News

Khanapurkar: prepare for adequate response

Khanapurkar: prepare for adequate response



Cyber threats serious in UAE

January, 2016

Cyber security is a growing challenge for firms in the UAE and organisations need to be better prepared to ward off attacks, a KPMG 2015 UAE Cyber Security Survey has found.

The survey focused on UAE organisations’ readiness and ability to respond to cyber-attacks and assessed responses from key sectors in the UAE over a period of two months.

A third of respondents who participated in the survey indicated that they had been hacked in the past 12 months and took between two weeks to a month to recover. Over half of the respondents that had been hacked didn’t know they were being targeted by cyber criminals. Furthermore, only 50 per cent of respondents said they had cyber-attack contingency arrangements in place.

Nitin Khanapurkar, partner KPMG Lower Gulf, said: “The UAE is on the list of the top 10 destinations targeted by cyber criminals and it comes as no surprise that cyber threats have been growing across key sectors such as financial services, oil and gas, technology, government, retail, construction and healthcare.

“The objective of the 2015 KPMG Cyber Security Survey was to assess UAE organisations’ readiness and ability to respond to cyber security threats and the survey has thrown up some interesting insights.”

Many boards in the UAE do not have a comprehensive or accurate view of their cyber risks because threat intelligence and cyber monitoring have often been inconsistently implemented.

The survey also found that more UAE organisations need to better understand their threat profiles – including who, where and why they are likely to be targeted.

 

CYBER INCIDENT RESPONSE

To respond to these growing threats, KPMG has created a ‘cyber incident response’ that focuses on actionable results, rules of evidence, with technical security analysis and testing to help organisations stay prepared to deal with a cyber-attack.

During this phase, KPMG helps determine the source, method, and impact of a breach, while working with organisations to limit ongoing damage. This is typically a balancing act between investigating and eradicating the threat. Responses can range from allowing the malicious actions to continue in order to facilitate evidence-gathering to an immediate suppression of malicious actions in order to limit damage.




More Stories



Tags