Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity Leadership and ManagementSecurity & Business Resilience

Building trust with reputational defense

By John Parkinson, Tom Patterson
Courtesy of Pixabay
Image courtesy of Pixabay

Image courtesy of Pixabay

November 29, 2022

There’s a saying in the national security business, that you must build trust before you need it. The type of adversarial situations that we have faced throughout our careers have required us knowing whom to trust for timely understanding of ground truth.  Having built trusted relationships with the right people in the right places in advance of an incident has meant the difference between life and death.  Trust is the coin of the realm when defending queen and country. This same trust requirement is proving true in corporate security around the world today.  As corporations spend lifetimes building their reputations, they cannot afford to allow preventable security incidents to destroy it.  This trust truism is why board rooms around the world are now focusing on reputational security as a critical component of their business plans.

Board rooms are fast filling with members and committees that understand that risk to corporate reputation is as important as every other aspect of the bottom line.  Critical questions are being asked of CEOs and CISOs about what is now possible in the area of reputational defense, and what the company is doing to protect itself.  Today’s realities have presented bad actors with the incentive and opportunity to increase their focus on reputational crimes and, given the ever-increasing sophistication of threats and enterprise reliance on technology, business must adapt. 

What’s the bad guy’s motivation?

Money is still at the root of most evil.  Today, however, bad actors have realized there’s also money to be made in attacking a company’s reputation.  From betting on a falling stock price, to foiling a corporate takeover, to the most common of 2022 attacks — ransomware — companies are dealing with a new and more sophisticated threat landscape.  

What’s the cyber harm to companies today?

Over the last decade, data breaches have surged, exposing sensitive information, and undermining customer confidence, which is potentially devastating, especially for smaller businesses. Companies, now more than ever, need to know how to keep their data secure while maintaining a seamless and productive work environment.  On the back of these trends, new protocols are emerging to provide additional layers of defense to corporate communications.  

The Ponemon Institute’s just released "Cost of Data Breach Report 2022" surveyed 550 companies’ security professionals and C-suite, finding that the average cost of a data breach in the U.S. is a staggering $9.4 million, with 83% of these companies admitting to suffering more than one breach.  Business email compromise (BEC) is quickly becoming the biggest problem in cyber crime and has resulted in the loss of an eye-watering $43 billion to businesses in the last few years. So, it’s somewhat perplexing that only 50% of U.S. businesses have a cybersecurity plan in place.

Take the case of Fran Finnegan. It took his business an entire year to recover from a ransomware attack which encrypted his operational software and all his data. He also suffered a stroke midway through that year-long nightmare, which he attributes to the stress he was under.

When it comes to the potential for reputational risk, smaller businesses may be targeted because they haven’t invested in their security in the way that larger corporations have. Many small business owners think they can’t afford high end cybersecurity defense to protect their business and their customers, for example. 

What are companies doing to defend their reputations?

As business processes continue to evolve to leverage efficient cloud computing, distributed workplaces, and mobile technologies, the defensive security capabilities available to companies has equally evolved.  Expanding on the U.S. Government’s Cybersecurity and Infrastructure Security Agency (CISA) guidance, companies can look at their reputational defense in four key segments:

1)    Reduce the likelihood of a damaging security incident by investing in defenses, including education, multifactor authentication and use of trusted partners.

2)    Take steps in advance to quickly detect cyberattacks or security incidents, with active monitoring that looks for any anomalous behaviors.

3)    Take steps in advance to be prepared to respond to an attack, with a well-practiced incident response playbook that involves all components of your business and trusted third parties.

4)    Build operational resilience into your business plans, with technical and personnel redundancy, hardened cores for critical processes, trusted backups, and secured and encrypted communications for key personnel and services. 

What are companies still missing in their reputational defense?

In this new post-COVID world, companies are struggling with how to keep their organizations and their data secure while maintaining a seamless and productive work environment. 

But business and personal data are now more available to criminals and people share increasing amounts of our information among colleagues, partners, clients, and the supply chain. It has long been best practice for businesses to ensure all their team protects data internally, but these changing business practices have now opened up new attack vectors through extensive use of video conferences, meetings, messaging and remote working systems. With a better understanding of the risks and the adoption of secure platforms, it is possible and vital to prevent unwanted eyes prying on information because a breach can have a devastating impact.

Here are three things that companies can add to their data defenses:

1)    Consolidate vendors and use a unified business communications platform.

Gartner predicts that by 2025, 80% of companies will consolidate their communications platforms to reduce the risk of security vulnerability. Switching from one communications platform to another in your workday increases the risk of attack. Choose a platform that includes all of the company’s needs – file sharing, messaging, meetings and calls. Reducing the number of platforms will reduce the risk of intrusion by hackers.

2)    Aim for true end-to-end encryption for messaging, meetings, video conferences and calls.

Think about what employees discuss and share in messaging and meetings these days: future earnings, legal issues, sensitive HR actions, strategy, crisis response – all sensitive matters where timing, access, and messaging are critical. Think about how the organization is sending that information around from office to home to coffee shop and back, across secure and insecure networks, in ways that can be intercepted. Safeguard that information by using end-to-end encryption on proven, security-minded platforms. The current best practice is to use a system with Messaging Layer Security (MLS), which encrypts messages end-to-end, and changes keys with every individual message, adding additional layers of security.

3)    Prevent “steal now decrypt later” with quantum resilient technology.

There is an understandable misconception that the threat of adversarial use of quantum computing is just for governments to worry about. But it has the potential to affect everyone and every business. Everyone has secrets, intellectual property and sensitive information that is the cornerstone of their business or life, and everyone is vulnerable when it gets out. For this reason alone, companies can protect themselves with post-quantum encryption technology.

4)    Use multi-factor authentication (MFA). 

MFA protects data and assets by improving the security of the authentication process with identify verification, by requiring at least two methods of authentication, reducing the threat of your company’s assets getting into the wrong hands. 

What are good next steps?

By evaluating the risks of your information and reputation across the new business and technical realities of today, you can more successfully manage and govern your business.  

Remember, that in addition to the oftentimes insurmountable financial loss to a company following a security incident, it can take years to rebuild a company’s reputation and organizations face a real risk of losing customers to their competitors. It’s critical that companies move to understand their new reputational risk, and work effectively to mitigate it.


Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Parkinson

John Parkinson OBE is a former UK police chief constable and counter-terrorism lead. He is President of Secured Communications and leads the company’s operations in the UK and Europe. John served with the Police for over 33 years and led one of the largest forces in the UK. He also performed the role of UK Senior National Coordinator for Counter Terrorism, in which he was based at London’s New Scotland Yard. Because of his career experiences, John knows first-hand of the need for trusted, secure communications which offer the highest levels of encryption to give the user confidence against hackers. Along with colleagues in the US and globally, John was instrumental in the development of Mercury Workspace. John was awarded the OBE for services to Policing and Counter Terrorism in 2011. Headshot courtesy of Parkinson

Patterson

Tom Patterson is a top advisor on cyber and critical infrastructure security issues to companies, governments, and the international community. Tom is currently a Senior Fellow at Auburn’s McCrary Institute for Cyber and Critical Infrastructure Security, a regular lecturer at Wharton’s SIFMA Executive Education program, and the founder of Infrastructure>Forward, a business accelerator supporting the trusted use of AI, Quantum, and Communications technologies in defense of critical infrastructure around the world. Tom has served on three public company boards and advised the FBI, Homeland, and the White House on security issues.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Digital Trust Ecosystem Framework

    Building digital trust with ISACA's framework

    See More
  • Handshake

    The AI arms race in cybersecurity: Why trust is the ultimate defense

    See More
  • Avril Eklund

    Avril Eklund: Building Trust, Teams, and a Better Path Forward

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing