Mazzanti
It is back-to-school (B-T-S) season, which means teachers are back at work, children are back in class, and school buses are tying up traffic. But B-T-S also signals open season for cybercriminals.
This is because many school-based accounts use simple passwords — typically six to eight characters — which can easily be hacked. Besides leading to a treasure trove of sensitive information about students and employees, including Social Security numbers and other personal data, school-system intrusions can have a ripple effect that may ensnare others, like parents and businesses.
The connection comes about because once they gain entry, a crafty Cyber Criminal may use the account to impersonate a student, teacher, school administrator, or other official, sending out bogus emails loaded with malware. Think of it: a parent who gets an email that appears to be from their child or a school official, will not think twice before clicking on it. But the Cyber Criminal has now gained back-door entry into another system, potentially opening up banking and other accounts to the bad actor. In fact, there may be more damage to come.
What if the parent happens to be on their work device when they click on the malicious email? The bad actor now has access to sensitive corporate accounts, potentially exposing bank accounts, intellectual property, and other files. A simple click on an innocent-looking email can soon escalate to a cascade of major cyber incidents.
The solution involves partnering with an experienced Cyber Security Services provider that can provide software, training, and other defenses against threat vectors. But which organizations need to act: schools or businesses?
The answer, of course, is both.
All kinds of organizations increasingly rely on technology like the cloud and mobile devices. Technology advances, combined with the explosion of data and the hybrid work environment, make Cyber Security more important than ever.
A comprehensive Cyber Security plan involves multiple layers and moving parts, but the basics of the process, regardless of organization, can be outlined in six steps.
1. Educate Staff
Studies indicate more than 80% of data breaches result from human error, pointing to employees as the weakest link in a security chain. But this also means that security-aware staff can function as an essential line of defense. So, an effective cyber security strategy must include targeted security awareness training.
Effective security awareness training will teach employees to recognize and address threats, including phishing and business email compromise. Top-notch training will target specific audiences and include multiple facets, like formal procedures, visual reminders, and periodic phishing simulations.
2. Secure All Endpoints
With the increased adoption of remote and hybrid workforces and Bring Your Own Device policies, organizations must make endpoint security a priority. Every computer, server, and mobile device connected to the network represents a possible entry point for attackers.
Endpoint security involves ensuring that all devices have proper security controls and follow security protocols. It also encompasses continual monitoring of all devices to detect potential vulnerabilities and identify suspicious behavior. Security administrators should be able to view and manage user permissions for all endpoints from a central location.
3. Ensure Email Protection
Today, email is essential to business productivity — but it can also present significant risks to an organization. Some reports indicate more than 90% of malware enters organizations through email, while email also represents a major vehicle for data leaks.
Email protection starts with filters designed to block spam and phishing attempts. Then, customized electronic communications policies can automate the enforcement of email rules that prevent the improper sharing of sensitive information and can address such issues as email encryption while automating essential retention policies.
4. Strengthen Cloud Security
Cloud computing — the delivery of digital services over the internet — offers many advantages, including accessibility and scalability. But this advance also introduces significant security concerns, starting with the fact that operating in the cloud means the perimeter of traditional on-premises networks has disappeared — so every connected device becomes a potential doorway for attackers. Protecting data in a hybrid cloud environment that involves multiple clouds and on-premises networks further complicates the security environment.
Additionally, operating in the cloud means understanding the shared responsibility model of cloud security. Although cloud providers make security a priority, cloud users should also take steps to secure all devices, protect data and identities, and ensure proper authentication and access management.
5. Do Not Neglect to Monitor
Enhanced by AI and machine learning, automated 24/7 monitoring can identify suspicious activity in the system and alert appropriate personnel before a breach occurs. A SIEM (Security Incident Event Monitoring) solution, for example, collects and analyzes log and event data in real-time from across a system.
6. Implement Business Continuity Strategies
Even the best cyber security strategies cannot guarantee against data breaches, so companies should implement business continuity and disaster recovery programs, including comprehensive backup and recovery solutions. Additionally, a detailed incident response plan will help a company respond quickly and effectively when a security incident does occur.
Guarding against cyber threats requires a multi-faceted approach guided by knowledgeable security professionals. For many organizations, including small and medium-sized businesses, maintaining that expertise in-house can be too expensive. But a managed services provider can help fill the gaps, assisting organizations in implementing security controls necessary to protect endpoints, securing a cloud environment, conducting risk assessments, providing 24/7 security monitoring, assessing ePolicies, and helping clients to ensure their business continuity in an increasingly dangerous world.
Carl Mazzanti is president of eMazzanti Technologies in Hoboken, N.J., providing IT consulting services for businesses ranging from home offices to multinational corporations.