August 10, 2017
-
Anissa Khalid
,

6 Ways to Help Improve your Security Posture

<p>A strong cybersecurity program is quickly becoming one of the most important investments a company can make. In the wake of numerous corporate breaches over the last few years, all users are on higher alert about the safety of their sensitive data. Whatever the size or maturity level of your security infrastructure, there are a few key steps that you can take to keep your data and organization safe.</p><h3><strong>1) Educate your employees</strong></h3><p>It’s an unfortunate truth that security isn’t really a tech problem - it’s a people problem. Even with the most advanced gadgets, uneducated staff can fall victim to some of the simplest and most common attacks. The best way to avoid this is to train your employees on security best practices. This could be any number of things, but some of the best to start with are:</p><ul class="iconlist"><li><i class="icon-ok text-blue">​</i>Check to make sure that any website, popup, or email that you’re about to click on seems authentic. <a href="https://www.anomali.com/blog/why-brand-monitoring-is-a-security-issue-typosquatting">Misspelled URLs</a> or garbled text are usually a dead giveaway that what you’re seeing isn’t legitimate.</li><li><i class="icon-ok text-blue">​</i>Ensure passwords are different for <a href="https://www.anomali.com/blog/why-brand-monitoring-is-a-security-issue-compromised-credentials">corporate and private accounts</a>.</li><li><i class="icon-ok text-blue">​</i>If you’re unsure of something or see anything suspicious, report it!</li></ul><h3><strong>2) Implement formal security policies</strong></h3><p>Implementing formal policies can be a pain, but it’s far easier to lay out rules than it is to try and respond to a breach. One of the more familiar policies is to require strong passwords with a combination of upper and lowercase letters, numbers, and symbols. If you want to go the extra mile (you do) set these passwords to expire every 60 to 90 days. You can also require Multi-Factor Authentication (MFA), which means you’ll need two devices to login into accounts.</p><p>Also, don’t be afraid to hold your employees accountable and make sure that they understand their responsibilities in using both company-issued and personal devices for work purposes.</p><h3><strong>3) Practice your incident response plan</strong></h3><p>Even if your formal policies are effective, you should still practice your incident response plan. Luckily this isn’t the typical fire drill where everyone has to awkwardly shuffle out of the building – it just means simulating what might happen in the case of an attack. In the <a href="{page_3448}">2017 SANS Incident Response Survey</a>, 58% of respondents indicated that they review and update IR processes at least periodically. This number is likely to increase as more resources are diverted to Incident Response teams. This is a worthwhile investment because a well-functioning IR team can mean the difference between remediation efforts after one day or one month, which ultimately protects your organization from damage.</p><h3><strong>4) Plan for a breach</strong></h3><p>An effective security strategy means planning for the worst possible outcome. It’s an unfortunate reality that most organizations are likely to be breached in some capacity. The likelihood of a cyber attack on any size business continues to increase as technology and hacking techniques advance, and without a response plan in place, your business is more likely to falter and mishandle a breach when – not if – one occurs.</p><p>Companies should be aware that, depending on their business, they are more likely to be the victim of a <a href="https://www.anomali.com/blog/targeted-vs-indiscriminate-attacks">targeted or indiscriminate attack</a>. Identifying which attack is likelier for your organization can help you decide how to allocate your security resources and appropriately plan for inevitable attacks.</p><h3><strong>5) Invest in security software</strong></h3><p>The worst mistake an IT department can make regarding its cyber protection is not having any at all. A <a href="https://www.anomali.com/products/threatstream">robust security solution</a> is a must-have for any company, especially those who conduct most or all of their business online. There are also a number of free and open source solutions that can help to develop security programs, although these will not possess the more comprehensive functionalities of paid tools.</p><p><strong>Free and/or Open Source</strong><br/> <a href="https://www.anomali.com/community/staxx">STAXX</a><br/> <a href="https://github.com/Pwnlandia/mhn" target="_blank">Modern HoneyNet</a><br/> <a href="https://www.shodan.io/" target="_blank">SHODAN</a><br/> <a href="https://www.virustotal.com/" target="_blank">VirusTotal</a><br/> <a href="https://malwr.com/" target="_blank">Malwr</a><br/> <a href="http://www.ipvoid.com/" target="_blank">IPVoid</a><br/> <a href="https://www.threatminer.org/" target="_blank">Threatminer</a><br/> <a href="https://www.domaintools.com/" target="_blank">DomainTools</a><br/> <a href="https://github.com/csirtgadgets/massive-octo-spice/wiki/The-CIF-Book" target="_blank">CIF</a><br/> <a href="https://crits.github.io/" target="_blank">CRITS</a><br/> <a href="http://www.misp-project.org/" target="_blank">MISP</a><br/> <a href="https://github.com/yeti-platform/yeti" target="_blank">Yeti</a><br/> <a href="https://cuckoosandbox.org/" target="_blank">Cuckoo</a><br/> <br/> <strong>Enterprise Tools</strong><br/> <a href="https://www.anomali.com/products/threatstream">ThreatStream</a><br/> <a href="https://www.anomali.com/products/match">Anomali Match</a></p><h3><strong>6) Keep your software up to date</strong></h3><p>Don’t delay in updating your system when your security software pings you that it’s about to expire or needs a patch. That little alert could be the difference between a functioning machine or a machine completely shut down by a malware strain like <a href="https://www.anomali.com/blog/wanacry">WanaCry</a> or <a href="https://www.anomali.com/blog/petya-notpetya-petrwrap">Petya</a>. Hackers are constantly searching for security vulnerabilities, and letting those weaknesses go for too long can result in disastrous consequences.</p><p>Whether within the IT department or across a company, there’s always another step you can take to ensure your organization, data, and employees stay secure. Are there any steps that you think we’ve missed? If so, let us know in the <a href="https://forum.anomali.com/">Anomali Forum</a>.</p>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.