A ransomware attack is estimated to occur every 11 seconds. Last year, the largest ransom ever paid (40 million dollars!) was issued by an insurance agency. Data breaches are occurring at a rate never seen before, and all this malicious activity is being monetized and turned into a business. Faced with these problems that are only getting worse, how do we maintain a secure environment and protect our assets?
The answer is vigilance and hygiene. We must develop and maintain standards that holistically protect our networks and infrastructure. There are some fantastic resources out there that have templates and guidance on how to do this and what you should be doing. Keep reading for a list of resources. First, let's go through the basics of securing your network:
Documentation is key to maintaining a secure environment. To know where vulnerabilities are, what needs to be protected, and how best to protect it we have in-depth documentation of the environment.
Hardware that accesses the network, software that interfaces with servers and end users, and the end users themselves are all key items we need to track and take inventory.
Documentation of these items makes them auditable, which is critical to this process. Review of these lists we have created allows us to identify outliers and malicious items in those lists.
Review your documented items for unwanted software, end-users that are no longer needed, and devices that are not known to the enterprise. Keep track of items you want to eliminate from the environment. The discoveries you make here will allow you to develop policies which will keep the environment clean and standardized.
Once you have the proper intel on the environment, you can begin to process those findings into policies that will keep you on track in the future. As you begin to build these policies, you will need to keep in mind that policies do no good unless they are enforceable and auditable.
This is where things get tricky! Out of box networks have lots of great tools such as Active Directory group policies to begin enforcement. But many times, you will find they fall short of a complete solution. This next list includes the key items you should consider when creating your polices.
Cybersecurity and Infrastructure Agency
CISA is a government organization that is there to help you. They offer items like free vulnerability scanning for critical industries and government. Visit resources.
National Institute of Standards and Technology
NIST is another agency that maintains a cybersecurity framework that defines the essential controls and policies that need to be in place. Download their framework for a great starting point.
Asset Inventory Template
We have created this useful template to audit and record your asset inventory, document policies, company contacts and emergency contracts. Included is also a great list of more free resources and websites to keep on file for future use and reference. Download template.
Reviewing the list above can be intimidating. But all of these toolsets can make it much easier to maintain and manage. We have put together a suite of tools that can help ease the transition.
If you are interested in learning more about your Network Security, contact us to speak with a Net3 Engineer.