Advancing UK Aerospace, Defence, Security & Space Solutions Worldwide
  • Home
  • /
  • Features
  • /
  • Why cyber security is essential for protecting reputations

Features

Why cyber security is essential for protecting reputations

As Cyber Monday approaches, Radmila Blazheska, CMO, SecurityHQ, defines the true impact of security breaches on an organisation's reputation and how to reduce your chances of a debilitating attack through damage control.

A cyber-attack and with it a potential data breach, will not just ruin a company’s reputation but has the potential to ruin years of effort from a PR and marketing perspective. A data breach would potentially end in financial loss, risk of brand reputation or essentially business closure.

Regardless of what industry you are in, or how big your organisation, marketing is at the heart of most companies. It is the department that builds on the brand image, conveys the right ethos and promotes the company values. Marketing is what nurtures client relationships and partnerships. It makes information accessible and businesses stand out.

Advertisement
ADS S &P RT

Businesses need and rely on their marketing teams. So, when malicious activity and a single cyber-attack can destroy all this work with one swift move, it is worth dedicating some time to.

Reputation

Think of everything that makes your company what it is today. All the people, the processes, the technology, the relationships, the branding, everything that ever went into creating what your business represents today. This can be destroyed in an instant.

A data breach and with it a PR crisis, has the potential to significantly affect the image of an organisation.

Often seen on par with poor customer service, Forbes' The Reputational Impact of IT Risk report highlighted ‘that 46% of organisations had suffered damage to their reputations and brand value as a result of a breach. Another 19%  of organisations suffered reputational and brand damage as a result of a third-party security breach or IT system failure.’

CSO goes as far as to say that ‘customer loyalty damage is done in the event of a breach, and that sales do take a nose-dive. Target’s sales fell by 46%  year-on-year in the fourth quarter of 2013 to $520 million (or 81 cents a share), while eBay (breached mid 2014) admitted declining user activity impacted its quarterly net revenue.’

Image By Arda Savasciogullari / Copyright Shutterstock

Say, for instance, that your marketing team spends months creating a shiny new company website. Between the research, content creation, design, branding, development, review and testing, a lot of time and money is invested in the process. Yet no matter how good your site is, no matter how hard the team worked, no matter how wonderful the words, or how interactive the images, if a data breach occurs within the company, people will have less faith in the service. Also, you will never know the true value of your marketing efforts if your audience does not trust your security/ service.

Social Accounts
The majority of organisations have a public profile. Be it Twitter, LinkedIn, Instagram or Facebook, social media reaches audiences across the globe. From these, links to forums, groups and other social media pages can be accessed. The marketing team dedicates a great deal of time formulating content for these sites, creating posts, coming up with designs and more. But if the account is compromised, this could put the whole operation and company at risk.

You can trust your own marketing team…. surely?
Not only can a security breach occur from outside the company. But employees often threaten the security of a company without even being aware that they are doing so. Sure, malicious activity does happen from time to time, often from a disgruntled employee. But both malicious and accidental threats to the organisation happen internally when the right security measures are not in place.  

Advertisement
ODU RT 2

This is why User Behaviour Analytics (UBA) is essential to understand the actions within an organisation and to highlight and stop unusual activity before the damage is done. By using ML algorithms, expert analysts are able to categorise patterns of user behaviour, to understand what constitutes normal behaviour, and to detect abnormal activity. If an unusual action is made on a device on a given network, such as an employee login late at night, inconsistent remote access, or an unusually high number of downloads, the action and user is given a risk score based on their activity, patterns and time.

Marketing automation

Marketing teams often work with IT or data departments within the company. Usually if the company is small, it may not have a dedicated Data Protection Officer and often the Head of Marketing fills in this position. Hence, marketers need to make sure that all data in the company follows the legal procedures and local/global compliance. Marketing automation platforms need to be reputable and privacy policies on data gathering processing must be regularly updated.

If you share data across different departments, you will need to find out how data is sourced, who looks after it and who owns it. It is important to talk to your IT, data and CRM experts but, most of all, get all of your marketers and marketing team under one roof and talk about their processes. You will be surprised how different teams and departments have different email marketing procedures. In addition, discuss their lead management, audience segmentation or marketing strategy. Who sends what, when and to whom?

Compliance with the right rules and regulations is crucial to cyber security and data protection.
 
So, as a marketing team, how do you Reduce your chances of attack?

  1. Ensure that you are utilising the right data regulations (GDPR), and that security compliance with these measures are met.
  2. Ensure that password policies are updated, maintained and reviewed regularly.
  3. Ensure security training across the whole of the company, especially in how to spot a phishing attack. Everyone needs to know how to keep their systems safe, and what to do in the event of an attack.
  4. Regularly update and secure portable devices.
  5. During COVID-19, the majority of workforces will be working remotely. When doing so, ensure that your marketing team only uses a trusted and secure WIFI, and are vigilant when it comes to keeping sensitive data private when sharing communal/shared living spaces.
  6. With the upcoming Cyber Monday (30th November), this being one of the biggest campaigns in the year for marketers, lots of hackers will us a multitude of phishing techniques to steal data. Marketers should prepare in advance for this, mainly by checking to see if there are any hoax websites that look like their own. This can be checked via Managed Network Detection and Response.


Image By geen graphy / Copyright Shutterstock

Despite the hard work of your marketing team, it only takes one successful attack to bring all this work crumbling down.


 

Advertisement
Babcock LB
Public and private sector collaboration shaping modern defence

Features

Public and private sector collaboration shaping modern defence

9 December 2024

Tristan Wood, founder of Livewire Digital, explains how the UK is leveraging its advanced manufacturing sector and partnerships with industry, government and international allies, to transform military capabilities, with COTS solutions in the vanguard.

Collaboration key to managing supply shocks

Features

Collaboration key to managing supply shocks

20 November 2024

Neil McManus, a Partner and aerospace and defence specialist at Vendigital, encourages manufacturers to collaborate closely with suppliers to mitigate the impact of shocks and supply chain disruptions.

Harnessing AI for aerospace cybersecurity

Features

Harnessing AI for aerospace cybersecurity

28 October 2024

Graham Younger, VP of Aerospace at Expleo, looks at how the use of AI technologies can enhance cybersecurity across the aerospace sector.

Winning with data on the battlefield

Features

Winning with data on the battlefield

14 October 2024

As real-time data streaming on kit, soldiers, assets and even from space transform the battlefield, Rob Mather, VP, aerospace and defence industries, IFS, examines why interconnected technologies and data streams are now critical to mission success.

Advertisement
ODU RT 2
Bridging the gap between design and production

Features

Bridging the gap between design and production

7 October 2024

Simon Farnfield, event director at Advanced Engineering, explores the potential of the digital thread concept to close the disconnect between design and production which plagues many manufacturing projects.

Countering defence cyber risks via zero trust

Features

Countering defence cyber risks via zero trust

1 August 2024

Gary Barlet, Public Sector CTO at Illumio, advocates implementation of zero trust strategies to address the biggest cyber threats to defence.

Advertisement
ADS S &P RT