-
Transactional advisory services
Find out more about the transactional advisory services of Grant Thornton Financial Advisory Services
-
Valuations
Find out more about the valuations services of Grant Thornton Financial Advisory Services
-
Mergers and acquisitions
Find out more about the merger and acquisition services of Grant Thornton Financial Advisory Services
-
Forensic and investigation services
Find out more about the forensic and investigation services of Grant Thornton Financial Advisory Services
-
Recovery & reorganisation
Find out more about the Recovery & reorganisation services of Grant Thornton Financial Advisory Services
-
Business risk services
Find out more about the business risk services of Grant Thornton Financial Advisory Services
-
Business consulting
Find out more about the business consulting services of Grant Thornton Financial Advisory Services
-
Capital market
Capital market
-
Corporate and business tax
Find out more about our corporate and business tax services.
-
Direct international tax
Find out more about our direct international tax services.
-
Global mobility services
Find out more about our global mobility services.
-
Indirect international tax
Find out more about our indirect international tax services.
-
Transfer pricing
Find out more about our transfer pricing services.
-
Litigation
Our lawyers and accountants can manage all defense measures provided not only by the Italian law, but also by EU regulations and conventions
-
Family business
Find out more about our Family business services.
-
Legal
The client can be assisted in every need and with the same care both on important operations or disputes and on simple matters
-
Back office outsourcing
Find out more about our Back office outsourcing services
-
Business process outsourcing
Find out more about our business process outsourcing services.
-
Compilation of financial statements
Find out more about our compilation of financial statements services.
-
Tax compliance
Find out more about our tax compliance services.
-
Electronic invoicing
Find out more about our electronic invoicing services
-
Electronic storage
Electronic storage is an archiving procedure that guarantees the legal validity of a digitally stored electronic document
-
Revaluation of corporate assets
Find out your civil and fiscal revaluation of tangible, intangible and financial assets
-
Human resources consulting
Find out more about our human resources consulting services.
-
Payroll
Find out more about our payroll services.
-
HR News
HR News the monthly information newsletter by Grant Thornton HR
-
Cybersecurity
GT Digital helps clients structure information security management internal functions, also through partially or totally outsourced functions
-
Agile and Programme Management
GT Digital provides support in the adoption and implementation of different portfolio management
-
Robotic Process Automation
Our “BOT Farm” can rely on digital workers able to help clients in routine activities, allowing employees to deal with more added-value activities
-
Data strategy and management
GT Digital can support clients in seizing the opportunities offered by Big Data, from the definition of strategies to the implementation of systems
-
Enterprise Resource Planning
We support clients in selecting the most appropriate ERP System according to their specific needs, helping them also understand licensing models
-
IT strategy
GT Digital supports clients in making strategic choices, identifying innovation opportunities, comparing themselves with competitors
-
IT service management
We can support with software selection and with the implementation of dedicated tools for the management of ICT processes
-
DORA and NIS 2
The entry into force of the DORA Regulation and NIS2 represents a major step towards the creation of a harmonised regulatory framework
The first primates probably appeared on the hearth 55 million years ago. The first hominids appeared about six million years ago and humans (homo abilis) 2 million years ago, although more evolved humans are more recent: the Neanderthal Man appeared 400,000 years ago and Homo Sapiens 200,000 years ago.
The latter started to talk and use tools approx. 150,000 years ago and later started trading, including long distance commerce, approx. 140,000 years ago. 70,000 years ago, humans started leaving Africa to colonise Asia, Australia and Europe. 50,000 years ago, the evolution started to acquire a modern connotation, hunting techniques started to develop, as well as clothing, the cult of the dead and so on; the first written text dates back to 5,000 years ago.
Humans started to develop tools and use metals: a slow evolution followed, which resulted in the first industrial revolution (around 1700 A.D.), mainly centred around textiles and metals, and later in the second industrial revolution, around 1870 A.D, i.e. (only) 151 years ago, with the introduction of electricity, chemical products and oil.
From this moment onwards the evolution gained momentum. The first electromechanical calculator was, probably, the so-called Polish “Bomb”, devised and realised by the mathematician Marian Rejewski in 1938. There were various other examples in that period, for example the Z1 by Korrad Zuse, the first based on the binary method, and the various evolutions of the Bomb realised by Alan Turin and Max Newman in 1942. Many consider the latter as the first modern computer, realised 79 years ago, for others instead this record is held by ENIAC, which is surely the forerunner of the first commercial computer, i.e. UNIVAC.
This was back in 1951. The symbiosis between human and machine had begun and in 1960 there were already 6,000 computers, which increased to 20,000 in 1964 and to 63,000 in 1969, 52 years ago. Nowadays it is impossible to say how many computers are around, if we consider the interconnection with other devices, phones, televisions, vacuum cleaners, cars, industrial plants, etc.
The first personal computer was placed on the market by Olivetti in 1975, the same year in which Microsoft was born. Apple was born the following year and brought personal computers in households, with home computers. IT started to evolve rapidly.
Just to bring back memories to nostalgic ones, until the 70s punched cards were the primary medium for computers input. Magnetic disks were introduced in 1972, first 8-inch floppy disk, then 5.25-inch ones and later the more evolved 3.5-inch floppy disks. Nowadays, they no longer exist (and the more recent CDROMs are not in use anymore, either).
The history of computer networks evolved in parallel. Starting from a network first created for military purposes and later connected to universities, ARPANET was born in 1969 and became the Internet in 1980; it was introduced in Italy in 1986. In 1991, 30 years ago, the World Wide Web was born. Up to this moment, the focus of researchers had been on the functioning of systems. The climate of collaboration among university colleagues did not facilitate the development of information security.
In terms of applications, the first ERP system dates back to the 90s, Amazon was created in 1995, Facebook in 2004 and Whatsapp in 2009. We all know the recent developments. Corporate operations are supported by and depend on IT systems. Corporate systems are connected with those of clients and suppliers, often also exposed on the Internet.
And cybersecurity? Going back over the history of mankind, safety in general has always been a crucial factor for peoples which, depending on risks, saw to adequate defence measures, enclosures and fires for animals, fortifications and weapons against enemies, selection of the place where to build villages keeping into account natural events, etc. When risks occur, humans are naturally inclined to develop protection systems.
As far as IT systems are concerned, instead, there have been various factors which did not favour the evolution of cybersecurity: first of all - as mentioned above - the speed at which they evolved, secondly the spirit of collaboration among technicians for their development and lastly the extremely reduced number of attacks identified, at least until 2000.
Actually, up to then the interest of criminals in cybercrimes were not so high, given also the evolution of systems. Hackers were actually IT experts who violated and entered systems often just as a challenge or for fun (the term “hacker” actually means IT expert, and not cybercriminal). The absence of threats, or at least the perception of their absence, did not favour the development of protection systems, nor of a culture of safeguard.
In the last two decades, nonetheless, criminals realised the potential wealth of cyberattacks. Criminal networks have sprung up which have invested in cybercrimes, as well as auctions in which hacking services are offered and purchased. Nowadays it is possible, even for people with a relatively little experience, to hire the software needed for a cyberattack and also to benefit from services relevant to the negotiation and collection of cryptocurrencies. There is a network specialised in every malicious IT service. On the dark web, i.e. an area of the Internet not indexed by conventional search engines, it is possible to purchase all that is needed for an attack.
Just to mention a few global statistics, there have been over 800 million malware attacks in 2018 against 12 million in 2009 (see purplesec.us). One of the most serious threats nowadays are ransomwares. These are malwares which block users’ access to their files using encryption techniques. Usually, cybercriminals demand a ransom payment to decrypt them. Some attacks are generalised, i.e. aimed at the wider population, and ransoms are low (a malicious business based on lower amounts for high volumes).
This type of attacks normally causes few damages, or damages to small businesses. Other attacks are focussed, i.e. addressed to entities identified through an actual targeting process (high turnover, good economic position, good cash levels). In targeted attacks criminals take time to study their target, to undermine the most effective countermeasures (e.g. backups) and to launch coordinated attacks to all key systems.
The victim, who thought to be well protected, often discovers after the attach that it had some vulnerabilities. Indeed, a weak link in the chain is enough to make it useless, besides the fact that those who launch surprise attack always have an advantage on those who need to defend themselves.
Therefore, also well-structured companies are forced to pay large ransoms (malicious attacks based on low volumes of attacks in which very high ransoms are demanded). To give an idea of the phenomenon, the cost for ransomware attacks is estimated to have amounted to 5 billion dollars in 2017, to approx. 12 billion in 2019 and it is estimated that it could reach 20 billion dollars in 2021 (see cybersecurityventures.com).
And what about your company? Which is the level of maturity in the protection from cyberattacks? Being able to reply to this question is the first step to effectively organise the relevant safeguards.
For an effective protection it is necessary first of all to understand what to protect and identify the priorities. A total alignment between the heads of the business and the head of information security has to be granted. Which are the business objectives? How will they be pursued? Who are the stakeholders to be considered? Which is the organisational structure of security and which are the relevant roles? Which is the assets’ mapping and evaluation process? How are security strategies defined? Then, it is necessary to assess the status of one’s protection.
Which is the level of expertise of IT personnel on security? And that of users? Have all IT assets been identified and the adequate security measures defined for each of them? From a technical point of view, are security measures adequately applied? Are systems updated on an ongoing basis and those no longer supported by providers discontinued? Which security management processes are in place? Are vulnerability tests carried out? And simulations of phishing attacks to users? Is there a security incident response process in place? And a business continuity management process?
Once the status has been assessed, it is necessary to define a project to address vulnerabilities. This approach is also used to introduce additional protection measures to the existing ones. It is necessary to try and reverse the paradigm according to which those who attack have an advantage on those who defend themselves.
We need to remind ourselves that cybercriminals are no longer nostalgic hackers who violated systems as a challenge. They are pragmatic individuals who aim at maximise results. Even if they think to be able to violate a well defended target dedicating some time, they do not hesitate to change target and choose one with lower defences.
Which is your project portfolio management process? Do you dedicate an adequate budget to security? Which is your project management process? Are there project managers in your company? Which evaluation process do you use to assess progress of a project? Top management commitment is key for cybersecurity management. How is top management involved? Which is the communication and reporting process to the top management to inform about the status of cybersecurity processes and relevant risks?
The last element to consider is the management of the process and systems monitoring system. Have key performance indicators and key risk indicators been identified? Are automatic systems to calculate the level of such indicators in place? Have thresholds, warning systems and reporting systems been defined?
Would like to discuss these topics in detail or would you like to receive support in assessing the maturity of your company as for cybersecurity matters?