Happy National Cybersecurity Awareness Month! In an era where it feels like threats are coming at us from all angles, it鈥檚 more crucial than ever to be vigilant and proactive in protecting your digital assets. Every October, this nationwide initiative鈥攕tarted by the and the 鈥攁ims to raise awareness about the importance of cybersecurity and promote best practices for staying safe online.
While cybersecurity holds a certain significance during the month of October, we believe it鈥檚 a year-round initiative. In this blog post, we'll be sharing our most top-of-mind cybersecurity tips and trends to help you stay secure not only during this awareness month, but all year long.
Also fair warning: This isn鈥檛 your average 鈥渢ips and tricks鈥 roundup. Yes, there will be practical tips (it is Cybersecurity Awareness Month after all), but I鈥檝e also included some hot takes that I hope provide just the right amount of spice.
Sometimes, it鈥檚 the small things that can make the biggest impact鈥攖hat鈥檚 definitely the case with measures like multi-factor authentication and password security. These are fundamental basics of security, but they don鈥檛 always get the attention they deserve.
Let's explore some of these crucial yet often overlooked measures and why you shouldn鈥檛 toss them aside so easily.
MFA should be like Frank鈥檚 RedHot sauce鈥攑ut that sh*t on everything. MFA adds an extra layer of protection by requiring two or more methods of authentication to verify your identity. This makes it harder for cybercriminals to access your accounts, even if they have your password.
, it's a simple yet powerful deterrent against cybercriminals.
For example, at 杏吧传媒, we see a ton of business email compromise (BEC) attacks that could have been thwarted if only more users had MFA. At this point, not enforcing MFA is like locking your door and taping your keys to the outside so that anyone can grab them.
Here are some tips to think about when enforcing MFA:
Implementing access control measures might seem like a small administrative task, but it's a simple way to set more secure controls around your networks, users, and devices. Here are some tips:
While it may appear routine, managing passwords effectively is a linchpin of basic cybersecurity. Use these quick tips to strengthen your password security and avoid common password pitfalls:
Ten years ago, Anton Chuvakin organized a handful of products into a group called 鈥渆ndpoint threat detection and response鈥 during his time at Gartner. Since then, endpoint detection and response (EDR) has become a market-accepted category and mandatory capability by most cyber insurance underwriters today.
However, with the emergence of EDR came way too many *DR acronyms (MDR, XDR, the list goes on and on). This means many organizations are still grappling with the intricacies and figuring out which flavor of DR is right for them.
In the case of EDR, these are the most common challenges we are noticing:
Managing EDR: Some organizations struggle to manage their existing EDR solutions effectively, which can leave them overwhelmed and vulnerable to threats. EDR solutions are inherently noisy. Without the right resources, the effort it takes to manage EDR and its alerts can exceed the availability or expertise of the average in-house security team. 聽
Outsourcing EDR: Fully outsourcing EDR analysis, management, and maintenance can be cost-prohibitive. Some EDR vendors (but not all EDR vendors 馃槈) even put EDR management behind expensive tiers or add-ons. Consider the costs and benefits carefully of the tool or tier that you鈥檙e paying for.
Vendor Management: Be aware that vendors managing multiple products may have less agility and expertise compared to a team that fully owns and manages its own product.
Recommended Reading: Need help finding the right EDR solution for your business? Start with our EDR Buyer鈥檚 Guide.
Let's face it: ransomware and endpoint security are old news鈥攖he new target for adversaries is your own personal identity.
Identity-based attacks using compromised credentials are continuing to surge, probably as a way to get around defensive measures like EDR. And what鈥檚 more, digital identities and profiles can be easily faked, , adding to the uncertainty.
As Joe Slowik puts it in this blog post, 鈥淚dentity has become its own class of security.鈥 Identity is something to be stolen, spoofed, or manipulated, especially in cases of business email compromise (BEC).
An example of this is invoice fraud, a common BEC tactic. This is when an attacker poses as a vendor and sends an invoice to an intended victim with their own account number. But attackers are upping their game with this tactic. They infiltrate the victim's account, set up rules to reroute incoming invoices to themselves, delete the originals to hide their tracks, and then tweak the invoices, replacing the legitimate account number with their own before sending them back to the victim.
Here are some ways you can stay vigilant against identity-based attacks and BEC:
While National Cybersecurity Awareness Month reminds us that security is a collective responsibility, it should be at the forefront of your every decision. We hope these tips will help you stay informed about the latest threats and raise your cyber awareness鈥攏o matter the time of year.
Shoutout to Dray Agha, Joe Slowik, Kyle Hanslovan, Sharon Martin, Ethan Tancredi, and Henry Washburn for contributing their thoughts, tips, and hot takes to this blog post.
Get insider access to 杏吧传媒 tradecraft, killer events, and the freshest blog updates.