Debi Kurnia
  • Future
  • Cybercrime
    • Cybersecurity
  • Privacy
  • Digital Life
  • Remote Work
    • Freelancing
  • Guest WriterJoin Us
  • Contact MeGet in Touch
No Result
View All Result
Debi Kurnia
  • Future
  • Cybercrime
    • Cybersecurity
  • Privacy
  • Digital Life
  • Remote Work
    • Freelancing
  • Guest WriterJoin Us
  • Contact MeGet in Touch
No Result
View All Result
Debi Kurnia
cyber defense

Cyber Defense: The Art of the Subtle

How to Build a Culture of Cyber Resilience Within Your Organization

Guest Writer by Guest Writer
12/07/2022
in Cybersecurity
Reading Time: 5 mins read
1
Share on FacebookShare on TwitterShare on LinkedIn

Right now, here’s a reality check for any organization. Cyber attacks are here to stay. Phishing, social engineering, and Ransomware attacks are now a clear and present danger to every organization.

Contents hide
1 You might also like
2 The Guide to Cybersecurity for Security Professionals
3 How to Study Cyber Security Independently and Without Cost?
4 Subtle Cyber Defense
4.1 Culture of the Company
4.2 Tooling
4.3 Validated Access
4.4 Proactive Application Patching
5 Conclusion

Cybercrime is now a multimillion-dollar business, and new attacks happen every day. These attacks can be anything from simple ransomware attacks to complicated schemes to steal money over the internet.

You might also like

Guide to Cybersecurity

The Guide to Cybersecurity for Security Professionals

30/07/2022
1.6k
How to Study Cyber Security

How to Study Cyber Security Independently and Without Cost?

18/07/2022
3k
cyber defense

As a result of the pandemic, corporate networks were extended into end-users homes, which made this industry even stronger. As a result, organizations are starting to add more money to their budgets to cover cyber resilience in terms of people and services like cyber insurance and other digital tools for intrusion detection and advanced threat prevention.

Subtle Cyber Defense

Many things can affect the success of a strong cyber resilience program. I have listed four things that I think are easy wins for any business if they are done right:

cyber defense

Culture of the Company

Without a doubt, everyone in an organization should do what they can to make sure the security of corporate assets is at the top of every task. Traditionally, non-IT employees would leave this up to the IT teams. However, this practice has failed many businesses because technology leaders are starting to see that traditional IT teams lack the skills and experience to deal with some of the more complex attacks that are common today. Cybersecurity has become a more important field, and IT managers now need to invest in either training their staff to do a better job or, as is recommended, hiring Cybersec professionals with more experience.

cyber defense

In addition to putting together the right IT teams, it is now everyone’s job to keep the company safe. Staff should be trained to recognize the different ways their accounts or identities can be stolen, allowing bad people to get in. Simple steps like turning on multi-factor authentication on both work and personal devices, using password managers to avoid texting or writing down passwords, and zipping and locking confidential documents with strong passwords before emailing them. All these things and more are low-hanging fruits that can help improve how businesses work together to protect the environment.

Tooling

I’ve already talked about password managers and MFA apps. These, along with firewalls (NexGen) and other similar tools, should now be standard tools every business uses. Aside from that, IT admins can use various monitoring tools to stay at least one step ahead of criminals. One tool can be used for advanced threat protection with an M365 business premium subscription. This is especially useful for small and medium-sized businesses (SMBs) that might not have a big enough IT budget to set up a strong SIEM solution. There are tools like Azure Sentinel, Splunk, Sumologic, and so on for bigger companies.

cyber defense

Many more companies are now using BYOD because of hybrid working. This means that IT administrators need to think about endpoint management (endpoint manager, previously Intune, is one such tool)

Validated Access

Last but not least, Validated Access is the third important pillar. This means, at its core, putting in place clear policies and procedures for how both internal and external parties can access and authenticate sites and digital assets. For physical sites, there should be ways to get in. Companies should use VPN access to connect from outside the office, etc.

A monthly review of the activity of new employees and those who leave is an excellent way to ensure that access is blocked or given the right way. You should also look at your admin user accounts and ensure that only a small group of people who need to access essential systems can use them.

Another suggestion for Admin/privileged accounts is to switch to named accounts instead of a single account that multiple people can use. So, you can track who gets into what and what they do.

cyber defense

Proactive Application Patching

In the last few weeks, my team and I have helped many clients recover from cyberattacks that took advantage of weaknesses in Microsoft Exchange. We found that Exchange was vulnerable in every case because there wasn’t a good patching program.

Technology leaders need to ensure that applications in their environments are updated regularly with the latest patches so that you don’t accidentally open a hole in your security. You might also want to look at third-party apps installed on end-user devices. A user might have installed portable versions of apps that your endpoint management solution might not be able to find.

Ultimately, how safe your environment depends on how much time you spend making sure that security comes first in everything you do. Your business is only as secure as its weakest link, and cybercriminals are constantly creating new tools and finding new ways to find those weak links, whether in software or because of mistakes people make.

Conclusion

The things above are just the tip of the iceberg when it comes to making a good cybersecurity plan for your business. Every organization has its own needs and ways of doing things that must be evaluated to ensure they are in line with the basic rules of a safe and secure environment.

Tags: CybersecurityFutureHackingPrivacyTechnology
Previous Post

What Is Cyber Crime, and How Does It Differ From Other Types of Crime?

Next Post

7 Work From Home Freelance Jobs That Pay $300 or More

Guest Writer

Guest Writer

This account belongs to a guest author.

Related Stories

nuclear

Is Nuclear Power the Future’s Best Choice?

by Guest Writer
06/08/2022
0
699

Here are five fundamental aspects of this technology that you need to consider. 1. Clean Energy The EU has recently...

AI

7 AI Sites You’ve Probably Never Heard Of!

by Debi Kurnia Putra
03/08/2022
0
1.6k

Let's use AI to make your daily life better. You probably use apps like Siri or Google Assistant, but do...

Guide to Cybersecurity

The Guide to Cybersecurity for Security Professionals

by Guest Writer
30/07/2022
0
1.6k

Most people think that cybersecurity is a vast subject. Even though I work in the field, I sometimes have to...

cybercrime risks

3 Most Important Cybercrime Risks to Consider

by Guest Writer
28/07/2022
0
1.8k

Cybercrime is a threat to everyone and every business. No business or person is immune or safe, so we all...

Next Post
Freelance Jobs

7 Work From Home Freelance Jobs That Pay $300 or More

Virtual Reality

3 Practical Applications for Virtual Reality in the Future

Comments 1

  1. Pingback: The Guide to Cybersecurity for Security Professionals

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Debi Kurnia

My name is Debi, and I work as an independent IT security and cyber security consultant to protect businesses from cyberattacks.
This is my blog.

  • Privacy Policy

© 2022 Debikurnia.com - Powered by DB.

No Result
View All Result
  • Home
  • Cybercrime
  • Cybersecurity
  • Digital Life
  • Freelancing
  • Future
  • Privacy
  • Remote Work

© 2022 Debikurnia.com - Powered by DB.