The ever popular attempts to infiltrate a network through phishing scams can negatively impact more than just enterprise security Credit: Thinkstock Everyone from the CFO to the entry-level security newb is susceptible to a phishing scam. Yes, even those who have spent their careers in IT and security can fall victim to these persistent and highly sophisticated scams.When a client is the recipient of a scam that came from your enterprise, though, the consequence is not only to your network security but also to the public’s perception and trust of your business, especially if you are a financial services company. Bill Ho, cybersecurity expert and CEO of Biscom, was recently a victim of a phishing scam. While Ho said he receives scam emails all the time, this one was different. “It came from someone I’d been working with. A financial services company with whom I would be sharing confidential financial data. That made me think about the relationship with that company,” Ho said.While many security practitioners focused on preventing a breach, few are equally as mindful of the ways in which a breach can tarnish the organization’s reputation. Unfortunately, Ho said, “When I think about them or talk to them, there is this thought in the back of my mind about if I work with them, how careful are they going to be with my data?” Of great concern for Ho was the reality that this wasn’t just a friend or a colleague. “This was a business relationship at a level that required a lot more confidentiality,” he said.Bill Ho, cybersecurity expert and CEO of Biscom When these potentially disastrous situations do occur, the manner in which a company responds is critical to maintaining their business relationships. “First they need to realize they may never regain that trust; however, like any crisis situation, communication is important,” Ho said.“Phishing,” said Ho, “affects more than just your hardware. It can erode trust in clients, vendors, coworkers, partners, and more. Which means a loss in clients, a loss in revenue, and a loss of confidence in said employee from an internal perspective.”To use an analogy, Ho said, “A restaurant that has had its name in the headlines for an E.coli outbreak from contaminated lettuce has likely gone out of its way to sterilize the facility, contact vendors, and manage the public perception of their response to the health concerns.” Likely, that restaurant is now the safest place to eat, but are people going back there? When? How long does it take to rebuild that public trust?Ho said, “If the third party doesn’t feel like you are responding quickly, they lose trust. It’s important to be transparent and provide as much information as possible.”He also offered the following points to consider in thinking about detection and incident response:It’s not so much about prevention as it is detection, so have an intrusion detection strategy. It used to be people wanted to prevent it, but detection results in a much faster response. Detect it early before it causes too much damage. Detection is a shared responsibility across the organization.Have an “incident response plan” to determine who needs to do what, when, and how. Do this now before an incident so that you know exactly what needs to be done in the aftermath.When a phishing scam does occur:Be transparent with your teams, clients, and partners. You don’t want to hide it.Have a sense of urgency. Be timely about relaying the vulnerability information.Heed a high level of responsiveness. If people are telling you something’s wrong, it goes a long way to take it seriously and respond.Once the dust settles, do a forensic analysis to determine where was the entry point? How did we get scammed? How did it affect our systems?Educate and equip your teams with methods to identify phishing scams. Internal training is key and will likely become a new job requirement for most folks.Engineer a smarter, safer workplace with cybersecurity consultations. Related content news analysis Searching for unicorns: Managing expectations to find cybersecurity talent Finding the cybersecurity leaders of tomorrow means being realistic about job descriptions and providing training and mentoring for non-traditional tech people. By Kacy Zurkus Sep 29, 2017 4 mins IT Skills Careers IT Leadership feature Vulnerability vs. risk: Knowing the difference improves security Conflating security terms evokes fear but doesn't help security newbs understand the difference between vulnerabilities and actual risks. By Kacy Zurkus Sep 26, 2017 3 mins Risk Management Vulnerabilities IT Leadership opinion What the Equifax breach means to me — an end user perspective Recovery and resiliency or apathy. Which will prevail now that most everyone's PII has been exposed in another massive breach? By Kacy Zurkus Sep 15, 2017 4 mins Cyberattacks DLP Software Internet Security opinion Abandoned mobile apps, domain names raise information security risks When app creators abandon domains for bigger, better deals, what happens to all the app-specific data? By Kacy Zurkus Sep 08, 2017 3 mins Access Control Data and Information Security Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe