You are on page 1of 1

PQ CIMA spotlight

You’ve been hacked!


Ken Witt explains the growing role of the management
accountant when it comes to protecting against cyber attacks

T
he recent global WannaCry and to steal data and money or cause denial
Petya cyber attacks were a of service. The most common malware
wake-up call for many types are:
organisations. The extent of Petya is not • Ransomware used for denial-of-access
known yet, but according to reports there attacks, which lock computer systems
were around 2,000 attacks on a single until a ransom is paid.
day, crippling businesses and • Botnets, a network of infected
government agencies around the world. computers controlled by the attacker.
WannaCry is estimated to have affected • Malvertising, where online
more than 200,000 computers and, with advertisements are used to spread
the NHS being one of the victims in the malwarePhishing, usually in the form of
UK, it meant that even operations had to an e-mail made to look like it comes from
be cancelled. a trustworthy or legitimate source. By
Cyber threats can have severe clicking on a link in the mail or by
consequences: lost business, fines, opening an attachment, the user installs
lawsuit costs and settlements, and malware on their computer.
reputational damage, among other Another threat is application attacks
things. There are predictions that the via phone apps or home devices
financial loss from WannaCry could be connected to the internet.
hundreds of millions of pounds.
What makes your systems vulnerable?
Who’s in control? Weaknesses can be traced back to
According to a 2017 Deloitte report, only technical, procedural or human flaws.
5% of FTSE 100 boards appear to have a Among technical problems are software
director with specific cybersecurity defects or not using adequate security • Protecting sensitive data such as credit
expertise – a clear cybersecurity weak protections. Procedural vulnerabilities card information, for example, through
spot. Management accountants and can be caused by system configuration encryption.
finance professionals can play a big role mistakes or if staff ignore software
in helping organisations identify and security updates. Nevertheless, many Responding to cyber breaches
mitigate cyber security risks. Chief problems and vulnerabilities are caused Centralisation is an important element of
financial officers work at the heart of an by users themselves, for example, by cybersecurity, especially for big firms with
organisation, and usually have ownership using weak passwords or clicking on large numbers of computers, laptops and
of risk management, asset protection and links or attachments from unknown mobile devices. The ability to manage
control, and business continuity. All of parties. software updates or security protocols
this is affected by cybersecurity, so it’s through a centralised management
only logical that finance professionals Cybersecurity objectives ensures better control. Centralised
take care of this area as well. Risk Organisations should define their key management is also an option for mobile
management is also a core competency cybersecurity objectives. Key objectives devices as third-party mobile device
of management accountants, making include: management (MDM) products are now
them the ideal partner to help • Enabling continuous access to and use available. For laptops, whole disk
organisations develop their cybersecurity of information and systems. encryption is vital as it prevents
strategies. • Protecting information from unauthorised access in case laptops are
You cannot protect your company unauthorised access and disclosure. stolen or lost.
without knowing what the threats are. To • Guiding against data modification or Further security features are network
help management accountants destruction. configuration and firewalls; application
understand security risks, approaches • Guarding against the improper use, firewalls; and antivirus and endpoint
and responses to cyber threats, the modification or destruction of systems. products.
AICPA has introduced the CGMA To achieve these objectives,
cybersecurity tool. This new resource businesses need to implement security What can you do?
provides a practical guide to combatting mechanisms to protect information Finance professionals have a
cybersecurity intrusions to help ensure assets, detect malicious activity and be responsibility to understand and mitigate
the success of organisations. able to respond effectively when these the business risks associated with a
attacks happen. These measures could • Ken Witt, cybersecurity attack. Our CGMA
Understanding cybersecurity include: Technical cybersecurity tool will help you guide your
To win the war you need to know who • Requiring identification, such as Manager – organisation to develop an organisation-
your enemy is – and what weapons they usernames, to make sure that there is Management wide approach to protecting against cyber
use. While you’ve got your ‘basic’ cyber accountability. Accounting, attacks, ensuring the continued success
criminals, cyber attacks can also be • Authenticating this identification via Association of of organisations.
carried out by business competitors, passwords, fingerprints, etc. International The CGMA cybersecurity tool can be
insiders such as former employees or • Only allowing particular types of access Certified downloaded – go to www.cgma.org/
even other countries. Cyber criminals or transaction for users with verified level Professional resources/tools/cgma-cybersecurity-
often use malicious software – malware – of authority. Accountants tool.html PQ

26 PQ Magazine January 2018

You might also like