IT Security in Your Merger Acquisition

In the business world, mergers and acquisitions are commonplace as businesses combine, acquire, and enter various partnerships. Mergers and Acquisitions (M&A) are filled with often very complicated and complex processes to merge business processes, management, and a whole slew of other aspects of combining two businesses into a single logical entity.

In the modern business world before and after the acquisition, a new concern with M&A activities is cybersecurity. What role does cybersecurity play in today's mergers and acquisitions of businesses? Why is it becoming a tremendous concern?

Cybersecurity threats are growing in leaps and bounds

There is no question that cybersecurity risks and threats are growing exponentially. A report from Cybersecurity Ventures estimated a ransomware attack on businesses would happen every 11 seconds in 2021. Global ransomware costs in 2021 would exceed $20 billion.

It seems there are constantly new reports of major ransomware attacks, costing victims millions of dollars. Earlier this year, the major ransomware attack on Colonial Pipeline resulted in disruptions that caused fuel shortages all over the East Coast of the United States. It helped to show that ransomware attacks on critical service companies can lead to real-world consequences and widespread disruption.

This world of extreme cybersecurity risks serves as the backdrop for business acquisitions and mergers. A Garner report estimated that 60% of organizations who were involved in M&A activities consider cybersecurity as a critical factor in the overall process. In addition, some 73% of businesses surveyed said that a technology acquisition was the top priority for their M&A activity, and 62% agreed there was a significant cybersecurity risk by acquiring new companies.

Risks associated with Mergers & Acquisitions

What risks are associated with mergers and acquisitions? There are several that include but are not limited to the following:

  • Increased regulatory scrutiny
  • Inherited cybersecurity risks
  • Compromised accounts and passwords
  • Lost or damaged customer confidence
  • Data breaches in the acquired environment

Increased regulatory scrutiny

Compliance regulations, like cybersecurity, are growing more complex and challenging for businesses. For example, regulators scrutinize business deals, including mergers and acquisitions, to help protect the growing emphasis on data sovereignty and data privacy.

From a cybersecurity perspective, businesses that merge or acquire other organizations must make sure data compliance is a top priority to prevent fines for non-compliance.

Inherited cybersecurity risks

Companies must realize that even if they have a robust cybersecurity posture for their organization, the security dynamic can completely change with mergers and acquisitions. As a result, they inherit the cybersecurity challenges and issues of the acquired business.

The acquiring company inherits existing vulnerabilities, standards, risks, and cybersecurity liability as they assume control of the new business.

Compromised accounts and passwords

As was the case with the Colonial Pipeline hack in May 2021, compromised account passwords are often the culprit behind major data breaches and ransomware attacks. As a result, businesses must understand securing acquired accounts and directory services immediately and implementing breached password protection is a priority.

Scanning the newly acquired environment for password vulnerabilities, reused passwords, breached passwords, and other password threats can help to quickly bolster the cybersecurity stance of the acquired user account assets.

Businesses that have combined due to a merger or acquisition may federate Active Directory accounts between them to access various resources. Password synchronization between on-premises and cloud directory services may also be in play. It further emphasizes the need to strengthen password security as accounts are granted access to additional business-critical resources.

Lost or damaged customer confidence

Businesses must take care of any merger or acquisition from a customer perspective. Any misstep, including handling cybersecurity during an acquisition or merger, can lead to customer mistrust and lost business.

Data breaches in the acquired environment

As mentioned earlier, the acquiring company that has merged or acquired another company inherits the cybersecurity challenges and risks of the newly acquired environment. These risks include any potential data breaches. Knowledge of a data breach event can even stall or block a potential merger or acquisition once known. Data breach events can also go undisclosed to prevent any issues with the merger or acquisition.

Cybersecurity and compliance checklist for M&A

  1. Form an M&A cybersecurity team
  2. Review the target business cybersecurity posture
  3. Inventory all physical, digital, and data assets of the target organization
  4. Revisit the risk assessment
  5. Engage a third-party security company

1 — Form an M&A cybersecurity team

Businesses often have excellent reasons for engaging in M&A activity. However, as discussed thus far, it can lead to additional cybersecurity risks. Forming an M&A cybersecurity team is a great idea to accelerate addressing the cybersecurity tasks involved with the M&A. This team may report to the CIO and should undoubtedly include cybersecurity leaders found on the security teams and key business leaders within the organization.

This team will be directly responsible for formalizing the reporting structure for addressing the cybersecurity risks discovered with the M&A activity. The team will also help to align the overall business on both sides for a consistent cybersecurity posture.

2 — Review the target business cybersecurity posture

The M&A cybersecurity team mentioned above will be instrumental in reviewing the target business cybersecurity posture. The review of the target organization's cybersecurity landscape should include:

  • A cybersecurity risk assessment
  • Review of security policies and procedures
  • Recent audit reports
  • Any breach reports that have happened recently or in years past
  • Audit of accounts and account access permissions across the organization

3 — Inventory all physical, digital, and data assets of the target organization

To properly understand the cybersecurity risk involved with an M&A of another organization, businesses must understand the complete inventory of all physical, digital, and data assets. Understanding and having a comprehensive inventory of these items allow full disclosure of the cybersecurity risks involved.

4 — Revisit the risk assessment

Any M&A activity means an organization needs to revisit its risk assessment. Even a recent risk assessment has now changed due to the reasons we have already covered (inherited cybersecurity risk, any security or compliance challenges, etc.).

5 — Engage a third-party security company

The M&A cybersecurity team may include a wide range of technical expertise with a wealth of experience in many cybersecurity disciplines. However, even with talented team members, organizations may opt to engage a third-party security company with the technical and staffing resources to help with cybersecurity discovery, remediation, combining security resources, and many other tasks.

Quickly manage M&A password security during

Password and account security can be challenging to manage and secure during a merger or acquisition of multiple companies. Specops Password Policy provides organizations with tools to secure their native Active Directory infrastructure and any other directory services they may manage.

One of the blind spots with any merger or acquisition can be weak, reused, or even breached passwords lurking as a hidden cybersecurity threat. Specops Password Policy provides Breached Password Protection that provides continuous scanning and alerting of any breached accounts found in the environment.

Organizations can quickly remediate any lax password policies found in the target organization with Specops Password Policy. It provides the following features:

  • Multiple custom dictionary lists
  • Breached Password Protection, protecting against over 2 billion breached passwords. This protection includes passwords found on known breached lists as well as passwords being used in attacks happening right now
  • Easily find and remove compromised passwords in your environment
  • Informative end-user client messaging that is intuitive during password changes
  • Real-time, dynamic feedback at password change with the Specops Authentication client
  • Length-based password expiration
  • Customizable email notifications
  • Block user names, display names, specific words, consecutive characters, incremental passwords, and reusing a part of the current password
  • GPO-driven targeting for any GPO level, computer, user, or group population
  • Passphrase support
  • Over 25 languages supported
  • Use Regular Expressions for further password filter customization

Specops Password Policy Breached password protection

By bolstering password security in target environments, businesses can protect mergers and acquisitions from one of the most common vulnerabilities leading to compromise. Learn more about or start a free trial of Specops Password Policy tools with Breached Password Protection.


Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter and LinkedIn to read more exclusive content we post.