Mitigating cyber risks with the right security controls - by Chris Moschovitis

June 06, 2017 - Front Section

Chris Moschovitis, tmg-emedia

It is no secret that cyber security risks add complexities that often restrict the process of seamlessly carrying out transactions. Real estate brokerages need solutions that ensure confidentiality, availability, and integrity of sensitive data to avert significant damages to themselves and their clients. However, real estate brokerages should never fall into the trap of thinking that a set of solutions today will deliver them safely from the cyber security threats of tomorrow. 

Unfortunately, many brokers and managers of brokerages are becoming tone-deaf to the constant narrative of “it’s not a matter of if you’ll be hacked – it is a matter of when” and are being seduced by vendors that promise “peace of mind.” These promises are dangerous and expensive fantasies that deliver a false sense of security. That said, business must go on, and brokerages are all responsible for taking pragmatic steps to mitigate cyber security risk. This can be done by selecting and applying the right security controls for law firms.

First things first: We need to recognize that there is no “one size fits all” solution. Each brokerage is different and each practice is different. Moreover, each brokerage and each broker has different risk appetites. The right controls for one brokerage will prove excessive for the next, and not enough for the third. Therefore, the first thing that must be established is what is the risk appetite for the brokerage and its individual brokers. 

The next thing to do is get a grip on business assets. What, exactly, are the things of value we are trying to protect, and what are the threats against them? Is it a matter of protecting intellectual property? Client data? Classified information? Reputation? Is it a question of physical security? Insider threats? In short, where are the threats coming from? 

It is no accident that the National Institute of Standards and Technology (NIST) framework for improving critical infrastructure cybersecurity leads with “identify” and not with “prevent.” There is no “prevent” in cyber security, and the sooner one gets comfortable with that, the sooner one will get to the real work of identifying, protecting, detecting, responding, and recovering (the five NIST framework functions) from cyber security events. 

Having identified what warrants protection, the real work begins. Accounting for one brokerage’s risk appetite and armed with one’s asset valuation and threat assessments, one is now ready to apply the right controls. Remember: Controls “do” things. They are not some abstract notion, they do-the-do! There are four kinds of controls: Preventive, detective, corrective, and compensatory. 

While there is no “prevent” in cyber security, it is essential to know that there are preventive controls that are proactive. A preventive control acts like a barrier to an attack. It hasn’t prevented the attack, but just like the barrier on the street that hopes to stop the runaway truck from hitting the building: it hopes to prevent an aspect of the attack. Think of it as a locked door. Another example of a preventive control is segregation of duties. One’s systems administrator shouldn’t know the database password, and the database administrator shouldn’t know the systems password. Security awareness training is another excellent example of a preventive control.

Detective controls are easier to understand. They detect. They know the door has been opened (e.g., a motion detector), and they do something about it. Either they close it, or alert someone that the door has been opened. Other examples of detective controls include system’s monitoring applications, intrusion detection systems, even anti-virus and anti-malware solutions. 

Corrective controls fix or restore the environment. For example, applying the right security patches and upgrades is a corrective control. Restoring your data from backup is another corrective control. 

Finally, compensatory controls are those designed to compensate for some of the damage. A disaster recovery site is a compensatory control. Cyber insurance can also be a compensatory control. Even a backup generator, a second set of servers or computers, or the ability to switch over operations at another country, all are compensatory controls.

Keep in mind that there are some solutions that span control classes. For example, an anti-virus/anti-malware solution can be a preventative control, a detective control, and a corrective one all at the same time. 

What is the right blend of controls for your organization? As previously noted, it depends on risk appetite, type of asset, type of threat, regulatory environment, budget, and skill-sets. One needs to take all this into consideration in developing a defense-in-depth cyber security strategy. 

Remember:,Brokerages have a tremendous advantage over attackers: Brokers know their firms better than anyone else, and so know what’s of value and what needs protection. More than any solution, brokers should trust themselves and rely on their own judgment and apply pragmatic controls where and when necessary and applicable. 

Chris Moschovitis is CEO of tmg-emedia, New York, N.Y.

Thanks for Reading!
You've read 1 of your 3 guest articles
Register and get instant unlimited access to all of our articles online.

Sign up is quick, easy, & FREE.
Subscription Options
Already have an account? Login here
Tags:

Comments

Add Comment