by always following cybersecurity best practices, such as actively looking for signs of email spoofing, verifying unusual requests over phone, and protecting all accounts using strong, unique passwords.

Small Business Email Security Checklist

Discover the proper setup, strategies, and tools you need to take control of your email security to prevent business email compromise.

Mistake #4: Not Investigating the Cause of the Incident

When a cybersecurity incident occurs, CEOs often want to move on as quickly as possible. While you should always strive to meet your recovery objectives, you also need to keep in mind that containment is not the same thing as remediation.

Simply pulling the plug and recovering from the most recent backup may be the fastest way to resume normal operation, but it’s not necessarily the best one. Unless you perform root cause analysis to figure out how the incident happened and take the necessary steps to prevent other similar incidents from ever occurring in the future, it’s likely that the same cybercriminals will pay you another visit.

Solution: The ability to access comprehensive activity logs can make a huge difference during root cause analysis and remediation, which is one reason why it’s a good idea to invest in security monitoring.

Mistake #5: Not Notifying Affected Parties in a Timely Manner

The direct financial impact of data breaches is no laughing matter, but the financial consequences of failing to report data breaches in accordance with data breach notification laws can be utterly devastating.

For example, all organizations that handle data of EU citizens are required to report a data breach no later than 72 hours after becoming aware of it. If they don’t, they can be fined up to €20 million ($24.1 million) or 4% of annual global turnover – whichever is higher. Not notifying affected parties in a timely manner is also a surefire way for an organization to forever tarnish its reputation and make its long-term partners and customers rethink their commitment. 

Solution: Your job as a CEO is to ensure that everyone affected by the breach, both directly and indirectly, understands what’s going on and what’s being done to prevent another similar breach from happening in the future.

Small Business Cybersecurity Cost Guide

Learn the financial impact of cyber threats on your business’s data. Plus, unlock the financial implications of in-house vs. outsourced cybersecurity. 

Don’t Stop Here

More To Explore

CybersecurityThreats

What Are Advanced Persistent Threats?

Many different cyber threats keep business owners awake at night. However, one cyber threat flies under most organizations’ radar even though most IT professionals have been ranking it as one

Identity

11 Key Ways to Protect Your Online Presence

Identity crimes, like other cybercrime activities, are always changing and adapting. Internet access provides easy access to potential victims at an inexpensive cost to cybercriminals. Unfortunately, people do not take