
What are cyber security measures using AI?Introducing specific examples and benefits
2023/ 12/ 6
[On-site event] Patent Litigation in the United States Part 3
2023/ 12/ 12In modern society, cyber-attacks such as unauthorized access and data tampering are problems that can occur to all companies, and small and medium-sized businesses are no exception.It is important to have countermeasures in place for cyber-attacks on a daily basis.In this article, we will explain cybersecurity measures for small and medium-sized enterprises, guidelines, subsidies, etc.

The need for cybersecurity measures in small and medium-sized businesses
Small and medium-sized enterprises often have weak security measures due to human resources and budget constraints, so instead of attacking large enterprises directly, attackers have a method of targeting small and medium-sized enterprises that do business with them and have lax security measures. It has been increasing in recent years.Those involved in small and medium-sized businesses need to be aware that information security, including cyber security, is essential to management, and take proper measures without being complacent just because their company is not a large company.
Risks of cyberattacks on small and medium-sized businesses
We will explain the risks that occur when small and medium-sized businesses suffer a cyber attack.
Account information and password leakage due to phishing attacks
They send e-mails that pretend to be from real financial institutions, credit card companies, shopping sites, etc., and lead people to fake sites that look very similar to these official sites, and provide personal information such as addresses, names, bank account numbers, and credit card numbers. They will steal your information by forcing you to enter it.
Ransom damage due to ransomware infection
Ransomware is a word coined from the word ransom, which means ransom, and software. It encrypts the infected computer's files, making them unusable, and demanding a ransom in exchange for their restoration. This is malware.In recent years, ransomware that threatens to release stolen data unless a ransom is paid has become popular.
Leakage of confidential and personal information due to unauthorized access
Unauthorized access is when an unauthorized outsider infiltrates internal servers and information systems.If a company that handles confidential or personal information is attacked, the damage caused by information leaks and outflows will be enormous.
Expanding damage to business partners due to supply chain attacks
A supply chain attack is a cyberattack that attacks a point where security is weak in the supply chain, which is the supply chain from a company's raw material procurement to the delivery of products to consumers.This is a method that does not directly attack large companies, but rather targets small and medium-sized companies that do business with them and have lax security measures, and has been increasing in recent years.
Impact of cyber attack damage on companies
We will explain what kind of impact it will have if a company suffers a cyber attack.
loss of social trust
Cyber-attacks such as privacy violations and leakage/misuse of personal information can destroy relationships of trust with customers and business partners.If a company neglects security measures and loses social credibility, a deterioration in business performance will be inevitable.
economic loss
One of the major damages is the suspension or malfunction of operations and services due to cyber attacks.In the manufacturing industry, production lines may stop, and in hospitals, systems related to electronic medical records and medical fees may be affected, making it impossible to continue providing medical care.Costs that put pressure on normal operations, such as initial response to prevent the damage from spreading and investigation of the infection route and damage situation, are also incurred.
Risk of lawsuits and damages due to information leaks, etc.
In addition to losses due to business suspension and loss of trust, legal risks may also occur depending on the data handled.If a company is legally responsible for privacy violations or leakage or misuse of personal information, it may be subject to fines.
Steps to introduce cybersecurity measures for small and medium-sized businesses
We will explain the steps small and medium-sized businesses can take to introduce cybersecurity measures, based on the guidelines from the Information-technology Promotion Agency (IPA) and the 5 Articles of Information Security.
[Step 1] Decide on implementation items based on the guidelines for small and medium-sized enterprises
The information security measures guidelines organize the implementation items for measures.First, understand this, check what your company is lacking, and decide what measures to take.Small companies and companies that have not implemented sufficient information security measures in the past will be able to implement measures that are appropriate for their company by starting with what they can do right away and stepping up step by step.
・Guidelines for information security measures for small and medium-sized enterprises: https://www.ipa.go.jp/security/guide/sme/ug65p90000019cbk-att/000055520.pdf
[Step 2] Implement initiatives based on the “5 Information Security Rules”
I will explain the five articles in the above guidelines.
- 1. OS and software are always up to date
Continuing to use older versions of OS and software is equivalent to neglecting security issues, and there is a risk of being infected with the latest malware.Keep it up to date by updating regularly.
- 2.Introducing antivirus software
Malicious malware that steals IDs and passwords, encrypts files, etc. is appearing one after another. Introduce EPP (antivirus function)/EDR and manage it appropriately.
- 3.Strengthen your password
There are also cases of unauthorized logins caused by IDs and passwords being leaked, guessed, or analyzed.Strengthen your security by making your passwords long, complex, and not reused.
- 4. Review sharing settings
There are cases where information can be unintentionally viewed through tools that share information with multiple people, such as cloud data storage services or misconfigured multifunction devices.Make sure that your settings are set to restrict viewing by third parties.
- 5. Know the threats and attack techniques
Their methods are becoming more sophisticated, such as sending emails with malware attached by falsely identifying them as business partners or related parties, or attempting to steal account information by directing users to fake official-looking websites.Be aware of the latest tricks and be aware of them so you don't fall for them.
[Step 3] Strengthen the security management system
In the event of an information security incident, we have established a management system to ensure that the situation is promptly reported to the information security officer, and that information is appropriately communicated from the information security officer to the department manager to the employees. I'll arrange it.Information security knowledge and experience are required for managers and managers, but it takes time to acquire this knowledge.Consider developing your personnel over the medium to long term.
[Step 4] Consult with specialists and utilize support systems
In order for small and medium-sized enterprises to improve the level of information security measures, it is effective not only to raise awareness within the company, but also to connect with experts who can be consulted, and to put measures into practice through guidance from experts. In addition to awareness-raising activities promoted by IPA by security presenters, who are registered experts such as information processing security support specialists, there are various support systems such as IT introduction subsidies, which will be explained later.Let's take advantage of it.
Subsidy system to support cybersecurity measures for small and medium-sized businesses
Various support systems are available for small and medium-sized enterprises to strengthen their cybersecurity measures.
Subsidy for promoting cyber security measures
The Tokyo Metropolitan Government provides grants to small and medium-sized businesses to support cybersecurity measures to protect their trade secrets and personal information.Targets of the subsidy are small and medium-sized enterprises that have self-declared their commitment to information security measures with a two-star rating under SECURITY ACTION, and the application requirements are not strict and are worth considering.For more information, please check the official website of Tokyo Small and Medium Enterprises Promotion Corporation.Check to see if there are other municipalities that are implementing this.
・Tokyo Small and Medium Enterprises Promotion Corporation: https://www.tokyo-kosha.or.jp/support/josei/setsubijosei/cyber.html
IT introduction subsidy
This is a subsidy that supports companies in introducing IT tools to solve various management issues.You can apply for subsidies from five frameworks depending on your purpose, but for cybersecurity measures, you can utilize the "Security Measures Promotion Framework" which supports reducing various risks caused by cyber incidents.Please check the official website for details.
・IT introduction subsidy: https://it-shien.smrj.go.jp/
In the event of an emergency, take a quick initial response with FRONTEO's "Cybersecurity Investigation Package"
In this way, cybersecurity measures are essential during normal times, but preparations for emergencies are also necessary.In order to minimize the damage caused by an attack, it is important to pay close attention and respond quickly in the initial response. FRONTEO's Cybersecurity Investigation Package, which boasts a track record of conducting over 1 fraud investigations, provides high-quality cybersecurity investigations that are recommended by multiple insurance companies.
It is an effective solution for initial response that includes the minimum necessary investigations in the event of a cyberattack, such as EDR investigation and dark web investigation, in one package.Additional services include Wi-Fi vulnerability investigation, NDR investigation, and penetration testing. Surveys can also be conducted.For companies that do not have human resources with specialized knowledge, there are concerns about the speed and professionalism with which they respond to emergencies.FRONTEO will support the initial response based on the know-how gained from an overwhelming track record.