Continuing our goal of providing a high-level overview of the things you should be doing to be more Cybersecure, this is part 3 of 5. You now have started to take some decisions on how to protect your key assets, but in some ways, you are still blind. This is where the third function of NIST, “Detect” comes into play. You can find part 1 “Identify” here, and part 2 “Protect” here.
In this section, we will explore the three main aspects of the detect function: Monitor, Understand and Verify.
Monitor: having all the great tools in place is a great start, but if do not monitor their status, how do you know they are working (effectively or at all!)? The best examples here is using only the Autoupdate feature on Windows or Mac, does it work well? Most times… If you have 50 devices, is there a chance one of them might get stuck and require a human intervention to complete? Yes! Should you rely on your end users to keep track and take the required actions? No!
Understand: As we eluded above, Monitor gives you information, now you need to Understand what is happening to evaluate the impact and take actions. The obvious is detecting an attack an enacting your Cyber Security Response Plan (more on that soon), but the reality for most organizations is more mundane. Examples are: patches falling behind because users are not rebooting, backups taking too long to complete and impacting daytime system performance, specific users showing repeated risky behaviours (going to risky websites, clicking on phishing emails) that prompts a requirement for additional training.
Verify: Last, but probably the most important. What’s the point of doing all this if it is not effective and how do you know it is effective if you do not verify?
We hope this helps you continue your Cybersecure journey. All documents and information are only made available for informational purposes, you should work with a professional to adapt them to your business.
Stay tuned for the next of the Five Functions: Respond.