You've been hit. Now what?
As cyberattacks on midsize firms continue to prove inevitable, are you ready to be hit?
A strong defensive posture minimizes exposure, limits collateral damage and protects client privacy.
We’ve been providing IT consulting and technology services to the mid-size business community since 1999, and from basic firewalls to advanced breach detection systems we absolutely guarantee there’s no shortage of security products designed to protect the enterprise.
But third party/supply chain attacks have changed this game. Drastically. And, from the most basic user training videos, to a 24x7 monitored security and information management (SEIM) system, there’s not one thing a business can do to protect data when its business management system, ERP or CRM is breached. Bottom line – every business on the planet relies on third-party software and there’s simply no safe place to hide. Boo!
But since shutting down shop isn’t an option, we must, as always, take up this threat and face it head on! #BeUnafraid
As we wrote in a previous article on third-party cyberattacks, you can only worry about what’s within your control. Since fully defending against this attack isn’t possible, we can only protect our organizations and prepare to be attacked.
1. Deploy a multi-layered detection and response approach. Multisyllable marketing jargon aside – as quickly as possible, you need to know you’ve been breached, and you need a post-attack response plan (or plans). “Honeytokens” or virtual trip wires setup to alert organizations of suspicious activity in their network are a great tool. If a being breached is bad, not learning about it till days or weeks after it happens is worse and not knowing what to do next can be catastrophic. www.upguard.com/blog/how-to-prevent-supply-chain-attacks
2. Include threat hunting as regularly scheduled IT maintenance. As described by our partners at SentinolneOne << https://www.sentinelone.com/cybersecurity-101/threat-hunting/>> Threat hunting is quite a different activity from incident response (IR). While IR methodologies aim to determine what happened after a data breach, a threat hunting team searches for attacks that have slipped through your defensive layers to help you find adversaries hiding in your network before they can execute an attack or fulfill their goals.
3. Work with a SIEM solution that offers automated remediation actions. A security information and event management (or SIEM) is a cybersecurity solution that collects and converges data from different parts of your IT environment with the intent of monitoring your firm’s security levels. Providing advanced visibility and insight into your users, endpoints, traffic, activity, and more, a SIEM enables you to maintain oversight into your network and beyond the perimeter as your company scales.
4. Log capture and file retention for critical infrastructure. As detailed in this whitepaper from the National Institute for Standards & Technology (NIST) nvlpubs.nist, log management is essential to ensuring that computer security records are stored in sufficient detail for an appropriate period of time. Routine log analysis is beneficial for identifying security incidents, policy violations, fraudulent activity, and operational problems. https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-92.pdf
5. Encryption for all data at rest. In cryptography, encryption is the process of encoding information or sensitive data so only authorized parties can access it. While encryption can’t prevent criminal activity or third-party attacks, it does deny intelligible content to the interceptor. For more on encryption, we recommend this article published by UpGuard www.upguard.com/blog/encryption.
6. Use 2-factor/multi-factor authentication. With two-factor authentication enabled, criminals who do gain access to user login credentials aren’t automatically granted entry. A key element to a Zero-Trust Security framework, multi-factor authentication requires users validate their identity to provide that extra layer of security.
Above all, at OWG we believe cybersecurity will always come down to your corporate culture and your posture – on your toes, knees bent, arms ready. Stay sharp, be prepared and have your plan in place and you’ll have an advantage and typically able to weather the storm. The complacent or unprepared will get swallowed.
For more information, or to set a time to speak, drop your name and email below and we’ll reach out.
More from the author
A Business Case for Next Gen Cloud
What will it take for your business to make the jump to Cloud? For this exceedingly traditional Los Angeles-based law firm it was a global pandemic and state lockdowns that almost brought the business to a stand-still.
OWG Assembles Rock-Star Movember Team!
Since 2002, The Movember Foundation has funded over 1,250 projects around the world. An annual fundraising campaign which encourages participants to grow a moustache (or do something else!) to support men’s health issues, we’re excited to participate and appreciate your interest and support!
You've been hit. Now what?
As cyberattacks on midsize firms continue to prove inevitable, are you ready to be hit? A strong defensive posture minimizes exposure, limits collateral damage and protects client privacy.
A Business Case for Zero Trust Cybersecurity
The medical community has always been at the front of the line when it came to technology integration. Now, as attacks on the healthcare industry explode, executive leadership, board members, doctors and practice administrators wonder what they can do differently. The answer - trust no one, ever! Here's how...
Next Gen Cloud for Midsize Accounting
Accounting firms are relatively conservative when considering a move to the Cloud. But with a hybrid workforce now a necessity, here’s how we helped one firm make the jump.
It’s Cyber Awareness Month… So What!?
We believe cybersecurity (and business technology overall) are factors of an organization’s culture. As such, we recognize the importance of building awareness through communications, events and month-long campaigns that serve to remind, educate, and inspire us to take action.