10 Cyber Security Best Practices
Simon Behan

10 Cyber Security Best Practices

The most effective strategy for keeping organisations, users and customers safe is to focus on a ‘best practice’ approach.

The most effective strategy for keeping organisations, users and customers safe is to focus on a ‘best practice’ approach.

"We need the latest security technology in order to protect our network against sophisticated attacks."

That’s a quote we hear all too often, but those shiny new toys are not always the best use of your money or your security staff’s time. Despite the media hype, the biggest threats to your enterprise data assets are actually from the same old threats that we worried about last year, five years ago, and in many cases even a decade ago. Only a handful of attacks truly use sophisticated “Mission Impossible” techniques, so the shiny new tools may do more harm than good at protecting your organisation.

Ruaidhri_McSharry_Ruaidhri McSharry, Cyber Security Leader at SureSkills explains why Cyber Resilience is so important. “Information lies at the heart of any organisation, a critical enabler of value, innovation and growth. This information has never been at greater risk from cyber-attack, threatening reputation, customer trust and operational stability. Cyber Resilience is about resisting, responding and recovering from attacks that will impact the information you require to do business. It requires a balanced and collaborative approach across the entire organisation – embedding awareness, insight and skills that will make you more effective in keeping your critical information safe."

So before investing in new tools, here are 10 security best practices to help protect your organisation with the techniques and technologies you likely already have in place. These best practices should be common knowledge, but unfortunately they are hardly common practice.

1. Educate

Security awareness should be part of your business’ DNA, and practiced both top-down and bottom-up. This is where an ounce of prevention is worth a pound of cure: Have a well-organised, well-understood, well-maintained, and well-monitored security policy for both insiders and outsiders, and make sure they undergo periodic training.

2. Patch

Despite the hype, most attacks exploit known vulnerabilities. Make sure you are investing adequate time in patching your systems. It’s not glamorous, but it is extremely effective.

3. Limit

Like making too many master keys to a building, you shouldn’t give admin rights to too many individuals. Make sure that anyone with privileged rights to the enterprise infrastructure and the security policy is truly trusted and keep an eye on them. What is true for people also holds true for network traffic. Make sure you do not have any overly permissive firewall rules (E.g. ANY/ANY) that allow traffic without any business justification.

4. Check

Data theft by insiders can be costly, or even calamitous. So while you’re looking at network policies, verify the outbound access you allow employees to have while on your network. Lock down everything that’s not needed. For example, if your company doesn’t use Dropbox or Google Drive, lock them out.

5. Segment

Network segmentation remains an important strategy to contain attacks by limiting the lateral movement of attackers. Understand where your critical data is stored, and use firewalls to limit traffic to and from those network segments.

6. Automate

Your attackers are using automated tools to scan ports and identify misconfigured devices, so how do you stand a chance if you attempt to do this work manually? Automating mundane security tasks such as analysing firewall changes and device configurations not only mitigates manual errors, it also frees up precious time to focus on more strategic security initiatives.

7. Visualise

You can’t secure what you can’t see. With the complexity of today’s networks and applications, it’s very difficult to understand the impact of a security policy change (such as adding a firewall rule) on business applications. This complexity coupled with a lack of visibility can have serious implications on security. So make sure you have complete, up-to-date visibility of your enterprise network and active monitoring of system configurations.

8. Document

Make sure to document your security policies in a knowledge database so that network admins, security staff, and even application teams understand exactly what is going on and why. This is particularly important when setting up rules to support new applications, because when an application is decommissioned or moved, you’ll want to reverse that rule. But you won’t be able to do so if you don’t know about it.

9. Align

Security teams are not always in alignment with other teams such as operations, and this misalignment can be even greater with the business side of the house. Make sure security is integrated into operations and business processes as early as possible. Failure to do so will perpetuate the situation where security is “bolted on” as an afterthought, and is perceived is an inhibitor to the business rather than an enabler.

10. Measure

Make sure you define metrics that are meaningful and can help you assess your security posture over time. With increased attention (and often increased budget) from the Board comes increased responsibility to demonstrate accountability.

As security practitioners, your job is to minimise business risk, doing nothing really isn't an option. You’ll get the most impact by involving the 'Whole Organisation', making sure it's business driven and by focusing on best practice and Cyber Resilience. SureSkills are in a position to ensure your organisation can achieve it's Cyber Security goals in a cost effective and timely manner. To speak to one of our Cyber Security team today, contact 01 240 2262 or email: info@sureskills.com

Previous Article IBM Smarter Process Event
Next Article AWSome Day | Galway 12th of November
1801 Rate this article:
No rating

Theme picker