Bolstering business cyber security
In the twenty-first century, more and more businesses are embracing computerization onto their production processes as well as planning while countless more are joining the ever growing ICT entrepreneurship arena. In short, in this day and age, big data, the internet, cloud storage and computers are the driving forces behind an increasingly sophisticated economy.
Thus, for all businesses, cyber security is a crucial component. Cyber security is defined as the protection of internet-connected systems, including hardware, software and data, from cyberattacks.After all, all it takes to destroy the decade's worth of effort which goes into a company is just a few seconds of malicious hacking.
Therefore, we have listed below some tips which you can employ to better protect your business (es) on the cyber-digital end.
Ban and route to null t.co, bit.ly, and other URL shorteners
Why? Especially in phishing emails, a user has no idea where the link is going, what's behind that link, or what kind of benevolent or conversely malicious payload is going to load in the default browser. Sure, your anti-malware or antivirus tool, or even the browser's own instinct, might prevent a page load that opens a back door into your network.
Allow browsers to force https
Firefox and Chrome both have this feature. Lots of sites have log-ons on http where credentials are in plaintext on your network, or even the internet routing path in general that expose log-ons. Firefox now defaults to smacking users that try to use auto-fill on http sites. Educate users about this. And if, heaven forbid, your site has a log-on over http, you need to turn in your security stirrups while your horse still rides.
Update your asset lists monthly
There's too much change. Insurance companies love receipts and having things in order, as do police departments-which the insurance companies must have a report from. Yes, there's something to the tactic of taking a video of all your stuff, as well as the serial numbers, on a periodic basis and uploading it to two places.
Go through and delete expired browser certificates
Get rid of them. Allow users to get scary error messages when something tries to route them to somewhere expired so that they don't swallow the next thing that inevitably arrives: the forged certificate "open-wide" page. Face it, you need a key management system and rigorous enforcement once the trial has been completed. Key managers are worth their weight in stolen assets.
Client hosts files don't work. But router hosts files do
In my personal opinion, Microsoft should be banned for ignoring a hosts file, the file that contains hosts and IP addresses. It's done because this can disrupt Active Directory under some circumstances, so they ignore the file.
The problem is there are many well-thought cogent lists of fake and misspelled sites in hosts files that can prevent users from shooting themselves in the spelling foot. This is such an unholy act that Microsoft should be spanked.
MacOS and Linux both respect this file dutifully, which is why it needs to be periodically examined by scripts to see if it's been corrupted by unscrupulous users or, more importantly, malware. Always write your organization's hosts file once in a while just to remove potential corruptions.
Inventory your OS assets review
Running scans of your network for new and unknown MAC addresses means you've perhaps discovered new purchases or worse, newly implanted machinery on your network. After reading of the new DISHWASHER CVE (look it up-Meile USA), you have no idea until you've done the work of slogging through your ACLs and MAC address tables to look for the new backdoors into your network.
Do sanity check meetings
If you're on a security team, schedule regular meetings with other departments within IT. Let people voice their concerns. Remind people of organizational security needs. Allow yourselves time to physically visit important assets. Several eyes on assets might reveal something new or strange to investigate.
Read the logs
There are lots of great syslog amalgamation services that read Microsoft and standard syslog files. Filter and read them. Act upon what you see. The logs are there for a reason. Yes, Facebook can be more interesting, but read the damn logs.
Have a new hire systems security orientation
Security at other organizations ranges from tight to non-existent-and everythingin between. When a new hire comes on board, presume they know nothing at all about your organizational security mandates. Best practices for many organizations include training on Sarbanes-Oxley, HIPPA and other industry tenets. But security in every business segment is different. At minimum, make it a video with a quiz. Then you've established a baseline.
Although it seems counter-intuitive, constant brainstorming drains you. Team time and alone time are a better mix, as sitting at a desk for hours at a time becomes fatiguing. Get outside no matter the weather. Oxygenate. Get away from email, Slack, online management monitors-the whole mess. Refreshed, your mind will be more lucid to be ready for the next period of madness.