Good - not a rating for Cyber Security

"Our current cyber security approach is good"

When new customers come to MI613 Inc, we start with building an understanding of their current cyber security approach. We walk through our client on-boarding checklist, we begin to understand what products they have in place, what policies and procedures have been implemented and review any prior incidents. One of the last questions we ask is how do you feel about your approach to cyber security and the response often is unfortunately is “Good”.
We recently met with a customer and went through this process. The customer indicated they had a higher grade firewall, they have started to create policies and decided to switch to Apple laptops “to be secure”. When asked how they felt about their current cyber security approach – the answer was “Good”. Upon review of their approach, it became apparent that was not the case.

What does "good" mean in cyber

Are your devices, settings and networks properly configured?

After on-boarding customers, we dig into the specifics of how networks are setup, how laptops are configured, review firewall configurations and scan networks for vulnerabilities.

Often in this stage we begin to encounter holes in the “good” status. Results review issues like features in “higher grade” firewall are not configures,  laptops with users having “root” or “admin” access and there was no standard configuration or management for the devices.

These configurations and access levels create significant vulnerabilities. Having the tools in place is not enough, they must be configured to function at the optimum for your environment.

Are you staying on top of critical updates?

Firewall updates and configurations are critical for the tool to function effectively. We frequently encounter instances that updates are a year overdue and a number of critical updates pending. We will come across instances where laptops are rarely updated. Companies often lack endpoint protection on devices and no monitoring or reporting tools for incident tracking and prevention the loss of data.

Implementation of simple cyber policies for scheduled updates and implementation of monitor endpoint and network services help companies to create a better overall picture of the cyber approach.

Are you looking at the big picture of your network?

Routine scanning of networks can identified a number of vulnerabilities, some as simple as a main office printer at risk due to the devices not updated or configured for security or devices on a network that had default admin credentials. Understanding where the vulnerabilities exist and their remediation helps to create a minimal risk environment.

Being proactive in your apporoach to cyber security provides youeith the piece of mind that your information is secure.

We can help

This situation is not unique and is something we see time and time again.  We write about this to bring awareness to the very serious issues we find and to high lite the fact that most companies have risk issues like these. The good news is, they are very easy for us to find and help you remediate. So the next time you think you cyber security approach is – Good. Ask your self how you think we might rate it.

International team of coworkers sitting around table, putting colorful puzzles together, teamwork concept, top view

Contact us today to understand your cyber approach

1-833-776-DFIR (3347)

[email protected]