cyberattack

Cybersecurity for business: Getting started

Businesses are wondering how they can begin improving their cybersecurity architecture as the Move-it hack compromises more and more systems.

The recent series of cyberattacks over the past weeks has been rated by the National Institute of Standards and Technology (NIST) as ‘critical’ with a severity score of 9.8/10. According to CNN, the hacking campaign has compromised records held by multiple US state governments, the federal Department of Energy, and other entities such as the BBC, the Boston Globe, British Airways, Johns Hopkins University (and its connected healthcare network), the University of Georgia, and more.

Naturally, this turn of events is leaving businesses wondering how they can begin to implement better cybersecurity. While the coverage of cybersecurity crisis is not lacking in volume, the media doesn’t do much demystify what cybersecurity even is or what it looks like.

However, despite this; businesses can be assured that there are real and concrete steps that they can take now to reduce their vulnerabilities. The voluntary cybersecurity framework promulgated by NIST breaks down cybersecurity into five types of measures that companies can take: identification, protection, detection, response, and recovery.

Identification

Identification means taking inventory of your system and network, knowing what your company is willing to risk, and where it needs to concentrate security and grant authorization. This is a necessary foundation for all cybersecurity practices.

Protection

Once you identify what needs to be secured and who gets access to your network, you can begin to implement policies and practices that establish the desired controls. Protection is preventative, it’s simply meant to stop things before they happen. It’s like locking the office door at night.

Detection and response

While a locked door may be enough to protect against most breaches, there is always the risk of something getting through. If a threat breaks through the first line of defense, it’s critical to know when it happens. Frequently, malware goes unnoticed until it is too late. The detection component is analogous to having security cameras or a security alarm: it allows you to know of a break-in while it’s in progress.

Knowing of a breach enables initiation of response and containment, and it’s what makes detection useful. Early detection means quicker response, thereby minimizing damages.

Recovery

While it is ideal for a breach to cause little to no damage (and even though quick detection and response can minimize harm considerably) the potential for a detrimental impact on your business is a risk that has to be considered. Backups, cyber-insurance, and disaster recovery services can be the deciding factor in whether your business can survive a breach. This is another layer of protection which can serve as the last line of defense against data loss and insurmountable financial consequences.

Takeaway: You can get started today

Cybersecurity doesn’t have to be a mystical or nebulous concept full of fear and uncertainty. Cybersecurity ultimately comes down to knowing what you are protecting, setting up specific and actionable policies and practices that help to prevent breaches, engaging cybersecurity personnel who can detect, respond and contain breaches that do occur, and having a plan for recovery and business continuity in the event of a serious incident.

For more detail on what this looks like in practice, and how your business can begin to develop its cybersecurity approach, feel free to contact us.

If you are interested, we can provide a complementary and detailed cybersecurity solutions assessment that is specific to your business and its needs. Just message us with your request, and we will get back to you as soon as possible.