Do you worry about security breaches? It seems you can't go more than a week without hearing of a major retailer or large financial institution dealing with a significant cyber attack. If companies with the biggest IT budgets are not immune, what can smaller companies do?
Lots.
Make these 5 changes and you'll create a more secure IT environment for your business that protects you from security breaches.
Like death and taxes, it's inevitable that every piece of software will require updates and bug fixes after you start using it. You need to apply these software patches on a regular basis to correct known security vulnerabilities.
But don't software updates happen automatically?
You may think patches are already being applied automatically within your environment. After all, you periodically see those notifications pop up on your screen letting you know when an update is available. You and your employees are dutifully applying those patches.
But in practice, it's amazing how many organizations fall flat when it comes to this basic step and do not patch all software. Sometimes, they are not aware that a particular software program is present within their network.
If your workstations and servers aren't up to date on their patches, update them immediately. Whenever possible, turn on automatic updates. Create a process by which updates are tested and deployed in a regular and controlled manner.
But don't stop with just Windows or your daily yum-cron or apt-get cron jobs. The operating system isn't the only attack surface there is. Adobe Flash, Java, Office, and many other applications are regularly found to have weaknesses. Patch all your applications, not just Microsoft applications but other third party applications within your environment.
Pay particular attention to any machine that is accessible via the Internet.
A vulnerable system will be found quickly and you will be breached.
One word of caution when it comes to business critical application servers — patching does not always go smoothly. Test patches in a development environment before rolling them out to production. And always have a verified known good backup.
For software patching, follow these best practices:
Each user, including your IT staff, should have their own unique set of login credentials to access any machine they need to. This is also true for your cloud based applications — stop sharing accounts.
There are several reasons for this:
Proper management and restriction of privileged accounts goes a long way in securing IT assets.
And it begins on the lowly workstation or laptop.
"Anyone can be the target of hackers trying to gain access to systems and information."
— Joe Grzybowski, CEH
Individuals should not have administrator rights to their PCs. By not providing users with local admin rights, you minimize the impact of any malware that makes it through your email filtering, web filtering, and anti-virus defenses.
For example:
Let's say malware does get through on an individual workstation where the user does not have admin permission. Any malicious software will be run at the level of the current user, restricting what it can do. The operating system on that workstation will not be impacted because the user does not have permission to modify the operating system.
If, however, the user did have local admin access, any viruses introduced by the malware would immediately be running as an admin, and with free reign to make any changes to the workstation.
Frequently, users are granted admin access on their own machines for convenience. Users may be frustrated by needing to go to an IT person for something as innocuous as installing a printer or new font on their workstation.
For account administration, follow these best practices:
An accurate inventory is a good start towards a more secure network, but it's important to know when any new device has been added to your network.
Network monitoring will tell you when a device has been added to your network that you didn't know about.
It's easy to understand how this happens. Someone on your staff may bring up a new machine on the network, maybe even on a temporary basis for a project. Then, six months later, if that machine is not included on your inventory list, it's missing software patches and bug fixes and now poses a security risk.
Once you know what devices are on your network, it is important to keep the list up to date. The list will change over time, so it's important to verify the list on a regular basis.
"Your environment is always changing,
and change introduces risk."
— Sean McCloat, CISSP
Software is equally important as hardware. It's critical that you identify all software running on your network and continue to check for any new instances. If you don't know software is there, you'll be unable to make sure it's updated with the latest patches.
For an accurate inventory of IT assets, follow these best practices:
By thinking through the scenarios that can disrupt your business operations, you can develop the right procedures to implement in response to such events.
You can suddenly lose access to servers or other machines on your network for a variety of reasons, but whether a server goes down due to hardware failure or malicious activity, the solution is the same — restore from backups. (Learn more in "Preparing for Disasters with Disaster Recovery Services.")
Follow these best practices for proper disaster recovery:
One way to determine if you have taken adequate steps to prevent hackers from accessing your network is to have an outside cybersecurity firm perform penetration testing. Pen testing is the act of intentionally trying to break into the network or access data. The test results will expose any external vulnerabilities and their associated impact, including internet, IP addresses, firewalls, email servers, and web servers.
But all the security tools in the world will be of no use if employees unwittingly let the bad guys in.
"Security is not a set-it-and-forget-it endeavor. It is an ongoing process and culture."
— Joe Grzybowski, CEH
Criminals can convince your users to share login credentials via phishing schemes. The attacker pretends to be someone or something that they are not; once they gain the confidence of the victim, they simply ask them to provide their login information.
One purpose of these attacks is to gain access to your account. From there, the attacker can immediately take your files or hijack your email account to solicit more victims in your contact list. Within your files, they commonly seek confidential information such as account numbers, social security numbers, or more passwords.
Another common method of attack launched via phishing is malware. This is done by enticing a user to open a file or visit a web page. When they do so, the file or page executes a malicious action on that workstation. Frequently, a user is sent an email with a link that may appear to come from someone they trust. When the user clicks the link, the malware is released on that machine.
Security awareness training can help to warn users about what to watch out for. Keep in mind that even the most extensive training programs have limited effectiveness as users can be easily fooled with phishing attacks.
Follow these best practices:
Corserva provides managed security services including managed SIEM and managed firewall. Our services are supported 24x7x365 by our own US-staffed security operations centers, and backed by our engineers with certifications including CISSP, CISM, CGEIT, CRISC, CEH, and CompTIA Security+.
Contact us today and we can customize a security solution to fit your needs.