Home » Research Bytes » Avoid the Click: Building a Cyber Resilient Culture to Navigate New Age Threats
The recent AT&T data breach sent shockwaves through the telecommunications and entertainment industries, highlighting critical vulnerabilities in cybersecurity protocols. This breach, which exposed sensitive customer information, underscores the urgent need for robust cybersecurity measures and heightened employee awareness within these sectors. It also brings to the forefront the concept of cyber resiliency—an organization’s ability to withstand, recover from, and adapt to cyber threats.
The telecommunications industry, which forms the backbone of global communication, is a prime target for cybercriminals. This breach not only compromises customer trust but also potentially disrupts services, leading to significant financial and reputational damage.
For the media and entertainment industry, the implications are equally severe. Companies in this sector rely heavily on the secure distribution of digital content and protection of user data. A breach can lead to unauthorized access to exclusive content, theft of intellectual property, and piracy, which can result in substantial revenue losses and legal ramifications. Additionally, these breaches erode customer trust and loyalty, crucial elements for any subscription-based or ad-supported business model.
A notable example of the severe impact of cyberattacks in this industry is the 2014 attack on Sony Pictures by North Korean hackers. This attack led to the theft and release of confidential information, unreleased films, and sensitive employee data. The incident caused significant financial losses, operational disruptions, and reputational damage, emphasizing the critical need for advanced cybersecurity measures.
In a more recent example, hackers gained access to Disney’s internal Slack communications in a July 2024 hack by exploiting an insider within the company. This insider helped the hacktivist group infiltrate Disney’s Slack infrastructure, leading to the leak of 1.2TB of sensitive data, including unreleased projects, concept art, and login details. While Disney quickly addressed the situation, the breach exposed vulnerabilities in security measures and emphasized the need for ongoing investments in cybersecurity to maintain user trust. The attack is likely to have multiple impacts, including potential unauthorized access to Disney’s exclusive intellectual property, which could be pirated or leaked, leading to significant financial losses. It may also lead to subscriber losses, placing Disney at a competitive disadvantage against other streaming services with more robust security protocols. Furthermore, the incident impacted Disney’s brand reputation and necessitated a review and upgrade of its cybersecurity practices to prevent future attacks.
Traditional compliance-based cybersecurity measures, which focus on meeting regulatory requirements, are no longer sufficient to combat the sophisticated cyber threats of today. The advent of advanced technologies such as Generative AI has escalated the complexity and frequency of cyber-attacks. Cybercriminals are now leveraging AI to create more effective phishing scams, automate hacking processes, and exploit vulnerabilities at an unprecedented scale. This dynamic environment necessitates a shift from mere compliance to proactive and comprehensive cyber resiliency.
Cyber resiliency in an organization involves proactive measures to prevent, detect, respond to, and recover from cyber threats swiftly and effectively. For example, in a multinational technology company, cyber resiliency is strengthened through a robust employee awareness program. Regular cybersecurity training sessions across all departments emphasize identifying phishing attempts, strong password management, and recognizing social engineering tactics. Employees participate in simulated phishing exercises and interactive workshops to practice responding to real-world cyber threats. Advanced AI-driven threat detection ensures real-time anomaly detection, supported by detailed incident response plans and regular drills to refine readiness. Continuous system monitoring and prompt security updates mitigate vulnerabilities. Senior leadership reinforces a culture of cybersecurity awareness, empowering employees to protect sensitive data and respond effectively during cyber incidents. This approach has significantly enhanced the organization’s ability to withstand and recover from cyber threats, maintaining trust and security for customers and stakeholders alike.
A significant portion of cybersecurity breaches can be attributed to human error, making employee understanding and adherence to cybersecurity protocols paramount. To mitigate such risks and enhance cyber resiliency, companies should focus on comprehensive cybersecurity cyber education and training programs. Some examples include:
Recent events such as the AT&T data breach and Disney cyberattack serve as stark reminders of the vulnerabilities present in even the most robust networks. In response, telecommunications and media entertainment companies are increasingly prioritizing the cultivation of a cyber resilient culture. These efforts are crucial for safeguarding data and maintaining customer trust amidst escalating cyber threats. Pairing the cultivation of a cyber resilient culture with advanced generative AI cybersecurity technology represents a comprehensive approach. By nurturing a culture where cybersecurity awareness is paramount and integrating cutting-edge technologies, organizations can effectively mitigate risks and foster a secure environment for stakeholders. This proactive strategy not only strengthens defenses against potential breaches but also emphasizes the synergy between human vigilance and technological safeguards.
By Korea Gilreath, Associate Director, Avasant
Avasant’s research and other publications are based on information from the best available sources and Avasant’s independent assessment and analysis at the time of publication. Avasant takes no responsibility and assumes no liability for any error/omission or the accuracy of information contained in its research publications. Avasant does not endorse any provider, product or service described in its RadarView™ publications or any other research publications that it makes available to its users, and does not advise users to select only those providers recognized in these publications. Avasant disclaims all warranties, expressed or implied, including any warranties of merchantability or fitness for a particular purpose. None of the graphics, descriptions, research, excerpts, samples or any other content provided in the report(s) or any of its research publications may be reprinted, reproduced, redistributed or used for any external commercial purpose without prior permission from Avasant, LLC. All rights are reserved by Avasant, LLC.
Login to get free content each month and build your personal library at Avasant.com