Page 72 - Cyber Defense eMagazine for September 2020
P. 72

“Second, we need the Secure Internet – automated collective defence must be built into the network, so
            that the Internet ecosystem can react as the body does, recognizing infections and fighting them off. We
            must build Internet Immunity.”

            Back to basics


            Of  course,  while  the  industry  calls  for  standards  to  be  developed  and  the  security  of  devices  to  be
            improved, businesses who want to use connected devices without compromising cyber security shouldn’t
            be alarmed. Like the approach some of the larger tech and telcos companies are taking, businesses of
            all  sizes  can  put  in  place  simple,  organisation-wide  preventative  measures  to  minimise  risk  to  their
            businesses as well as solutions to help them identify and respond quickly to threats.


            Rather than neglecting your core network and putting the focus just on to connected devices, you should
            seek to improve the security of your network holistically as a weakness in one part can of course impact
            the rest.  To minimise your attack surface and prevent adversarial intrusion by hardening your network,
            businesses should not underestimate the power of good cyber hygiene. A study by the  Online Trust
            Alliance (OTA) estimated that 93% of cyber security incidents  – large and small  – could have been
            avoided if the business in question had basic cyber hygiene practices in place.

            In  short,  cyber  hygiene  is  the  continuous  cycle  of  carrying  out  routine  checks  on  an  organisation’s
            network, endpoints and applications to identify and fix any network vulnerabilities, protect against cyber
            threats and maintain online security. Best practice such as deleting old user accounts, firm-wide policies
            on access and passwords, back up of data, securing physical and cloud databases, checking routers and
            networks, might seem obvious, but keeping on top of the basics really is the key to cyber hygiene and
            minimising the risks associated with security breaches.




            Time for change?

            Many organisations let basic cyber hygiene practices slip through lack of time and resource, not due to
            absence of expertise.  Indeed, over the last decade many new risk management frameworks have been
            introduced to combat this; for example, in 2014 in the US, the Federal Government introduced its best
            practice DHS CDM, or ‘Continuous Diagnostics & Mitigation’ program.

            To comply with this framework, agencies are expected to audit their entire enterprise every three days.
            In practical terms, if you had 500 devices connected to your network, you’d be carrying out nearly 61,000
            audits every year. For a bigger organisation with 25,000 devices, that’d be over 3 million vulnerability
            audits every year. Even if you’re not aiming for CDM levels of network security, with the number of core
            network devices increasing across organisations, it’s not a problem that can be fixed by simply solving
            the shortage of skilled cyber security professionals in the industry.


            Then add to this the need for resources dedicated resources to analyse the threat intelligence needed
            for effective threat detection and response – and the scale of the cyber security challenge is laid bare.






            Cyber Defense eMagazine – September 2020 Edition                                                                                                                                                                                                         72
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   67   68   69   70   71   72   73   74   75   76   77