Category Archive: Cybersecurity

A Few Steps to Improve Your Cybersecurity in 2023

Avatar photo July 5th, 2023 by

It’s amazing, if not terrifying, how fast the cybersecurity industry has exploded over the last 20 years. It’s literally gone from “maybe we should add passwords to our website” to “a significant business risk” in what seems like the blink of an eye. Entire career paths have been created within the industry so that most organizations now have multiple, specialized vendors supporting their enterprise cybersecurity program.

cybersecurity

With all of this change and increasing complexity, it’s no wonder many association executives and leadership teams can struggle to understand exactly what their organization should be doing to protect their data, people, and brands.

Approaching the halfway point of the year provides an opportunity to reassess your situation and commit to some new approaches to the problem. I’d like to offer association leaders a few potential resolutions to consider for the last half of the year.

Assess Your Security Risks

VOIP systemsFor the association that has some on-premise compute infrastructure still remaining, such as file servers, compute servers, VOIP systems, and the like, I’d highly recommend having a security risk assessment performed so you’re fully aware of your cyber risks as defined against an industry standard control framework such as CIS or NIST. If an organization doesn’t know where their biggest risks are, found by an objective cyber professional, then how can they ever be sure the cyber protection plans they are creating are truly addressing their biggest concerns? Unfortunately, because of supply and demand, many corporate/commercial oriented security vendors are charging exorbitant amounts for these types of assessments. Make sure and find an association or non-profit oriented vendor that right-sizes the effort to your organization.

If you’ve already had an assessment done or don’t believe your environment is complex enough to warrant one, then let’s talk about a few of the basic ‘cyber hygiene’ areas you want to ensure you’ve got covered. This is by no means a comprehensive list, but it’s a great place to start a conversation with your IT staff or support vendor.

Take Internal Precautions

Let’s talk about protecting yourself from your people. I know, that sounds a bit harsh, right? Most organizations like to think of their people as one of their greatest assets. This may be true when viewed through the lens of your mission, but when viewed through the lens of cybersecurity, they tend to make mistakes and therefore are your greatest risk. Make sure that multi-factor authentication is turned on for every single user. Also make sure that it’s required to connect to your VPN. Far too many organizations require MFA for email access, but don’t for VPN – the doorway to your network! Ensure their laptops are encrypted using Window’s bitlocker. Ensure that screens are auto locking after 15 minutes of inactivity. Lastly, and possibility my favorite, if you’re an O365 shop, please consider paying for the Defender for Office Plan 1 license for each user and turn on Safe Links and Safe Attachments. This is one of the very best ‘bang for the buck’ security services provided by Microsoft.

Take Internal Precautions
Take Internal Precautions

Secure Your Network Administrators

Now let’s talk about your network administrators. Make sure none of them are using administrator accounts as their everyday account. They should be using non-privileged accounts for their basic emailing and other work and only log in as a privileged administrator when they have specific administrative tasks to perform. I’d highly recommend ensuring they have changed every single default account password that could be in your environment. Every system comes with a default administrator account with a default password. Not changing these basically guarantees every hacker has an entry point to your environment. Let’s make sure they are disabling accounts as soon as people leave and checking for and disabling dormant accounts as well.

Assess Your System Vulnerabilities

Assess Your System Vulnerabilities How about your systems and your networks? You should have a vulnerability scan for both externally visible IP addresses as well as your internal networks on some kind of regular basis that aligns with your size and complexity. Short of phishing scams, exploitation of known vulnerabilities is the second leading vector for security compromises. I can’t emphasis this next one enough. Not only should you have a solid and consistent backup strategy, but you must ensure your backups are being stored in a network segment that is not available to standard users. If you don’t do this, the next time you get ransomware you can kiss your data goodbye. Lastly, please ensure all security patches are being deployed weekly. This is fundamental to the health of your organization.

So, I know that was quite a list. Feel free to use it as a conversation seed with your IT team or vendor. Have them explain all their security hygiene practices against a basis set of controls. A great place to get those would be the Center for Internet Security Critical Controls Implementation Group 1. Happy Half Year and I hope your security resolutions bring you cyber health in last part of 2023!

Cybersecurity 101

Avatar photo March 29th, 2023 by

On February 12, 2013, President Obama signed an executive order named “Improving Critical Infrastructure Cybersecurity”.  From this directive, the National Institute of Standards and Technology was tasked with the development of what has become the granddaddy of cybersecurity frameworks.  The government may have its challenges in many areas, but I’ll give credit where credit is due.  NIST did a pretty darn good job organizing the massively broad topic of cybersecurity.

Mention the term “cybersecurity framework” with most business folks and you’re likely to see their eyes glaze over.  I get it.  That topic has three ingredients that make for a pretty dry discussion:  cybersecurity, framework, and government-made.  I was not born a fan of compliance frameworks and, in fact, it took many years of dealing with security as a function of my responsibilities to develop the appreciation I now have.  Yes, I’m a cyber-geek.

NIST 800-171, the framework suggested for non-governmental organizations, consists of 110 controls, which are basically requirements organizations should meet.  That’s a lot of controls, right?  So now I’m getting to my point.  With so many controls, NIST knew it would make sense to categorize these controls into groups that they call Functions.  These five functions are the highest level of abstraction of the framework and represent the five pillars that every organization should use to build their cybersecurity program.

So what are these five functions and why do they make so much sense?

Identify The first is Identify.  This may sound like a no brainer, but you’d be absolutely shocked at how many organizations are weak in this area.  “Identify” is all about enumerating your systems, people, assets, and data in order to properly manage the cybersecurity risk.  Peter Drucker famously said, “If you can’t measure it, you can’t manage it.”  Cybersecurity professionals resoundingly agree.  How can your team know to check if software is upgraded if they don’t know the software exists?  How can they know if an account being used within your network is legitimate if there is no list of legitimate accounts?  If you can’t list it, you can’t protect it!

I warned you; it was a no brainer.  If we don’t have a documented list of people, accounts, hardware devices, and approved software, how can any team adequately put together a plan to protect it?  Surprisingly, something as easy as this is often overlooked by busy IT groups that are trying their best to do the other tasks you’ve asked them to do.  It’s far too easy to intend to create or update a hardware and software inventory, but let it fall aside because that member list has to get to marketing like it was yesterday.  “Identify” is core to all the other functions.

ProtectThe next function is Protect.  Just protect everything and we’re good, right?  I wish it were that easy.  The Protect function can be difficult as there is so much change in our environments.  Included are tasks such as using proper access control procedures, building your “human firewall” with staff awareness training, configuring network firewalls, patching every piece of software and operating system in use, and ensuring that your endpoint protection is best-in-class.  Believe me, there’s a lot to execute in this area.

Detect Next up is Detect. If your organization’s perimeter protections were breached, likely because of unmitigated known vulnerabilities, then a solid “defense-in-depth” strategy means you will need  systems in place that can detect bad actors in your environment.  The cornerstone of detection is monitoring which means utilizing automated systems, often leveraging AI, to spot malicious activity.  This area is most often outsourced due to the labor and expense required to execute it yourself.

Respond In the event malicious activity has been detected in your environment, guess what?  You will need to Respond, which is the fourth NIST function.  This function requires the deployment of systems and processes that allow taking action against an attack.  This often includes isolating the danger, managing communications, analysis, and finally mitigation activities.  These activities are often managed by an organization’s Managed Service Provider (MSP) or, even better, an Incident Response Service Vendor.  An IR vendor can manage the analysis, containment, eradication, and even recovery from a cybersecurity incident.

Speaking of Recovery, we’ve finally reached the final NIST function.  Yes, after you’ve set the bug-bomb off in the house to kill the breaching critters, you need to move the furniture back in and uncover everything you’ve protected with plastic wrap.  Bringing things back online, recovering systems and data from backup copies, and informing staff, customers, and members are all part of this function.

So, we made it!  There is a huge amount of knowledge, systems, implementation, and effort involved in covering all the bases in each of these areas. Luckily, there is usually low-hanging fruit that should be addressed first to get the most bang for your buck.  The biggest part of this entire cybersecurity circus is knowing where you currently stand regarding risks and having a plan for covering as much ground as possible as efficiently as possible.