Share

Executive Strategy: 3 pillars of cybersecurity

17 Aug 2022 Blog

Reports of cybersecurity attacks by criminal groups are increasingly common. Whether the motivations are financial or just for visibility, companies and organizations see their business paralyzed and at risk. Data is exposed or sold to the highest bidder, with organizations having to do all the work of mitigation and reputation management when that happens.

Protecting an organization has to be a priority for top management, which should not simply delegate this responsibility to IT, Security, CISO, DPO, or employees. Creating an awareness culture across the entire hierarchy is critical to mitigating risks.

This is a continuous path of protection, with small quick wins and based on three pillars: people, processes, and technology. Neglecting one of these vectors may even jeopardize the continuity of the business!


People

People are the weakest link in this triad. Fatigue, too many tasks at hand, lack of knowledge, or distraction are just some factors that can lead to risky behavior when it comes to cybersecurity.

Remind your employees that they are a crucial part of this process by adopting ongoing cybersecurity awareness programs, and measuring the results of phishing or USB Drop campaigns, for example. Invest in additional measures such as online training, internal events, or booklets available for consultation.

Create simple threat reporting mechanisms and continuously assess the cybersecurity risk of human activity.


Processes

Organizations map out their internal processes to achieve particular goals. By defining and reviewing cybersecurity procedures, it is possible to reduce risks and identify improvements.

Adopt and publish an information security policy, covering processes for asset management and risk classification, access management, vulnerability management, patch management, incident response, and business continuity. This documentation should be based on frameworks such as NIST, standards such as ISO27001, or national documentation defined by the CNCS (e.g.: National Cybersecurity Framework).


Technology

In an organization, technology must support people and business processes. Ensuring mitigation of the main attack vectors by introducing technical controls – that ensure visibility, automation, and orchestration – is a step you should not overlook in your security strategy.

We have identified 10 points that you must take into consideration when managing the company’s technological area:

  1. Perimeter: Protect data wherever it resides, whether in a private, public, or hybrid cloud.
  2. Email protection: adopting platforms such as Office 365 is not enough to ensure the hygiene and visibility of messages. Moreover, it does not provide adequate control in authentication and authorization.
  3. Content protection: adopting application firewalls and balancing solutions is a key factor to ensure the virtual patching of vulnerable, exposed applications or services.
  4. Endpoint or mobile devices: with centralized management integration, new threat support, and continuous telemetry.
  5. Cloud: analyze authentication/authorization and any anomalous behavior on instances.
  6. Identity: adopt a solution for identity management, onboarding, profile changes, decommissioning, and multi-factor authentication.
  7. Keywords: use a keyword management solution, incorporating secure storage, rotation, isolation, and session recording capabilities.
  8. Implement a patching and vulnerability management solution.
  9. Data: bet on the governance of structured and unstructured data and its classification and protection, through DAM, DLP, or IRM solutions.
  10. Using SIEM and SOAR solutions, manage and store logs, events, incidents, and auto-response.

To conclude, special attention should be paid to the existence of continuous pen testing services, enabling the cybersecurity status of exposed services and sites, infrastructure (Lan/Wi-Fi), and mobile applications on a regular or on-demand basis.


A safe bet

As the number of cyberattacks grows and their complexity increases, companies and organizations must prioritize cybersecurity as a topic on the agenda of all employees and stakeholders.

Invest in a security strategy focused on people, processes, and technology to ensure greater protection in case of attack. And, if you need help, talk to us! Oramix has over 20 years of experience in defining and implementing cybersecurity strategies.