On taking a closer look at the findings of PwC’s corporate cyber resilience survey 2024 (Global Digital Trust Insights Survey) I realise that business leaders are greatly concerned about the potential costs of cyberattacks. These include a potential ransom payment in the event of a ransomware attack, system recovery, and potential compensations to customers for the company’s inability to supply its goods or services while it’s dealing with the consequences. Small companies may find such costs unaffordable.
According to CERT’s operational report for 2023, the most active cyberattackers in Latvia are hacktivist groups, as we read the same names that took part in cyberattacks in Ukraine before the war officially began. In Ukraine, hacktivist attacks changed their nature rather quickly – scammers and thieves dominated again in autumn 2022, as reported by the National Bank of Ukraine. Latvia shows the same trend – with invariably high levels of hacktivist attacks, it’s ransomware operators and scammers that increasingly harm our companies.
To avoid an unenviable situation like this, each organisation needs two types of controls or sets of measures: governance controls and technology controls.
For governance controls, it’s crucial that an organisation has employees each responsible for cybersecurity in their respective areas. The CEO is personally responsible for effective cybersecurity controls and the board should understand whether the company is a provider of essential and important services or whether it finds itself within the supply chain of a provider of essential and/or important services as defined by the National Cyber Security Act, and should put statutory controls in place accordingly. Even if your company is not subject to this Act, the controls it stipulates are necessary and will reduce the chance of falling victim to a cybercriminal. Your chief risk officer should ensure that cyber risk management is not separate from your company’s overall risk management, that is, cyber risks and mitigation controls should be on the same list with geopolitical and economic risks. Your chief financial officer should be absolutely clear about the investment required for cybersecurity, its costs and potential losses – how much you would have to pay if you faced a ransomware attack and whether your company needs cyber risk insurance. The task of your chief legal officer is to ensure your company understands the cybersecurity legislation and takes steps to stay compliant. Your legal officer should also go ahead and learn how to document the result of a cyber incident for insurance and police purposes. Your chief information technology (IT) officer is responsible for effective technical controls in your IT infrastructure and systems (access controls, testing software before installation, monitoring network data flows, etc). Your internal auditor has to make sure all these controls are running and your company is well protected from incidents. A small company won’t have all of these employees. In that case, the board should be doing these tasks and consulting an external service provider if necessary. For example, at least a one-off cybersecurity review by an external service provider would be required. Ideally, such reviews would be conducted every year.
Today’s cyber risks have a higher probability and more expensive consequences than ever before – you need to restore your operations and may have to pay ransom money and penalties to your customers if you are unable to supply your goods or services. If we look back at similar cybersecurity surveys, the top risk in 2018, for example, was a penalty for a personal data breach. Although the personal data protection rules and compliance pressures are still high, the penalties remain and are even being enforced, the business leaders’ concern levels have dropped in comparison to fraud and theft in the cyber space.
If you have any comments on this article please email them to lv_mindlink@pwc.com
Ask questionThe media have been actively using the term ‘cyber warfare’. At this year’s ‘Lampa’ Conversation Festival, I took part in ‘Are we ready for cyber warfare?’, a discussion held by the Ministry of Defence. At the moment we are unable to draw a clear line between the kind of cyber warfare that calls for a military response and the sort of cyber warfare that qualifies as an attack under the Criminal Code. Yet cyber warfare is definitely going on in Latvia and companies should be monitoring their cyber security carefully.
Over the last six months I’ve been comparing the information technology (IT) inventory in a number of Latvian companies with their global industry peers. PwC makes a comparison in the course of developing a company’s IT strategy or assessing its digital transformation maturity. For comparison purposes we use similar corporate indicators gathered by the American Productivity & Quality Center, a leading global authority, and surveys of IT practices in various industries. The results show a systemic trend.
Every five years or so, each information technology (IT) officer looks back at performance and builds a new corporate IT strategy. A benchmarking study that involves comparing your current IT governance parameters with similar companies is an integral part of strategic planning. Comparable parameters (e.g. IT costs per user or per euro earned, the percentage of technology maintenance costs in total technology costs, or the number of computer hardware units to be serviced per specialist full-time equivalent) depend on the database you’re using, they’re easy to understand, and selecting them raises no questions.
We use cookies to make our site work well for you and so we can continually improve it. The cookies that keep the site functioning are always on. We use analytics and marketing cookies to help us understand what content is of most interest and to personalise your user experience.
It’s your choice to accept these or not. You can either click the 'I accept all’ button below or use the switches to choose and save your choices.
For detailed information on how we use cookies and other tracking technologies, please visit our cookies information page.
These cookies are necessary for the website to operate. Our website cannot function without these cookies and they can only be disabled by changing your browser preferences.
These cookies allow us to measure and report on website activity by tracking page visits, visitor locations and how visitors move around the site. The information collected does not directly identify visitors. We drop these cookies and use Adobe to help us analyse the data.
These cookies help us provide you with personalised and relevant services or advertising, and track the effectiveness of our digital marketing activities.