Ted Harrington
Cyber Security Expert
September 12, 2022
If I told you that there is data that shows that higher educational institutions are performing better at security than businesses are, would you believe me?
You wouldn’t?
Well you’re in good company, because I didn’t either.
That is, anyways, until I read the Cyber Security Breaches Survey 2022, a report that was recently published by the United Kingdom’s Department for Digital, Culture, Media & Sport.
Page after page of graphs seemed to indicate that higher education in the UK was outperforming businesses when it comes to security breaches, such as:
But then something further shocked me: across the board, higher education reported significantly more breaches – of every type investigated, from DDoS to account takeover to ransomware, and much more.
So, what gives? How could Higher Ed be reportedly doing more of the right things yet producing worse results in terms of breach performance?
As I dug into the data, three things stood out to me that we can learn from this.
89% of Higher Ed reported to engage in third party penetration testing, while only 14% of businesses reported the same.
My first reaction to this shocking data point is that it must be wrong. In my experience leading a group of ethical hackers, I have indeed seen that too few companies engage this critical service, but 14% seemed almost comically low. And 89% of Higher Ed seemed almost comically high.
Then I realized what’s probably going on here:
There is an almost grotesque misunderstanding about what security testing even is.
As I wrote about in length in my bestseller Hackable: How to Do Application Security Right, the term “penetration testing” has become so widely misused and misunderstood that it almost doesn’t even mean anything anymore.
Some people mean running vulnerability scans, others mean some degree of manual removal of false positives on vulnerability scans, and others mean vulnerability assessments. These each require different levels of time, effort, and money. Each deliver different outcomes.
If we reconsider the data from this report, what it’s probably telling us is that everyone – whether businesses or Higher Ed – are all talking about different things.
One of the things that surprised me (in a good way!) about the report was to read that “All types of educational institutions are more likely than businesses to say they have reviewed supplier-related risks to cyber security…”. How cool is that! This is one of the most important, and yet overlooked and misunderstood, parts of the entire security process!
Unfortunately, the data also shows us that more than 64% of Higher Ed do not even consider this issue at all. So there is still a long road to go.
Supply Chain Risk – also often referred to as Third Party Risk and/or Vendor Risk (all 3 of which terms mean slightly different things) – addresses the idea that many organizations are attacked not directly but instead through an outside party. Do you remember that massive security breach of the US retailer Target, that became worldwide news not just because 40 million credit cards were stolen but because the CTO and CIO were fired as a result?
That was a big turning point in how security was viewed, because it was now understood to be a leadership issue and not just a technical issue (which has always been true! Except now the world began to notice). Target was breached because one of their vendors was breached, and then those vendor’s credentials provided access that led to the devastating breach.
Third Party Risk Management / Vendor Risk Management (TPRM / VRM) is a discussion that far exceeds the scope of this article but there are some actions you can consider:
(If you don’t know where to start on either of these, contact me and I’ll point you in the direction of some free resources to help)
Perhaps my favorite single sentence in this entire report was “Where there was an individual at senior level with an understanding of cyber security, decision making was more efficient.” When I read this, I audibly shouted “Yes!” and pumped my arms in the air in celebration!
Far too often, security is seen as a technical issue, one that is handled by those working in the bowels of the organization but not something that needs to reach the eyes and ears of the top levels of leadership, who focus on strategy, vision, and mission.
But I assure you: security is a leadership issue.
It’s an issue not just because it is the right thing to do (and it is indeed the right thing to do), but simply because it makes good business sense. Although the report I analyzed focused only on this topic in a qualitative sense rather than a quantitative sense, it hit the heart of the matter: security decision-making works better if a security voice is in the room. You can make decisions more efficiently and more effectively.
Here’s an effective way to think about implementing this:
Now it’s time to take action on this. Whether or not you read the report (and I recommend you do; it’s a quick read with a lot more data than I included here), make sure you go back to your organization and do 3 things:
If you implement these ideas, you’ll be able to make good strides on building better, more secure systems.
About the Author
Ted Harrington is the #1 best selling author of HACKABLE: How to Do Application Security Right, and the Executive Partner at Independent Security Evaluators (ISE), the company of ethical hackers famous for hacking cars, medical devices, web applications, and password managers. To get help with security consulting and security assessments, or to book Ted to keynote your next event, visit https://www.tedharrington.com.