{"id":1420,"date":"2020-01-07T19:48:12","date_gmt":"2020-01-07T19:48:12","guid":{"rendered":"http:\/\/72.52.228.46\/~itegriti\/?p=1420"},"modified":"2021-04-12T02:56:32","modified_gmt":"2021-04-12T02:56:32","slug":"cyber-hygiene-habits-new-year","status":"publish","type":"post","link":"https:\/\/itegriti.com\/staging\/2020\/gsd\/cyber-hygiene-habits-new-year\/","title":{"rendered":"Cyber Hygiene Habits For The New Year"},"content":{"rendered":"<p>[fusion_builder_container hundred_percent=&#8221;no&#8221; hundred_percent_height=&#8221;no&#8221; hundred_percent_height_scroll=&#8221;no&#8221; hundred_percent_height_center_content=&#8221;yes&#8221; equal_height_columns=&#8221;no&#8221; menu_anchor=&#8221;&#8221; hide_on_mobile=&#8221;small-visibility,medium-visibility,large-visibility&#8221; status=&#8221;published&#8221; publish_date=&#8221;&#8221; class=&#8221;&#8221; id=&#8221;&#8221; background_color=&#8221;&#8221; background_image=&#8221;&#8221; background_position=&#8221;center center&#8221; background_repeat=&#8221;no-repeat&#8221; fade=&#8221;no&#8221; background_parallax=&#8221;none&#8221; enable_mobile=&#8221;no&#8221; parallax_speed=&#8221;0.3&#8243; video_mp4=&#8221;&#8221; video_webm=&#8221;&#8221; video_ogv=&#8221;&#8221; video_url=&#8221;&#8221; video_aspect_ratio=&#8221;16:9&#8243; video_loop=&#8221;yes&#8221; video_mute=&#8221;yes&#8221; video_preview_image=&#8221;&#8221; border_color=&#8221;&#8221; border_style=&#8221;solid&#8221; margin_top=&#8221;&#8221; margin_bottom=&#8221;&#8221; padding_top=&#8221;&#8221; padding_right=&#8221;&#8221; padding_bottom=&#8221;&#8221; padding_left=&#8221;&#8221; admin_toggled=&#8221;no&#8221; type=&#8221;legacy&#8221;][fusion_builder_row][fusion_builder_column type=&#8221;1_1&#8243; layout=&#8221;1_1&#8243; spacing=&#8221;&#8221; center_content=&#8221;no&#8221; link=&#8221;&#8221; target=&#8221;_self&#8221; min_height=&#8221;&#8221; hide_on_mobile=&#8221;small-visibility,medium-visibility,large-visibility&#8221; class=&#8221;&#8221; id=&#8221;&#8221; background_color=&#8221;&#8221; background_image=&#8221;&#8221; background_image_id=&#8221;&#8221; background_position=&#8221;left top&#8221; background_repeat=&#8221;no-repeat&#8221; hover_type=&#8221;none&#8221; border_color=&#8221;&#8221; border_style=&#8221;solid&#8221; border_position=&#8221;all&#8221; border_radius=&#8221;&#8221; box_shadow=&#8221;no&#8221; dimension_box_shadow=&#8221;&#8221; box_shadow_blur=&#8221;0&#8243; box_shadow_spread=&#8221;0&#8243; box_shadow_color=&#8221;&#8221; box_shadow_style=&#8221;&#8221; padding_top=&#8221;&#8221; padding_right=&#8221;&#8221; padding_bottom=&#8221;&#8221; padding_left=&#8221;&#8221; margin_top=&#8221;&#8221; margin_bottom=&#8221;&#8221; animation_type=&#8221;&#8221; animation_direction=&#8221;left&#8221; animation_speed=&#8221;0.3&#8243; animation_offset=&#8221;&#8221; last=&#8221;true&#8221; border_sizes_top=&#8221;0&#8243; border_sizes_bottom=&#8221;0&#8243; border_sizes_left=&#8221;0&#8243; border_sizes_right=&#8221;0&#8243; first=&#8221;true&#8221; type=&#8221;1_1&#8243;][fusion_text columns=&#8221;&#8221; column_min_width=&#8221;&#8221; column_spacing=&#8221;&#8221; rule_style=&#8221;default&#8221; rule_size=&#8221;&#8221; rule_color=&#8221;&#8221; hide_on_mobile=&#8221;small-visibility,medium-visibility,large-visibility&#8221; class=&#8221;&#8221; id=&#8221;&#8221;]<\/p>\n<p>New Year\u2019s resolutions of eating healthier, going to the gym, and re-balancing our priorities are commonplace in January for our personal lives. However, what about one of the places where every weekday is spent? \u00a0Why not build in resolutions for our professional lives, as well? \u00a0One such resolution could be to enhance your organization\u2019s cyber hygiene.<\/p>\n<p>Firstly, let\u2019s define what I mean by cyber hygiene &#8211; the term \u201ccyber hygiene\u201d is accredited to <a href=\"https:\/\/en.wikipedia.org\/wiki\/Vint_Cerf\" target=\"_blank\" rel=\"noopener noreferrer\">Vint Cerf<\/a>, allegedly when thinking about brushing his teeth. What comes to mind for me, is the need for preemptive action &#8211; twice daily brushing to prevent damage. Secondly, practicing cyber hygiene means when an issue arises, we are able to respond quickly \u2013 so if I develop a toothache, I would head to a dentist seeking a remedy to prevent further damage. \u00a0All in all, it\u2019s a process of knowing your environment (or your teeth) well enough to be able to quickly identify and respond to any threats, mistakes, or vulnerabilities.<\/p>\n<p style=\"padding-left: 30px;\">1.\u00a0Asset identification and criticality: Knowing the assets, and their associated criticality is the first step to building a strong environment &#8211; including quickly identifying assets that may not have followed the proper processes, see <a href=\"https:\/\/www.tripwire.com\/state-of-security\/security-data-protection\/shadow-protect-dont-know\/\" target=\"_blank\" rel=\"noopener noreferrer\">Shadow IT<\/a>. \u00a0This step is vital because it allows you to identify the business critical assets first.\u00a0 Once that is complete, then you can focus your resources on effective budget allocation<\/p>\n<p style=\"padding-left: 30px;\">2.\u00a0<a href=\"http:\/\/72.52.228.46\/~itegriti\/cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">Risk Assessment<\/a>: After you have confidently identified and classified your assets &#8211; which includes people, departments, data, software, and hardware &#8211; it is time to assess the current state of your protections. This can be completed via a formal Risk Assessment, which identifies both risks to the organization and the security measures currently in place. \u00a0This granular view provides a gap analysis and prioritizes identified risks based on the organization\u2019s attack surface.<\/p>\n<p>[\/fusion_text][fusion_text columns=&#8221;&#8221; column_min_width=&#8221;&#8221; column_spacing=&#8221;&#8221; rule_style=&#8221;default&#8221; rule_size=&#8221;&#8221; rule_color=&#8221;&#8221; hide_on_mobile=&#8221;small-visibility,medium-visibility,large-visibility&#8221; class=&#8221;&#8221; id=&#8221;&#8221;]<\/p>\n<p>Many organizations attempt to enhance their security controls \u2013 possibly by increasing the number of alerts or innovating their awareness training \u2013 but few take the time to truly understand the needs of the organization. For every program, I recommend taking the time to properly assess steps 1 and 2 before continuing onto any potential enhancement steps.<\/p>\n<p style=\"padding-left: 30px;\">3. Outside inwards: Keep your environment \u201dclean\u201d by layering protections across all areas of the attack surface. Examples of additional layers include multi-factor authentication on any login portals, denial-by-default firewalls, intrusion prevention systems (IPSs), and access controls lists (ACLs) that have been customized for your environment.<\/p>\n<p style=\"padding-left: 30px;\">4. <a href=\"http:\/\/72.52.228.46\/~itegriti\/managed-services\/\" target=\"_blank\" rel=\"noopener noreferrer\">Inside out<\/a>: Not only is it vital to keep malicious actors out of our environment, but we must be prepared to mitigate the potential impact if such a breach happens to occur, <span style=\"text-decoration: underline;\">including protection against human error<\/span>.\u00a0 This can be achieved by restricting access based on business need, limiting privileged control, and reducing congestion. \u00a0Effectively implementing these measures starts by understanding your people, following the principle of least privilege, and addressing network segmentation, all of which are detailed below<\/p>\n<p>[\/fusion_text][fusion_text columns=&#8221;&#8221; column_min_width=&#8221;&#8221; column_spacing=&#8221;&#8221; rule_style=&#8221;default&#8221; rule_size=&#8221;&#8221; rule_color=&#8221;&#8221; hide_on_mobile=&#8221;small-visibility,medium-visibility,large-visibility&#8221; class=&#8221;&#8221; id=&#8221;&#8221;]<\/p>\n<p>Looking at the inside of our cyber hygiene:<\/p>\n<p style=\"padding-left: 30px;\">5.\u00a0 Understanding your people and the principle of least privilege: In order to provide the access required for performing someone\u2019s duties, you must understand what their role requires. Access should be provisioned based on an individual\u2019s role within the company and limited to only the privileges necessary for performing that role.\u00a0 By limiting these privileges, you are not only mitigating risks, but also reducing the potential attack surface of your environment if a security breach were to ever occur.\u00a0 Limiting access could isolate malicious software or a bad actor and prevent network-wide infiltration.\u00a0 Keep in mind &#8211; when administering access \u00a0based on business need, it must also be assessed for accuracy on a periodic basis.\u00a0 These frequent assessments mitigate the risk of privilege creep, also known as the accumulation of privileges over the course of an individual\u2019s time with the company.\u00a0 Privilege creep can occur throughout an employee\u2019s tenure as that person transfers into different positions or is promoted and fails to have their previous privileges revoked.\u00a0 In order to avoid this, it is imperative that you assess access rights with some degree of periodicity. \u00a0Practicing these principles, year after year, will greatly help reduce threats and incidents to your organization.<\/p>\n<p style=\"padding-left: 30px;\">6. Network segmentation: Not all devices need to communicate together. In fact, in some environments there are systems that require a greater level of security and must be segregated. To ensure effective hygienic network connectivity, you should determine which devices, applications, and workflows are being added to the network and pinpoint the services that must continue to communicate to one another.\u00a0 Implementing this type of segmentation involves understanding what the system needs, what data classification level it falls under, and what security measures are necessary. \u00a0This will allow you to map out the assignment of groups for both local communication and security principles and define necessary access rights. \u00a0As the evolution of regulatory obligations (PCI and NERC CIP) continues and security frameworks (NIST) become more mature, network segmentation will quickly become more prevalent.<\/p>\n<p style=\"padding-left: 30px;\">7. <a href=\"http:\/\/72.52.228.46\/~itegriti\/2016\/cybersecurity\/baseline-cybersecurity-controls\/\" target=\"_blank\" rel=\"noopener noreferrer\">Baselining the environment<\/a>: It\u2019s no secret that an expensive security control \u2013 with little understanding on how to use it \u2013 can quickly become burdensome. For instance, without a solid baseline of the environment, your operations teams can quickly become overwhelmed with useless alerts, which can lead to fatigue and ultimately result in the alerts being ignored. \u00a0Unfortunately, this happens more often than you think. \u00a0However, establishing a proper security baseline will help alleviate some of these issues.\u00a0 It will provide you with a holistic view of what \u201cnormal\u201d looks like and allow you to customize alerts for only what should not happen. \u00a0If your organization is already confident in its understanding of the baseline, another step forward would be to start investigating the alerts that resulted in no issues found.\u00a0 This can be done by reviewing closed tickets and sifting through the closure responses. You may just find that the alert, \u00a0while useful, simply needs a little fine tuning to be more effective.<\/p>\n<p style=\"padding-left: 30px;\">8.\u00a0 Metrics and Monitoring \u2013 reevaluate your reporting cycle: Now that you know your people, processes, and technology, it\u2019s time to effectively present these facts across the organization. To do this, you must understand what others view as useful. \u00a0For instance, \u00a0senior leadership may not want as granular detail or technical findings as an operations team. \u00a0Over the last year, how have the recipients of your reports viewed your program? \u00a0Are they still confused about requirements? \u00a0If so, it may be that the reports aren\u2019t expressing this information clearly. \u00a0Actively work with your stakeholders to better understand what images, numbers, or write-ups would be more effective. \u00a0Also, make an effort to determine how frequently these reports should be developed.\u00a0 Senior leadership may only want to discuss the information monthly, but folks in operations may find benefit in a weekly report.<\/p>\n<p style=\"padding-left: 30px;\">9. <a href=\"http:\/\/72.52.228.46\/~itegriti\/2019\/cybersecurity\/multistate-cyber-change-management-training\/\" target=\"_blank\" rel=\"noopener noreferrer\">Culture and Awareness<\/a>: Arguably, the most important aspect of cyber hygiene for any organization is the culture and understanding of security. If you don\u2019t teach the \u201cwhy\u201d in a positive and empowering manner, you aren\u2019t going to change human behavior. Effectively communicating awareness training may seem challenging at first, but if you are able to tailor the training to your targeted audience, it will prove invaluable.\u00a0 Once you understand the audience\u2019s tasks, the nature of the potential threats they are exposed to, and the controls already in place, you will be able to customize the training module so that it suits their needs. Directing the culture to pick up on specific human behaviors that need changing and creating long term engagement can be done by analyzing useful metrics, determining intrinsic or internal motivations, and bringing the risk closer to home. Clear demonstrations on how to protect oneself from potential cyber threats should prove far more useful than reading a policy that states specific actions.<\/p>\n<p>[\/fusion_text][fusion_text columns=&#8221;&#8221; column_min_width=&#8221;&#8221; column_spacing=&#8221;&#8221; rule_style=&#8221;default&#8221; rule_size=&#8221;&#8221; rule_color=&#8221;&#8221; hide_on_mobile=&#8221;small-visibility,medium-visibility,large-visibility&#8221; class=&#8221;&#8221; id=&#8221;&#8221;]<\/p>\n<p>Even after embedding security controls, creating meaningful alerts, and enhancing your awareness program, you must continue to assess the effectiveness of \u00a0your solutions periodically. \u00a0This can be done in a variety of ways: phishing campaign, penetration test, red team and\/or tabletop exercises. Testing each and every aspect of your program not only empowers you to identify any future needs but also strengthens your team\u2019s ability to respond in the event of failures.\u00a0 <a href=\"http:\/\/72.52.228.46\/~itegriti\/\" target=\"_blank\" rel=\"noopener noreferrer\">Learn how ITEGRITI can help improve your company\u2019s cyber hygiene<\/a>.<\/p>\n<p><em>Editor\u2019s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of ITEGRITI, Inc.<\/em><\/p>\n<p>[\/fusion_text][\/fusion_builder_column][\/fusion_builder_row][\/fusion_builder_container]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[fusion_builder_container hundred_percent=&#8221;no&#8221; hundred_percent_height=&#8221;no&#8221; hundred_percent_height_scroll=&#8221;no&#8221; hundred_percent_height_center_content=&#8221;yes&#8221; equal_height_columns=&#8221;no&#8221; menu_anchor=&#8221;&#8221; hide_on_mobile=&#8221;small-visibility,medium-visibility,large-visibility&#8221; status=&#8221;published&#8221; publish_date=&#8221;&#8221; class=&#8221;&#8221; id=&#8221;&#8221; background_color=&#8221;&#8221; background_image=&#8221;&#8221; background_position=&#8221;center center&#8221; background_repeat=&#8221;no-repeat&#8221; fade=&#8221;no&#8221; background_parallax=&#8221;none&#8221; enable_mobile=&#8221;no&#8221; parallax_speed=&#8221;0.3&#8243; video_mp4=&#8221;&#8221; video_webm=&#8221;&#8221; video_ogv=&#8221;&#8221; video_url=&#8221;&#8221; video_aspect_ratio=&#8221;16:9&#8243; video_loop=&#8221;yes&#8221; video_mute=&#8221;yes&#8221; video_preview_image=&#8221;&#8221; border_color=&#8221;&#8221; border_style=&#8221;solid&#8221; margin_top=&#8221;&#8221; margin_bottom=&#8221;&#8221; padding_top=&#8221;&#8221; padding_right=&#8221;&#8221; padding_bottom=&#8221;&#8221; padding_left=&#8221;&#8221; admin_toggled=&#8221;no&#8221; type=&#8221;legacy&#8221;][fusion_builder_row][fusion_builder_column type=&#8221;1_1&#8243; layout=&#8221;1_1&#8243; spacing=&#8221;&#8221; center_content=&#8221;no&#8221; link=&#8221;&#8221; target=&#8221;_self&#8221; min_height=&#8221;&#8221; hide_on_mobile=&#8221;small-visibility,medium-visibility,large-visibility&#8221; class=&#8221;&#8221; id=&#8221;&#8221; background_color=&#8221;&#8221; [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":1421,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2181],"tags":[1095],"_links":{"self":[{"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/posts\/1420"}],"collection":[{"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/comments?post=1420"}],"version-history":[{"count":10,"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/posts\/1420\/revisions"}],"predecessor-version":[{"id":2003,"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/posts\/1420\/revisions\/2003"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/media\/1421"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/media?parent=1420"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/categories?post=1420"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/tags?post=1420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}