Six ways to UP your cyber game !

Six ways to UP your cyber game !

Perversely, one positive thing to come out of the Ukrainian conflict is the drop in cyber attacks coming out of eastern Europe on commercial targets in far away geographies such as APAC and Oceania. Notwithstanding this temporary lull in activity, data breaches from ransomware and other viruses are still more common in today’s world than they were in the past. Protecting your business from a potential data loss has been elevated to the same level of importance as protecting your business from physical losses like fire and theft.

No alt text provided for this image

Frame security engineer Adi Ratnagiri, has highlighted six important areas an organization needs to consider to reduce their risk of critical cyber attacks in this article (the full paper can be found here).

Planning your Firewall Deployment:

In a macro-segmented network, they monitor and control inbound and outbound access across network boundaries. This is true for both layer 3 routed firewall and layer 2 bridge firewall deployments. When deploying a firewall, these networks or zones are connected to the firewall’s network interfaces. The firewall policy can then be simplified using these zones. A perimeter firewall, for instance, will include an exterior zone connected to the Internet, one or more internal interfaces connected to internal networks, and maybe a DMZ network connection. The firewall policy can then be modified as required to provide granular control.

Additionally, deploying two or more in a High Availability (HA) cluster guarantees continued security in the event that one fails. A hyperscale network security solution is preferable because it continually utilises the resources of each cluster member. This should also be considered for networks that encounter seasonal traffic peaks.

Implementing a zero-trust framework

This network security philosophy says that no one inside or outside the network should be trusted unless their identity has been carefully checked. Zero-trust is based on the idea that threats can come from both inside and outside the network. These assumptions shape the way network administrators think, so they have to come up with strict security measures.

Multiple Factor Authentication (MFA), a security measure that calls for users to provide multiple credentials in order to gain access, is used in this verification. Zero-trust also includes Network Access Control (NAC), which is used to prevent unauthorised users and devices from gaining access to a corporate or private network. All network access is restricted to authenticated users and devices that comply with the network’s security policies.

Securing your web applications

Expanding an organization’s attack surface is a common side effect of new digital endeavours. Vulnerabilities in web servers, server plugins or other flaws might expose new APIs and web applications to potentially malicious traffic. The latest features available in next generation firewalls help to protect web apps by filtering and monitoring HTTP/S traffic to and from a web service.

Email gateway security and sandboxing

Email is a common attack vector for cybercriminals. In addition to sandboxing, a secure email gateway solution protects against email-based attacks with advanced multilayered defences. Before an email reaches your network or mail server, it can be examined to see whether it contains any unfamiliar links, senders, or file types that slipped through the email filter.

Threat intelligence sharing

No alt text provided for this image

To help organisations mitigate hidden threats, real-time actionable intelligence is essential. For any network environment to offer a proactive defence, information must be shared among the various security layers and products. Additionally, this information sharing should include entities outside of your organisation that are part of the larger cybersecurity community, such as Computer Emergency Response Teams (CERTs), Information Sharing and Analysis Centres (ISACs), and business alliances like the Cyber Threat Alliance (CTA). The fastest way to respond to attacks is through rapid sharing, which also breaks the cyber kill chain before it mutates or spreads to other systems or organisations.

User Training and Good Cyber Hygiene

The 2021 Verizon Data Breach Investigations report says that 85 percent of data breaches are caused due to human error. It is impossible to ever be completely secure, but training your employees in cyber awareness and basic security practices will dramatically reduce your organisation’s threat surface. Ensure that all employees are trained in how to spot phishing attempts and have easy methods to report suspicious cyber activity. Ensure they are trained in maintaining a high standard of cyber hygiene, and know how to keep their personal devices and home networks safe. Employees should go through training when they are hired and at regular intervals while they are working, so that the information stays up-to-date and fresh in their minds. Training should also be kept up-to-date and include any new security protocols that may need to be put in place.

Furthermore, implementing basic security tools and protocols can assist CISOs in establishing a baseline of defence at the most vulnerable edge of their network and ensuring the security of critical digital resources.

Implementing secure systems that adhere to strict protocols and government regulations can be hard. Cyberattacks are inevitable, and protecting your organisation from the daily flood of attacks can be a daunting task.


For more information

If you need assistance preparing your business for the new age of security, don’t hesitate to contact us at The Frame Group.

To view or add a comment, sign in

Insights from the community

Explore topics