Language selection

Search

Spotlight on Cybersecurity

On this page

Engaging in cybersecurity practices protects one's self and one's business from the threats of cyber-crime, identity theft, and other dangers of operating online.

Did you know

In 2016, there were nearly 24,000 cyber-related violations reported in Canada.

Source: StatsCan

The following Spotlight on Cybersecurity is intended to provide Canadian exporters with the background knowledge and tools necessary to protect their business against cyber threats. From understanding who commits cyber-crimes and their motives, to what can be done to prevent them, this short guide can help you to understand and employ cybersecurity measures.

What is cybersecurity?

Cybersecurity is generally understood to encompass any measure taken to protect online information and any asset connected to a network (e.g. data, information, hardware, among others), and secure the infrastructure on which it resides.

The Canadian Trade Commissioner Service (TCS) is pleased to introduce the following Spotlight on Cybersecurity to help Canadian exporters to take preventative measures to mitigate risks and protect their interests digitally or in person when conducting business outside of Canada and engaging in commercial exchanges with potential buyers, suppliers or partners.

Cyberspace versus cyber-attacks

Common cyber-attacks

Tips and tricks to safeguard against cyber-attacks

Did you know

You can insure your business against cyber-attacks. Cyber liability insurance will help you handle the associated costs that come along with a breach.

Sector focus

Manufacturing

Manufacturers are increasingly being targeted, not just by traditional malicious actors such as hackers and cyber criminals, but by competing companies and nations engaged in corporate espionage. Motivations range from money and revenge to competitive advantage and strategic disruption. Auto manufacturers were the top targeted manufacturing sub-industry, accounting for approx. 30% of total attacks against the industry in 2015.

Understanding cyber threats

Did you know

Hackers do not just focus on large corporations. Small and medium-sized enterprises (SMEs) are commonly targeted as they are less prepared for an attack making their data more vulnerable. SMEs also offer a back-channel entrance to larger players in their respective value chains.

Most cyber-attacks share four (4) common characteristics that account for their growing popularity (among hackers) and their increase in the frequency of occurrences.

  1. Easy: attackers with only basic skills can cause significant damage.
  2. Effective: even minor attacks can cause extensive damage.
  3. Inexpensive: many attack tools can be purchased for a modest price or downloaded for free from the internet.
  4. Low risk: attackers can evade detection and prosecution by hiding their tracks through a complex web of computers and exploiting gaps in domestic and international legal regimes.

Sector focus

Retail

Retail organizations are increasingly being targeted, primarily for credit card data. Cyber criminals are becoming more sophisticated, tapping into an ever-expanding toolkit of new techniques to access massive quantities of confidential records more efficiently than ever. Threats to retail may include data breaches, denial of service, third party payment breach, and insider man-in-the-middle attacks. The U.S. is typically one of the largest targets in this underground market

Who is carrying out cyber-crime?

Today, hackers are divided into four (4) categories:

  1. Activist: Often referred to as "hacktivism," these hackers are primarily focused on raising the profile of an ideology or political viewpoint, often by creating fear and disruption. They are generally non-violent in nature. Some examples may include the promotion of internet freedom and freedom of speech.
  2. Individual hackers: Generally act alone and are motivated by being able to show what they can do. In essence, this is someone who exploits weaknesses in a computer system or computer network. They may be motivated by challenge or enjoyment, or to evaluate those weaknesses to assist in removing them (i.e. a "white hat" hacker).
  3. Nation state: These hackers are sponsored by nation states and are generally focused on improving the geopolitical position and/or commercial interests of that state. Some examples include obtaining intelligence from adversaries, cyber espionage, stealing secrets from adversaries, disrupting or damaging an enemy's military infrastructure, propaganda, and distracting an enemy during a real attack.
  4. Organized crime: This hacker is focused solely on financial gain through a variety of mechanisms. Some examples may include identity theft, theft of credit card information, extortion (via ransomware of DDOS), click-jacking, pirating software, monetizing computer data in any way possible.

Terrorist use of the internet

Terrorists are aware of the potential for using the Western world's dependence on cyber systems as an exploitable vulnerability.

Sector focuses

Critical Infrastructure

Attacks on critical infrastructure have become a growing cause of concern for governments and private providers around the world - whether inflicted by cybercriminals seeking financial gain or by hackers as political acts aimed at undermining governments' and companies' credibility. The increase of infrastructures running on internet-facing networks has led to an increase in the number of cyber-attacks to the same infrastructures.

Government

Threats may include cyber espionage, national security information loss, disruption of critical infrastructure and national defence, disclosure of tax payers personal and business information, loss or theft of resources, insider man-in-the-middle attack, or hacktivism.

High Tech

Unlike the previous examples, ICT companies are often the organizations making it possible for the previously mentioned companies to manage, process, and share data. Cyber criminals are targeting their networks to obtain sensitive data. The most recent breaches were the result of attacks that exposed financial and credit card data, and volumes of personally identifiable information.

Administer cybersecurity prevention (5 key areas):

  1. Detection:
    • These solutions should help monitor for deviations from the normal state of activity. This would be the reinforcement to the first line of defence mentioned above.
    • Examples of solutions: Continuous (24/7) monitoring; anomaly & threat detection; user and application awareness; predictive analytics.
  2. Identification:
    • The first core function of cybersecurity is to identify the organization's cyber risk, which is the amount of risk posed by the organization's activities, connections, and operational procedures.
    • Examples of solutions: vulnerability assessment; proactive cyber intelligence; governance, risk & compliance; asset management.
  3. Protection:
    • The next core cybersecurity function is to ensure that the organization has the appropriate safeguards or controls in place to mitigate the various types of threats. This is the first line of defence.
    • Examples of solutions: threat prevention; access control; data security; patch management.
  4. Recovery:
    • The development and implementation of a recovery plan includes appropriate processes and procedures for how one intends to restore confidence in the recovered systems and data.
    • Examples of solutions: continuity of operations; disaster recovery; threat mitigation.
  5. Response (or level of responsiveness):
    • It is important that an organization prepare for an incident, including knowing how the organization will respond if an incident occurs.
    • Examples of solutions: incident response; malware analysis; forensic remediation.

Sector focus

Healthcare

Healthcare records represent an attractive target for cyber criminals, containing as they do various bits of sensitive information, such as social security numbers, all in one place. The global healthcare cybersecurity market size was valued at nearly USD $5.5 billion in 2014. Key factors attributing to its rapid growth include the threat of cyber-attacks, regulatory and security compliance related issues, and data leaks from within the organization triggered by external or internal factors. Furthermore, increasing instances of patent infringement, theft of intellectual property, business secrets, medical identity fraud, and loss of electronic patient health records (E-PHI) and social security records are also expected to boost the usage of products in the field of healthcare.

International issues related to cybersecurity:

Sector focus

Banking and financial services

The banking and financial services sector has been a prime target for cyber criminals over the last five years. Some examples of the methods cyber criminals use to target this sector include: account takeovers, third party payment breach, market trading exploitation, ATM skimming, mobile banking exploitation, and insider man-in-the-middle attack.

How the TCS can help

Tip

Cyber-attacks can result in more than monetary losses due to lost time and data recovery. Invest in security training to avoid potential damage to your company's reputation and relationships with customers and partners.

The Canadian Trade Commissioner Service (TCS) can provide owners and representatives of SMEs with valuable insight into new markets that takes into account cyber risks. Most notably, the TCS connects clients with qualified contacts so as to prevent interactions with fraudulent websites and companies, and reduce the risk of identity theft.

Are you ready to export?

The Step-by-Step Guide to Exporting will help you to:

Download this free guide and gain access to all TCS export publications through MY TCS.

Additional resources on cybersecurity:

Date modified: