Is Your Organization Fully Protected Against a Cyber Attack?
Check out our Cyber Security Top Tips to find out if your organization is fully protected against a cyber attack.
1) Malware Prevention Does everyone in your organization know how to recognize and handle phishing communications?
Scan for malware across your organization and protect all host and client machines with antivirus solutions that will actively scan for malware.
Make sure you have stringent policies in place around email, web browsing, removable media and personally owned devices. Without a clear understanding of the risks and how to recognize potential threats, your organization is wide open to attack.
2) Password Security How strong is your password policy?
Simple things that may seem elementary are still extremely important when ensuring that everyone within your organization understands the implications of not following password security policies. Make sure staff are aware of internal policies and enforce regular password updates with automated processes wherever possible.
3) Network Security How strong is your network perimeter?
Connecting to untrusted networks (such as the Internet) can expose your organisation to cyber attacks. A secure network that is robust enough to protect internal and client data is essential. It is extremely important to have strong ACLs (access control lists) on all network devices to prevent breaches by would-be hackers. Follow recognized network design principles when configuring perimeter and internal network segments, and ensure all network devices are configured to the secure baseline build.
4) Secure Configuration Does your organization have a detailed Information Security Policy?
A corporate policy and processes to develop secure baseline builds, and manage the configuration and use of your ICT systems are essential. Remove or disable unnecessary functionality from ICT systems, and keep them patched against known vulnerabilities. Failing to do this will expose your organization to threats and vulnerabilities, and increase risk to the confidentiality, integrity and availability of systems and information.
5) User Privileges How is provisioning and de-provisioning of systems access managed in your organization?
The number of privileged accounts with control access to audit logs should always be limited and regularly updated. Monitor user activity, particularly all access to sensitive information and privileged account actions (such as creating new user accounts, changes to user passwords and deletion of accounts and audit logs). The danger of not managing this correctly can mean information falling into the wrong hands.
6) Incident Management How prepared are your incident response team if you come under attack?
You need to have an incident response and disaster recovery capability that addresses the full range of incidents that can occur. These incident management plans (including disaster recovery and business continuity) all need to be regularly tested. Be aware that your incident response team will need specialist training across a range of technical and non-technical areas to ensure they are fully prepared to handle any scenario.
7) Monitoring What is your monitoring strategy?
Your monitoring strategy needs to take into account previous security incidents and attacks, to contribute towards your organization’s incident management policies. Continuously monitor inbound and outbound network traffic to identify unusual activity or trends that could indicate attacks and the compromise of data. Monitor all ICT systems using Network and Host Intrusion Detection Systems (NIDS/HIDS) and Prevention Systems (NIPS/HIDS).
8) Removable Media How stringent is your policy?
The use of removable media is sometimes unavoidable, but if your policies around types of devices is not stringent enough, you can leave yet another area at risk to malicious attack.
Make sure your removable media policies control the use of removable media for the import and export of information. Limit the types of media that can be used together with the users, systems, and types of information that can be transferred. Scan all media for malware using a standalone media scanner before any data is imported into your organisation’s system.
9) Home and Mobile Working Are your mobile staff protected?
In order to develop appropriate security policies that fully protect your organization you need to assess the risks to all types of mobile working (including remote working where the device connects to the corporate network infrastructure).
Train mobile users on the secure use of their mobile devices for locations they will be working from. Apply the secure baseline build to all types of mobile device used. Protect data-at-rest using encryption (if the device supports it) and protect data-in-transit using an appropriately configured Virtual Private Network (VPN).
How did your organization measure up?
If you’re concerned about the potential risk of a cyber attack on your organization, you cannot afford to be complacent, you need to make your systems secure immediately.
Intuition have worked with many of the world’s largest organizations to create exciting and innovative custom online training that is both visually and mentally stimulating to ensure maximum knowledge retention.
In an age of information overload, we understand that when it comes to areas of high risk, a sheep dip approach is no longer good enough. Using media rich games and simulations, we design, build and host highly interactive and engaging courses which hold a user’s attention regardless of the subject matter.
We work with our clients to ensure that employees fully understand the content so that they can proactively and dynamically respond to risk in the everyday work environment.