how safe

is your business data

how relevant is your  data protection

Security is a vast and OFTEN misunderstood subject

So I’m never surprised when I find many protection plans to be woefully inadequate and poorly managed and executed.
Many plans are centered purely around Viruses and Spam and are outward-facing but that's a small part of the attack surface and the ever-growing landscape of very clever threats and subversions.

Over the past few months, many of my clients have been subject to several concentrated outside hacking attempts. All of which, I’m happy to report, have been successfully stopped.

Unfortunately, the probing and attacks never stop, so your UTM firewall is the typical and more traditional first line of defense. And, like all security measures, it must be continually monitored and updated (preferably automated) to ensure it remains capable of handling the diversity of existing and ever evolving threats.

"so I’m never surprised when I find many protection plans to be woefully inadequate and poorly managed and executed"

Even with this defense in place, you are still vulnerable to many potential subversions, especially ones initiated inside your network from compromised devices (and people!). These threats can take various forms from password sharing, malicious or ignorant/careless user action, as well as malicious software like ransomware and their kind.

Security breaches by way of data loss, either malicious or accidental, can be challenging to guard against, especially if the subversion has been festering over an extended period. Monitoring for breaches and trends is paramount in maintaining control of your data assets.

The first step (in no particular order) toward this is to enforce your security policies that:

KitKat

Of course, security enforcement is a balancing act and must be finely tuned so as not to restrict access to information where it’s actually needed.

“Knowing there is a trap is the first step in evading it.” – Frank Herbert

The next step is to implement data loss prevention tools to monitor user access and block the outward transmission of data. File auditing tools are extremely helpful in tracking file access on fileservers and in cloud environments like OneDrive and Dropbox etc.

In all honesty, it’s best not to get infected in the first place, so one of the critical factors in remaining vigilant against potential threats is user education.

“Knowing there is a trap is the first step in evading it.” – Frank Herbert

We’re all aware of viruses and exploits, but several areas require constant attention in line with, and in addition to, the measures outlined above.
Below is a little more detail on the areas you need to manage around best practice, governance, and risk:

  1. Against credential theft
  2. Reduce AD attack surface
  3. Implement Least-Privilege administrative models
  4. Implement Secure Administrative hosts
  5. Secure your domain controllers against attack
  6. Implement 2FA on cloud access
  1. Prepare for before, during, and after the disaster - It will happen.... the only unknowns are when, where and magnitude of the impact
  2. Pay particular attention to the following areas:

Most importantly - Plan and Be Ready

Contact us for more info and help!

Let's Be Friends

Contact us to talk about your needs and how we can help you.

+64 21 2255007
+64 3 9298514
connect@rwt.co.nz
blog.rwt.co.nz
Schedule Appointment