Skip to content
Be excellent.
  • My Account
  • My Wishlist
Menu
  • My Account
  • My Wishlist
$0.00 Cart
  • Customer Solutions
    • Application & Data Experience
    • End User Experience
    • Security & Risk Mitigation
  • Who We Are
    • Our Commitment to You
    • What Our Clients Say
    • Our Partners
    • Careers
  • Knowledge Base
  • Get in Touch
Menu
  • Customer Solutions
    • Application & Data Experience
    • End User Experience
    • Security & Risk Mitigation
  • Who We Are
    • Our Commitment to You
    • What Our Clients Say
    • Our Partners
    • Careers
  • Knowledge Base
  • Get in Touch
Value Center
Improving your security posture
Office of the CIO
Office of the CIO

Aligning Your Technical Design and Execution to Improve Your Security Posture

  • October 25, 2019
  • From the Experts
  • 3 Comments
  • Application & Data Experience, Backup, Data Availability, Data Management, Data Protection, End User Experience, Identity & Access Management, Multi Factor Authentication, Security & Risk Mitigation, Strategy

We continue our journey today on aligning technical design and execution in order to improve your security posture. This week, as I sat at dinner with a long-time IT friend, his phone rang. It was his sister. She works at a financial services organization and had not been to work all week. “We have been told all systems are down. The business is currently working with two outside firms to return to normal operation. We will be notified once they are back up and running.”

My friend hung up the phone and quickly shot off “when are business leaders going to start to take this threat seriously?”

As we unpacked the news together, several questions were put on the table.

  • How many of today’s businesses could survive a weeklong outage and return to normal business operations?

    Ask yourself the question…can your business survive? More importantly, ask your organizational leadership. Are they prepared for the answer?

  • Why are businesses not acting more urgently to ensure their preventative posture is sound?

    Pen-testing and the latest in security-focused hardware and software appliances are important, but the common gap we continue to see is one of sound process. We’ll unpack this further below.

  • Do business leaders really take the threat seriously?

    The conversations we are having with businesses often reflect a marketplace in which the threat is known. But with everything else we have to manage, IT teams don’t know where to start.

    Another common theme is also technical teams not having the resources to execute. If this is you, go back to the first question, and take it to your business leaders.

A quick look at some staggering statistics:

  • Per an FBI release, since January 1, 2016 more than 4,000 ransomware attacks occur daily. This is up 300 percent from January 2015.
  • At the point of publication, Symantec’s Daily Threat Monitor noted 26,093 ransomware events in September 2019.
  • Sophos calls out that that average cost of recovery for a ransomware attack is $133,000 per event.
  • Sophos also points out that 75% of all attacked organizations were running up to date end point protection.
  • Kaspersky’s data states that 34% of all businesses hit by ransomware take a week or more to regain access to their data.

Basic Systems and Networking Practices to Improve Your Security Posture

 

Validate Your Back Ups Work and Sufficiently Protect Your Priority Systems

As we discussed in 5 Beginning Steps to Ensure Your Backups are Protecting Your Data from Ransomware, this step is vital to improve your security posture. In fact, when looking at CISA’s recommendation for improving your protection mechanisms, they also list this step first in the journey.

This isn’t rocket science, but it does require intentionality. Here is a summary of the article we posted earlier. Take the time to read the full link as it expands on the importance of the below steps.

  • Are you protecting your priority workloads and systems?
  • Have you tested any restores?
  • Do you know where all your data resides today? Are you protecting it if it resides in a cloud service?
  • Do you have a protected copy of your data that is offline?
  • Are you closely controlling system access?
  • Are you leveraging a manufacturer supported design?
Patching is Important

Yes, patching takes time. Yes…you have applications to support and deploy. But trust us…the effort is vital.

Microsoft’s October 2019 patch release covered 59 vulnerabilities – 9 of which were highlighted with a “Critical” rating score.

Soon, we’ll dig into creating a patch management strategy, but let’s highlight some basics.

  • Have you created a patching schedule? Do you hold to it?
  • Have that pesky 2008R2 system still floating around? Create a plan for legacy systems that isolates the workload to minimize your risk.
  • Have you automated the process to reduce the required effort?
  • Have you forgotten about patching your hardware and system bios?
  • Do you have a strategy to handle priority vulnerabilities?
Your Network Design Matters

It’s no longer a question of if someone will get it. We have to approach the question around “when someone gets in.”

Your network design becomes a vital layer in preventing nefarious actors from moving around your network once they’re in. The process of network segmentation takes some forethought, but it can be accomplished.

  • Do you know what systems actually need to talk to each other? It’s not safe to assume that because it’s within your network, you’re protected.
  • Are you keeping backups of your network configuration?
  • As you move workloads to the public cloud, has your network been designed to accommodate and protect this traffic?
  • Do you frequently review & monitor who has access to your network?
  • Are you reviewing network logs for attack vectors and unauthorized access attempts?
Identity Management and Access Controls

The days of trusting your password for simple access controls are long gone. Most industries have regulatory requirements in place to elevate your security posture. Are you properly aligned to your regulatory authorities?

Per Microsoft, setting your Identity Management baseline becomes the core of your security strategy moving forward. Paying a little attention here can go a long way over the course of time. Here is a quick starting point to walk through the basics. We often knock this out as a quick solution brief for our clients.

You can dig in deeper on creating a multi factor authentication strategy in our post 6 Things to Consider When Deploying MFA. This is a great starting point for the journey, but there are some related questions that also need to be asked.

  • Have you deployed multi factor authentication beyond the standard user controls? Have you also applied this approach to your systems and network management?
  • Do you have strong password management strategies? Not only for your users, but also for your technical systems?
  • Do you require passwords to be changed every 30 days? If not, why?
  • Do you have periodic reviews of who has access to core file systems?
  • What is the cadence of said audits?
  • Who has the authority to approve file and data access for your business?

Again, most of these questions target a procedural approach. You likely have the technology to enable these core practices. Remember, you need to be intentional in your design and process to improve your posture.

End User Computing

End User Computing is not as simple as just deploying a management solution that captures the presence of known vulnerabilities. In fact, this may be the most complex layer of the equation.

We always approach the end user layer with heightened sensitivity. The technologies we deliver are to support our end users as they drive revenue and support the core business mission. Thus, the actions and strategies in the technical domain need to limit the disruption to existing business process as much as possible.

All that said, to improve your security posture, we also need to protect the businesses we serve from the constant threats that target this layer of our ecosystem.

  • Are you educating your end users to the known threats and reminding them to be vigilant in their daily work?
  • What do your controls look like for remote users? How do you successfully deliver and manage their experience without limiting their success?
  • What does your DLP (data loss prevention) controls look like? Do you even have controls?
  • Are you monitoring for abnormal behavior or actions within your user base?
  • How are you managing access across your network for all of the devices your employees bring to work?

Where to go from here…

Understanding the risks here are not difficult. More importantly, have you properly communicated the risks to your business?

Beginning this journey doesn’t just reside within the responsibility of our security teams. As systems engineers and network administrators, we need to own our layers appropriately.

If you need to push pause on life to institute new policies or procedures, please, for the sake of your business, do it. If you need an outside perspective, to ensure your core architectures and processes are in alignment with a solid security posture, raise a hand.

Like most things in life, improving your security posture is not a destination, it’s a journey. Remain committed to consistently reviewing your position to ensure you’re adapting to the forces that are seeking to compromise your work.

Share This Post
Share on facebook
Facebook
Share on twitter
Twitter
Share on linkedin
LinkedIn
Share on email
Email

3 thoughts on “Aligning Your Technical Design and Execution to Improve Your Security Posture”

  1. Pingback: Deploying Network Access Control? - 5 Deployment Considerations Here

  2. Pingback: Modern Network Design Principles - Elevate Technology Partners

  3. Pingback: Securing your business with Microsoft's Identity Management Platform

Leave a Comment Cancel Reply

Your email address will not be published. Required fields are marked *

PrevPreviousThe Advantages of Leveraging a Cloud-Based Data Management Strategy 
NextConsiderations When Deploying Network Access ControlNext
Linkedin
Twitter
Envelope
Get a Customized Solution

616.202.6518

  • My Account
  • Privacy Policy
  • Terms & Conditions
  • Apply For Credit
  • Careers
  • Contact Us
Menu
  • My Account
  • Privacy Policy
  • Terms & Conditions
  • Apply For Credit
  • Careers
  • Contact Us

Sign Up For The Latest

Sign up for our blog and product updates and receive an instant online coupon code.

© 2021 Elevate Technology Partners LLC. Designed & Developed by Kynda.
Apply For Credit
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsAccept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are as essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.