Stop Being “Reasonable” - Rationalize Your Security Efforts

Stop Being “Reasonable” - Rationalize Your Security Efforts

Commercially reasonable efforts refer to actions defined by what similar persons would do as judged by the community.  This judgment is based on the common average of the community, so in times of crisis or great waves of change, the collective knowledge from community to community will be different. Communities that measure, watch and continue to learn are more aware than communities that do not value these traits.

Threats to Small Banks and Credit Unions

In recent court rulings, smaller banks and credit unions were held accountable for commercial account losses due to an outside hacker compromising the banking systems. It was determined that the security controls in place were not used effectively and in a manner that was considered “commercially reasonable.” For the small banking community this is a problem, for the term commercially reasonable efforts is ambiguous, and there is no way to come away with a precise definition. What’s worse is that this problem will continue to grow because there is a widening divide between those who understand the layered risks as we become digitally more connected and rely more and more on diverse technologies that are transforming businesses and those who blissfully minimize the situation.

There are communities that reduce the threats with assumptions that they are too small to target. The terms “cybercrime” or “cyber security” haven’t helped much either, where images of large-scale, organized efforts on both sides of the fight battle it out in some other dimension. The truth is that most crimes these days play out with a digital component. Common business structure, board members and employees can be found quite easily online through corporate business pages, web searches and such sites as LinkedIn. A few trials, a call to support or picking up a business card will reveal the email default structure for the organization.  Even though you think your business doors are shut because it’s after hours, you are still wide open to attack and theft.

Securing Your Business

Reasonable security efforts would include anti-virus and email security as technologies to help minimize these cyber risks. But as the earlier court ruling pointed out, just having the controls in place doesn’t count if they were not used effectively.  

Stop Being “Reasonable” - Rationalize Your Security EffortsMcAfee’s Q3 2013 Quarterly Threats Report saw a run rate of 220,000 new malware variants daily. Therefore, daily or even more frequent .DAT updates might be in order. The story behind this data is that the malware creators have a solid understanding of the security controls and assumptions of how people and certain communities implement them.  They are not necessarily writing new functionality in each variant, but they are shifting the bits ever so slightly as to create a new footprint, forcing the security vendors to identify and create a new signature every time. The criminals rely on the fact that there will be a window of opportunity for them in the financial communities that delay their updates.

Attacking Email with Malware

Email is still one of the most common ways to inject malware into an organization with fake emails from organizations you may readily do business with. Malware is created for gain: gain in information, gain in compromising systems or gain in immediate monetary compensation. 

A recent alert from US-CERT updated its information regarding ransom-ware CryptoLocker. It reported that fake emails with FedEx and UPS tracking links have been associated with the malware that can find files and folders across hard drives, USB media, network and even cloud storage drives that are attached to the infected system. The malware encrypts data and holds it ransom, expecting payment to BitCoin within three days. This is concerning not only because of how this malware penetrates the organization, but also that it can identify data sources outside of the system itself to the networked resources broadening the compromise wider than a single system.

Mitigating this risk requires updated malware protection using email security protection that has a strong intelligence and an antivirus engine that will block spam and known malicious IP email senders for admin review before entering into the organization. It should also have the most recent and up-to-date virus scanning for both the email body and attachments. Best security hygiene practices would also expect that backups are occurring in order to recover from an attack like this, where US-CERT recommends alerting of the ransom request, and ultimately, a reimaging of the system and data restoral.

Reasonable Security Trend

The trend is that reasonable security means continued learning and awareness, keeping up with the risks to the community and evaluating the threats that are emerging. It’s not enough to just install or subscribe to security solutions. One needs comprehensive coverage across the organization with measures into what systems or accounts may have more than normal encounters with malware or malicious email.

If doing this for your organization seems too difficult, consider security as a service for email protection and endpoint protection. This may trigger additional security education opportunities or additional security controls for these systems or individuals addressing their increased security threat exposure. With this information, you now can rationalize the additional expense for the business to mitigate these additional risks and know that you are keeping up with reasonable efforts for securing your institution.

About the Author

Kim Singletary is the director of product marketing at McAfee where she is focused on how technology, mobility, data, and the Internet of Things are changing our day-to-day work environments and the ramifications of sustainable security, compliance and privacy.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.