No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

5 Hidden Pitfalls in Cybersecurity Due Diligence

by Jason Wejnert
August 23, 2017
in Cybersecurity, Data Privacy, Featured
word "virus" on binary code display

Key Considerations to Facilitate Smooth M&As

As the list of cybersecurity breaches grows daily and headlines grow more shocking – think Home Depot, Target, Anthem, Yahoo!, WannaCry – the importance of cybersecurity in M&A due diligence has correspondingly increased. Do you want to purchase a company that’s been compromised? How would you know even know if it’s been breached? 

Corporate directors have cited the importance of cybersecurity for M&A targets as increasingly significant, according to 77 percent of a recent study’s respondents,[1] but it continues to be treated generally, putting companies at risk.

At the highest level, buyers should ask the following questions as it relates to cybersecurity during the due diligence process:

  • How is the information used or stored by the company?
  • What cybersecurity policies are in place to protect the information?
  • What past cybersecurity breaches have occurred within the company? Websites? Email accounts? Servers? SQL databases?

While those questions cover much of the cybersecurity issues a buyer must inquire about, there are often overlooked areas that are becoming more commonly exploited.

Often resulting from low-priority and low-cost-advantage areas of a company’s operations or sometimes even from just sheer laziness or ignorance, there are five areas that warrant a deeper inquiry into a seller’s policies and enforcement.

#1: Unknown and Forgotten Applications and Websites

Often, during development or beta testing, or even full production, web applications are created and then “forgotten.”[2] A seller may not even be aware of or track these “unknown” web applications, such as web server and data collection applications, possibly due to employee turnover or poor recordkeeping. These unknown and/or forgotten applications may offer a back door to more general access to company data. A buyer must inquire into historical records of application development and when/whether any applications were obsoleted or taken offline. Version histories may give a clue to what is still available for exploits.

#2: Software Patches

The recent WannaCry ransomware attack took advantage of vulnerabilities in the Windows operating software. As a result, Microsoft and companies scrambled to install software patches to prevent future attacks. But there was no need to scramble; these patches were already available. These unfixed vulnerabilities in software, not corrected by patches, represent a significant risk for penetration and theft or extortion of data, or merely a back door to other systems in the company. The buyer must investigate the history of software patch installations and current versions of operating system versions and application versions to determine if there are unpatched vulnerabilities in the seller’s inventory.

#3: Firmware Upgrades

A lesser-known but increasingly common source of vulnerabilities is firmware or code within chips in hardware devices, such as USB keyboards, web cams, graphics and sound cards that have not been updated for security fixes. Hardware devices, including routers, security cameras, process equipment, industrial sensors and control devices and even laptop lithium batteries represent a potential source of cybersecurity vulnerabilities.[3] Just as for software patches, the buyer must inquire about firmware upgrades to all connected equipment, especially as more and more internet of things (IoT) devices are made “intelligent” and connect to the internet.

#4: Default Logins for Connected Devices

A shockingly high percentage of connected devices – such as Ethernet and Wi-Fi routers, SCADA and other mass-produced items with network or internet connectivity – are not updated to replace the manufacturer’s default login (often “admin/admin”).[4] These default logins allow outside parties to expose the company to various penetration risks to which the compromised connected device is connected. When evaluating these upgrades, the buyer should inquire for password policies for these devices and ask for a list of any devices that use the manufacturer default login settings. Scanners that can examine whether default login credentials are being used are available and are recommended in conjunction with an expert in cybersecurity.[5]

#5: Personnel Training and Enforcement

Often, the weakest link in a company’s cybersecurity policy is the human element. Use of noncompany email accounts, “bring your own device” instances, use of cloud storage (e.g., Dropbox, OneDrive, Google Drive) or bringing infected USB drives and flash drives to work increase vulnerabilities for a breach.

A buyer must ask the seller to provide the company’s policies toward personnel training and enforcement in these areas, instances of past breaches due to human factors and measures used to correct or prevent these instances, such as prohibiting use of nonwork email accounts or cloud storage applications, security software that scans devices inserted into company hardware or requiring two-factor authentication for all logins to company data or networks.

Conclusion

In addition to the standard playbook of M&A cybersecurity due diligence, new layers of concern will accrete as hackers creatively exploit new vulnerabilities faster than software designers can anticipate them. Buyers will need to continuously update their checklists to account for new cybersecurity risks.

Assessing risks should be baked in on the front end of every M&A transaction, not as an afterthought in a memo from the intellectual property legal advisors, so that the buyer and seller can properly assess deal terms, value and post-closing risks and opportunities accordingly.

___________________

[1] https://www.nyse.com/publicdocs/Cybersecurity_and_the_M_and_A_Due_Diligence_Process.pdf

[2] Id.

[3] https://www.wired.com/2015/02/firmware-vulnerable-hacking-can-done/ (“In 2011, security researcher Charlie Miller found that chips in Apple laptop lithium ion batteries were shipped with default passwords, allowing anyone who discovered the password and learned how to manipulate the firmware to potentially install malware that infects the computer and gives a hacker a persistent hold on it even after the operating system is reinstalled. To demonstrate the firmware vulnerability, he altered the firmware of Apple laptop batteries to trick them into reporting a low charge that would cause the charger to overcharge them until they were bricked.”)

[4] https://www.perspectiverisk.com/top-5-common-network-vulnerabilities-default-login-credentials/

[5] https://www.us-cert.gov/ncas/alerts/TA13-175A


Tags: BYOD/Bring Your Own DeviceCloud ComplianceDue DiligenceInternet of Things (IoT)Mergers and AcquisitionsRansomware
Previous Post

IHS Markit Launches Compliance Service for RTS 28

Next Post

TRACE: The Smartest Guys in the Room

Jason Wejnert

Jason Wejnert

Jason M. Wejnert provides practical, creative legal guidance on a broad range of intellectual property matters to industry-leading clients—from small and mid-sized businesses to Fortune 500 companies. A member of the Intellectual Property & Technology group, Jason focuses his practice on patent litigation for industry-leading clients, managing all aspects of patent litigation cases from inception through trial, as well as ex parte and inter partes reexamination and review proceedings. As a former engineer for several technology companies, including Intel, Motorola and Medtronic, Jason leverages his background to provide practical insight to clients when it comes to protecting their intellectual property. His practice primarily centers on patents for complex technologies, including Internet and wireless technologies (e.g., Wi-Fi, WiMAX, CDMA and Bluetooth), ecommerce software, optical systems, computer software and hardware, photonics and database systems. Jason facilitates and protects innovation from the origination of the idea to registration/protection of the innovation, licensing of the innovation, due diligence and transactional considerations, and enforcement of the innovation. This can include patentability opinions, patent portfolio and invention disclosure program improvement, freedom to operate studies, licensing agreements, development agreements, patent applications, trade secret protections, copyright and trademark registrations, distribution agreements, channel-partnering agreements and the like.

Related Posts

board of directors meeting table

Before You Say Yes to That Board Seat: A Director’s Due Diligence Checklist

by Chase Cole and Sidney Edgar
June 24, 2025

Public company directors face scrutiny from Wall Street, Congress, the SEC and beyond — comprehensive preparation is essential for business...

kroger

Post-Merger Priorities: How Boards Like Kroger’s Can Lead Through Market Uncertainty

by Conor Johnston
June 9, 2025

Failed mergers often trigger talent exodus and shareholder fury, but strategic refocusing on core competencies can turn regulatory setbacks into...

hands shaking merger concept

How Your Labor Practices Could Become an M&A Problem

by Lawrence Krug and Konstantin Ebinger
May 30, 2025

Competition enforcers confront monopsony power in increasingly concentrated labor markets

drug cartel soldier camo

Leveraging Human Rights Frameworks to Combat Emerging Cartel Risks

by Nate Lankford, Matteson Ellis and Nisha Sawhney-Murkett
May 19, 2025

As enforcement priorities shift to cartels and foreign terrorist organizations, established human rights processes can identify and mitigate emerging legal...

Next Post
nighttime view of Enron complex in downtown Houston

TRACE: The Smartest Guys in the Room

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights