There was great feedback and some questions about our Cybersecurity 101 blog, this 201 blog will answer those and help you to continue improving your cyber resiliency. The assumption here is that you have done all that is in the 101 (aka, the minimum) and you are curious (anxious?) about what else you should be doing. We are now starting to focus on efficacy, not just adding more checkmarks to a to do list.
One of the key principles in cybersecurity is what is called “defense in depth” or “layered defense”. Building on the zero trust concept, we assume that defenses will fail and that attackers will be able to progress further, so we add more layers of defense to slow them down and increase the likelihood they will be detected. Think of your classic medieval castle, there the moat surrounding the entire castle, followed by the ramparts, and should they pass all that: you then are in the courtyard, still exposed and not yet inside (and all along being watched and defended from towers and all).
From a cybersecurity perspective, your last line of defense is the local anti-malware. Should all else fail, you are counting on it to stop the attack (covered in 101), we are now adding more defenses in front of it. The most common attack vectors are email and web, so that is where we start:
Now that we have improved the outside, let’s start looking inside. One of the key improvements you can do on your network, is called network segmentation: you divide you assets in multiple networks based on types and risks (and ideally use a firewall in between). Should (when) an attacker starts roaming around on your network, it will make it harder for them to perform lateral attacks and improve the likelihood that their actions would be detected promptly. You should at least have the following networks:
Lastly, this one was originally planned to be part of our 301 blog, but based on the state of the world and the fact that there are now affordable options, we have elected to now make this a 201 recommendation: Managed Detection and Response (MDR). Speed of detection is key, you want to detect an attacker when they are trying to develop a foothold, not one month after when they unravel their nefarious plan.
As always, please reach out to us if you have any questions!
(If you represent a group of businesses (like a chamber or an association) and you would like us to present this content to your member at an event or via a lunch and learn, contact us, we might even pay for lunch!)