Skip to main content

IT Defense In Depth Part I



In the 1930s, France built a trench network called the Maginot Line to rebuff any invasion. The philosophy was simple: if you map out all the places an enemy can attack, and lay down a lot of men and fortifications at those places, you can rebuff any attack. The problem is, you can't map every possible avenue for attack.

What does this have to do with IT security? Today many business owners install an antivirus program as their Maginot Line and call it a day. However there are many ways to get into a network that circumvent antivirus software.

Hackers are creating viruses faster than antivirus programs can recognise them (about 100,000 new virus types are released daily), and professional cybercriminals will often test their creations against all commercially available platforms before releasing them onto the net.

Even if you had a perfect anti­virus program that could detect and stop every single threat, there are many attacks that circumvent anti­virus programs entirely. For example, if a hacker can get an employee to click on a compromised email or website, or "brute force guess" a weak password, all the antivirus software in the world won't help you.

There several vulnerabilities a hacker can target: the physical layer, the human layer, the network layer, and the mobile layer. You need a defense plan that will allow you to quickly notice and respond to breaches at each level.

The physical layer refers to the computers and devices that you have in your office. This is the easiest layer to defend, but is exploited surprisingly often.

Here are a few examples:
  1. Last year 60% of California businesses reported a stolen smartphone and 43% reported losing a tablet with sensitive information.
  2. The breaches perpetrated by Chelsea Manning and Edward Snowden occurred because they were able to access devices with sensitive information.
  3. For example, Comptia left 200 USB devices in front of various public spaces across the country to see if people would pick a strange device and insert into their work or personal computers. 17% fell for it.
For the physical layer, you need to:
  1. Keep all computers and devices under the supervision of an employee or locked away at all times.
  2. Only let authorized employees use your devices
  3. Do not plug in any unknown USB devices.
  4. Destroy obsolete hard drives before throwing them out
Next time in Part II, we will talk about the human and network layers of security.

Comments

Popular posts from this blog

Cybersecurity training basics: Password best practices

Cybersecurity training basics: Password best practices & phishing identification As a business you know the importance of ensuring that your data is safe from the prying eyes of cybercriminals. While anti malware software programs and firewalls are essential to doing this, another important element is, training your employees to identify the traps laid by cybercriminals. This blog offers a list of what you should cover in cybersecurity awareness training. Password best practices This should be number one on your list. The easiest way to steal your data is by stealing your password. Hence you should educate your employees on password best practices. They should know Not to share passwords How to share passwords safely (if at all it has to be done) How to set strong passwords The importance of changing passwords often Your organization’s rules regarding passwords, i.e. your password policy and associated penalties/actions that will be taken if they fail to adhere to it You could also

Access matters when things go to **and?)!

Access matters when things go to **&?)! The COVID-19 pandemic brought a multitude of lessons along with it, on both the personal and professional fronts. From the business perspective, the pandemic turned things upside down across almost every industry. One of the biggest trends that the pandemic brought was remote work. While working from home (WFH), or telecommuting as it was called earlier, existed in some industries, the pandemic made WFH mainstream for everyone. From doctor’s offices, to SMBs to IT companies, almost every industry had to resort to remote operations to stay in business. This shift from on-site, brick-and-mortar offices to WFH brought along with it some serious challenges. This blog discusses 2 ways businesses leveraged technology to overcome the various challenges businesses faced with the sudden shift to the remote work environment. Data access This was one of the first and foremost challenges. When shelter-in-place orders and lockdown restrictions were impos

What does cyber insurance typically cover?

What does cyber insurance typically cover? Cyber insurance is a must-have to protect your business against the risk of cyber events and loss, compromise, or theft of electronic data. And, not just that, some of your clients may insist that you have cyber insurance coverage before they trust you with their data--especially if you are operating in the B2B market. Cyber insurance can break the fall in case you become the victim of a cyber attack or some gross malfunction that causes data loss. Here’s a list of things cyber insurance policies typically cover. Forensic analysis After a cybersecurity attack, you need to conduct a root cause analysis to identify what went wrong and where, so you can take corrective action to prevent the possibility of it repeating. Notification expenses, penalties & lawsuits Along with data breaches come a lot of liabilities including timely notification, fines, penalties, and perhaps even lawsuits for which you will need legal representation. Revenue los