New Federal Law: Private Sector, you have 72hrs to Report Hack

Pablo Celorio

Small Businesses across the United States are exposed to a impressive set of cybersecurity attacks. Just in the last year research shows an increase of 424%. That is a mindblowing increase and it has to do in part because in the last 2 years small businesses have boosted their digital operations

According to the Small Business Administration 60% of small businesses now operate entirely online, meaning they depend on their digital investments, infrastructure, communications, data, and even presence. 

If your business yearly revenue depends on online sales, it means that the business is processing interested customers of your products or services 24/7, and this availability is fundamental for your market. If you stopped your website and online store one day out of 365 days, simple math would say you would loose 1/365th of your yearly revenue. For example if your revenue is $365,000 you would loose a $1,000. A manageable loss.

Now, what would happen if a hacker destroys all your data, spreadsheets with your accounting, inventories and records of purchases, the emails where you had the communications with your clients and agreements about next steps which you rely on to perform their work, which a  lot of times is time sensitive, and even worst, the hacker takes down your website, delete. Meaning, unless you have an offline back-up of your site -which most small business don’t- you are going to have to reinvest the money, time and work to build it again.

Some of your clients can’t feel like they are exposed to your business unreliable security, especially if you handle relevant information about them, best examples are law firms and accounting firms. In that case, the reputational damage would be catastrophic, and lastly, the government has to protect the consumers more than your business. There are several laws that you would become familiarized, once it happens, because you are legally required to report any hacking to the State and Federal authorities and your affected clients.

Of all the cybersecurity incidents for which we saw an increase of 424%, 85% of those were Ransomware attacks to small businesses and 66% of those businesses stop operating because the losses were too great.

We don’t see this alarming situation in the nightly news, as we see the rise in violent crime and personal scams, and the costs of inflation and lack of employees. Cybersecurity is complex, expansive and boring. 

We are here for you and your business. Our expertise is broad and comes from a small business need for cybersecurity instead highly specialized hackers and computer scientists that expect to be paid generously for their specialized skills. We work from a budget-friendly position to protect your business from the most fundamental and routine automated hacks, instead or charging you thousands of dollars to protect infrastructure you are just renting from service providers and from direct targeted state actors that have nothing directly against your business.

 

New Federal Law: Private Sector, you have 72hrs to Report Hack

Managing Partner
 

The new law mandates companies to report hacks to the U.S. Department of Homeland Security within 72 hours of discovery of a hacking incident, or 24 hours in the company pays a ransom. FBI officials last year estimated that the bureau has visibility into less than 25% of cyber incidents, which limits the intelligence collection and understanding of the nature of many hacks and the techniques used by cyber criminals affecting vulnerable U.S. Industries.

The law’s mandatory requirement is expected to give U.S. officials deeper insight into the nature of global hacking.

The legislation positions DHS’s Cybersecurity and Infrastructure Security Agency as a central hub for receiving private sector incident response reports, sharing threat data and tracking the evolution of ransomware, a pernicious issue for American business that has been difficult to quantify. Victims reported $29 million in ransomware-related losses to the FBI in 2020, the most recent figures available, compared to $406 million in extortion payments observed by the cryptocurrency-tracking firm Chainalysis Inc. during the same year.

CISA Director Jen Easterly praised the Senate’s passage of the bill, saying it gives her agency “the data and visibility we need to help better protect critical infrastructure and businesses across the country from the devastating effects of cyberattacks.” 

“Put plainly, this legislation is a game-changer,” Easterly said.

The agency lists 16 broad sectors spanning health, energy, food and transportation as critical to the U.S., although the new legislation is yet to spell out precisely which companies would be required to report cyber incidents. 

CISA has not said how it will use data gleaned from breach reports, but has been seeking to build its capabilities and work more closely with the private sector on a voluntary basis. In recent months, it has established emergency real-time Slack channels to swap information on hacks with affected companies.

CISA also is funding the Cyber Safety Review Board, an advisory body created this year to study major cyber incidents with the hope of minimizing the fallout from future attacks. 

Brock Dahl, cybersecurity counsel at Freshfields Bruckhaus Deringer, said the legislation was well-intentioned, though cautioned that it would take time for specific regulations to come into focus. 

“There is already a vehicle for sharing information with DHS, but there’s never been any significant motivation for voluntarily sharing that threat information,” said Dahl, formerly deputy general counsel at the National Security Agency.

“The current impact of the legislation also remains unclear due to lack of definition over exactly which companies will fall under the reporting requirements, which will be clarified in regulation,” he said, adding it was unclear what obligations this placed on the federal government to help combat the ransomware scourge and whether companies would get valuable information back.

Top Justice Department officials, meanwhile, have expressed concern that the bill gives investigators less insight into potential cybercrime because companies don’t have to directly report intrusions to federal law enforcement. 

“In its current form, it would make the public less safe from cyber threats — slowing aid to victims, hampering identification of other companies the same attackers are targeting, and undercutting disruption operations against cyber threats,” FBI Director Chris Wray said of the bill in a statement to Politico.

In a series of tweets, CISA Director Jen Easterly pledged to share relevant details with law enforcement “immediately.” 

The law also comes into effect as U.S. firms, particularly in the financial sector, are bracing for potential blowback in cyberspace stemming from Russia’s invasion of Ukraine, and the sanctions levied on Moscow as punishment. 

“While there are no specific or credible cyber threats to the U.S. at this time, Russia’s invasion of Ukraine, which has involved cyber-attacks on Ukrainian government and critical infrastructure organizations, could impact organizations both within and beyond the region, to include the U.S. homeland,” CISA warned. “Every organization — large and small — must be prepared to respond to disruptive cyber activity.”

Free Cybersecurity Recommendations for SMB's

(313) 880-3929

available from 10:00 – 19:00

Free Cybersecurity Recommendations for SMB's

(313) 880-3929

available from 10:00 – 19:00