The top cyber defence actions for you and your business – Part 1
7 Jun 2022
The only constant in the cybersecurity world is that it is always changing. That’s why businesses of all sizes need to focus on staying agile and proactive about their defence posture to protect their operations and data.
In a recent joint security advisory released by the Five Eyes, an alliance of cyber authorities representing the US, Canada, UK, Australia, and New Zealand, managed services providers (MSPs) were called upon to strengthen their cybersecurity defences and prepare for the observed uptick in malicious threats targeting their businesses and customers specifically. MSPs, like any organisation, are not immune.
That is why any business, MSP or not, should be safeguarding their network(s), allowing them to focus on serving their customer’s needs. Companies that incorporate a thorough security strategy and invest in a well-thought-out security stack have a real competitive edge over companies that operate under vulnerable circumstances. With this checklist, take the target off your back, level up your security posture, and stay out of the crosshairs of hackers.
The first part of this series focuses on how you can ‘Beat Them to the Punch.’
Beat Them to the Punch
Don’t give the adversary even the smallest fighting chance. Adopting the right security best practices ensures your business can continue to operate effectively and is set up for long-term success.
1. Prevent Initial Compromise
Conducting a regular security risk assessment goes a long way in preventing initial compromise. Get a thorough understanding of possible cyber threats that are specific to your systems and model out the possible impact they would have on your business. Make sure that you shore up any vulnerable areas found in your systems. Preventative actions include, but are not limited to:
- Hardening remote access VPN solutions
- Using a vulnerability scanning tool or service
- Protecting internet-facing services
- Establishing strategies against credential stuffing and brute force attacks, password spraying tactics, and phishing/whaling campaigns.
2. Enable/Improve Logging & Monitoring Processes
Controlled and effective log monitoring can help you detect anomalies, detect threat patterns, and show you signs of exploitable areas in your networks. Logs are most effective when they are actively monitored by experienced Managed Detection & Response (MDR). Analysts can sift through complex logs, compile threat intelligence in real-time, and detain at the first sign of compromise. In the hands of an experienced MDR team, real-time comprehension, threat hunting, and response can enhance the value of security logs and telemetry collected from your network processes, devices, and systems.
3. Develop & Implement Incident Response & Recovery Plans
Cyber Security policies on incident response and recovery should be clear and properly supported during initial implementation and ongoing business operations. A key component of an incident response plan is to define designated roles, emergency contacts, communication channels, backup and recovery procedures, etc. These policies ensure that if disaster strikes, you are efficient in your response and recovery. Policies should be regularly revisited and communicated to all team leaders.
4. Promote Transparency & Continuing Education/Support
Security is everyone’s responsibility. Work with your internal IT team or external managed services provider (MSP) to document clear cybersecurity policies fitting for your business and then set out to educate all your team members on how to embrace it.
Taking time to provide regular cybersecurity awareness campaigns and training allows your employees to:
- Better understand their responsibility for cyber security within their day-to-day tasks.
- Realise that cyber security affects their own safety at work, not just the interests of their company.
- Become mindful that they could unknowingly pass on or expose sensitive information if not trained and prepared.
- Continue to work safely and efficiently from remote locations.
- Stay vigilant against social engineering tactics, phishing emails, and malicious links and attachments.
In part 2 of ‘Top top cyber defence actions for you and your business,’ we will explain how you can ‘Keep Your House in Order’ when it comes to your cyber security hygiene.
Contact Cyber Security Company LoughTec for a free no-obligation discussion on your business cyber security posture. Call +44 (0) 28 8225 2445 or email info@loughtec.com.