6 InfoSec Steps to Protect Your Company NOW
- Darian Cheung
- 2021年12月14日
- 讀畢需時 4 分鐘
已更新:2022年6月16日
Ransomware is getting worse, but here is an offer of a cyber security checklist for choosing defence solutions to meet the challenge.
The headlines feel like Groundhog Day, if each of Bill Murray’s repeated days grew increasingly threatening:
Ransomware attacks rise again. Ransomware attacks up over last quarter. Ransomware attacks tower over previous year.
You get the idea. And yet again, It’s still getting worse. The Ransomware Spotlight Year-End Report identified 32 new ransomware families in 2021, bringing the total to 157 and representing a 26 percent increase over the previous year. These ransomware families are exploiting a total of 288 vulnerabilities – a 29 percent increase over the previous year.
The report found that these ransomware groups are continuing to target unpatched vulnerabilities and weaponise zero-day vulnerabilities in record time to instigate crippling attacks. At the same time, threat actors are broadening their attack spheres and finding newer ways to compromise organisational networks and fearlessly trigger high-impact assaults.
And according to Coveware, organisations pay an average of $220,298 and suffer 23 days of downtime following a ransomware attack. That’s devastating in an optimal climate, and given the scramble to shift to the digital landscape combined with unprecedented shortages of skilled IT labor, an attack could be insurmountable.
It’s Time to MAP Your Cybersecurity Journey
The good news: while ransomware threats are increasing in sophistication, so are countermeasures. There are things you can do to dramatically reduce your attack surface and proactively protect against and/or remediate threats without further exhausting your human resources.
To build a comprehensive, scalable and framework-aligned cybersecurity strategy for the Everywhere Workplace, companies must go on a three-phased journey: Manage, Automate and Prioritise (MAP). Manage, the first phase, is about establishing your cybersecurity foundation. Automate is about alleviating the burden on IT. Prioritise is about getting to a state where IT has the information and ability to identify and address the top risk areas.
There are six steps to a comprehensive MAP strategy, and you can get started right now:
Step 1: Get Complete Asset Visibility
You can’t manage and secure what you can’t find. Invest in an automated platform that enhances visibility into all connected devices and software and provides context into how those assets are being used, so your company's IT and security teams can make better decisions. A comprehensive discovery initiative finds all assets on a network, including both corporate-owned and BYOD devices, and then provides context around who is using what device, how and when they’re using that device, and what they have access to. This enables security teams to better keep assets protected and improve overall security posture.
Step 2: Modernise Device Management
Modern device management is an essential part of increasing security in remote and hybrid work environments. A unified endpoint management (UEM) approach fully supports bring-your-own-device (BYOD) initiatives while maximising user privacy and securing corporate data at the same time.
UEM architectures usually include the ability to easily onboard and configure device and application settings at scale, establish device hygiene with risk-based patch management and mobile threat protection, monitor device posture and ensure compliance, identify and remediate issues quickly and remotely, automate software updates and OS deployments, and more. Choose a UEM solution with management capabilities for a wide range of operating systems, and one that is available both on-premises and via software-as-a-service (SaaS).
Step 3: Establish Device Hygiene
Most people associate device hygiene with patch management, but it extends beyond that. Good device hygiene involves taking a proactive, multi-layered approach to ensure that only devices meeting defined security requirements are allowed to access business resources, thereby reducing the digital attack surface. Companies should look to combat device vulnerabilities (jailbroken devices, vulnerable OS versions, etc.), network vulnerabilities (man-in-the-middle attacks, malicious hotspots, unsecured Wi-Fi, etc.) and application vulnerabilities (high security risk assessment, high privacy risk assessment, suspicious app behaviour, etc.). Establishing good device hygiene also includes building processes that are well-defined and repeatable so they can eventually be automated.
Step 4: Secure Your Users
The only people who likes to use passwords are the threat actors who weaponise them. Credentials, like passwords, remain among the most sought-after data types in breaches – involved in 61 percent of breaches. Further, single sign-on (SSO) solutions can create a single point of failure that can be exploited by hackers to gain access to most or all enterprise apps.
The ideal solution: Password-less authentication via zero sign-on. Instead of passwords, this approach uses multi-factor authentication via alternative authentication methods such as possession (what you have, like a mobile device), inherence (biometrics like fingerprints, Face ID, etc.) and context (location, time of day, etc.).
Step 5: Provide Secure Access
The network perimeters that worked when your team was in-office no longer suffice in the Everywhere Workplace. Today’s networks should be built on the principles of the software-defined perimeter (SDP). It’s designed to leverage proven, standards-based components that help ensure SDP can be integrated with your existing security systems. SDP still requires a layer of security to maximise benefits, which is where zero-trust network access (ZTNA) comes into play.
Step 6: Continuously Monitor & Make Improvements
Most assessments of security posture are made after an attack, and are specific to the attack vector. This reactive approach, combined with too many empty seats in IT roles, is a substantial problem. To stay in compliance and mitigate threats, it’s imperative to get a handle government, risk and compliance (GRC) management. Look for a solution with quick and easy regulatory documentation imports to map citations with security and compliance controls, and seek to replace manual tasks with automated repetitive-governance activities.
There’s a lot of information here – and the idea of tackling six steps can feel overwhelming. Then again, the threats are overwhelming, too. It’s essential to take partners and leverage solutions to support your cybersecurity journey. The right solutions will be comprehensive and integrated to ease the burden on your IT staff, and will also preserve a productive, intuitive user experience that maintains integrity no matter where, when or how your employees work.

留言