On Notice: Proactively Mitigating Cyber Vulnerabilities

We all continue to see common themes across the headlines: Economic downturn, cross-industry job cuts and global geopolitical uncertainty. For businesses around the world, the turbulent situation can create unintended gaps in critical systems or processes that are core to operations.

These uncertainties can be very disruptive to the workforce itself. Staff may experience feelings of dread, confusion, or even fear for their own job security. These emotions, coupled with pressure to meet certain key performance indicators, have the potential to influence staff behavior. Whether wittingly or not, staff may engage in detrimental behavior.

Afterall, human judgement and behavior are not without fault. According to Verizon’s 2022 Data Breach Investigations Report, 82% of breaches over the last year involved the human element—whether malicious or simply an error. Organizations must take note during “normal” times as well as times of uncertainty.

When it comes to cybersecurity, professionals know it is best practice to mitigate potential risks before they become reality—but during times of distress where everything rises to the level of priority, it can become cumbersome to know where to begin. The good news? There are manageable steps leaders can take to get their arms around risks, known and unknown, presented to their organizations.

Mitigating Vulnerabilities at Inception
Every organization should be concerned with establishing appropriate controls to limit potential vulnerabilities. What those controls look like can and should vary greatly based on the organization’s unique needs, operations, and scale. The sky is the limit in terms of cybersecurity options (and spend). But there are some baseline or foundational practices that represent a critical starting point for every entity.

Conduct risk assessments. These processes are sometimes treated as an exercise of ticking the boxes and moving on. However, this notion is misguided. We can only protect our organizations effectively when we know what threats exist, where our blind spots may be and recognize what assets, we must protect most. Notably, given the rapid advancement of remote work and other digital platforms that have scaled the corporate IT enterprise, critical assets may look different today than even just three years ago for some organizations.

Each organization’s risk profile will be different, so there is no “cookie cutter” approach. Additionally, a risk profile will evolve over time—such as during incidents like mass staff departures or weak financial performance—or the regulatory landscape may change rapidly. As a result, if they have not done so already, it is imperative that organizations evaluate the current lay of the land to see what risks have shifted.

Take the recent AI regulation in the state of Colorado as an example. Guidance was issued by state regulators on a host of issues related to the use of AI by insurers. This is a new digital asset type that organizations are seemingly rushing to without fully appreciating the extent of risk issues associated with it. Any new technology adoption or trail blazing regulation should trigger the thought of risk assessment by business leaders.

Security is an iterative, evolving, and imperfect process. We must continually assess the biggest risks we face and mitigate them accordingly and evolve with the business landscape to ensure primary assets are accounted for and protected.

Defense-in-depth. Design your network and security tooling in a way that offers redundant protections and minimizes potential harm in the event any one measure fails. Utilize virtual private networks (VPNs), firewalls, access controls, multi-factor authentication (MFA), intrusion detection, endpoint monitoring, as well as monitor logging and audit account activity.

Establish patch management/updates. Patch management is essential for internal assets and especially for public-facing assets. Out-of-date software poses a substantial threat to organizations because of the possibilities it creates for threat actors. It can enable anything from remote code execution and initial access to privilege escalation or even data leakage. This process must include an ongoing element of Threat Intelligence – that is, the practice of being proactively aware of threat actor methodologies, emerging trends, published common vulnerabilities and exposures (CVEs) and Zero Day exploit discoveries.

Train staff and then train again. As discussed, the human element can create substantial security issues for organizations. Security training is important, including completion and competency checks to ensure training efficacy.

However, general training on phishing and social engineering are not panaceas. Specialized training should be considered to address business functions. For example, development teams need secure code training, and operations teams should incorporate business continuity/disaster recovery training with security team exercises. Organizations should have deliberately designed Incident Response plans, but those plans require appropriate training, including rehearsals and tabletop exercises, to be effective.

Communicate, communicate, communicate. Being able to identify an issue is only half the battle: all employees must be able to recognize security issues and know how to escalate them for remediation. Ensure there are clear protocols and procedures, as well as user-friendly reporting mechanisms, for when issues arise. Encourage employees to report when something feels “off” rather than fear being wrong—it is better to receive 99 false positives among 100 reports than to miss the one issue that compromises an entire system.

Cybersecurity threats change daily, and new risks emerge to fill in the gaps for those we have already solved for. Yet, it is not all doom and gloom: by having a strong foundational program, regular reviews and updates, and employee diligence, organizations can stand up to the threats emerging every day.


  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Making Safety and Security Intrinsic to School Design

    Public anxieties about school safety are escalating across the country. According to a 2023 Gallup report, 44% of parents fear for their child’s physical safety at school, a 10 percentage-point increase since 2019. Unfortunately, these fears are likely to increase if the incidence of school tragedies continues to mount. As a result, school leaders are now charged with two non-negotiable responsibilities. The first, as always, is to ensure kids have what they need to learn, grow, and thrive. Sadly, their second responsibility is to keep the children in their care safe from threats and physical danger. Read Now

  • The Power of a Layered Approach to Safety

    In a perfect world, every school would have an unlimited budget to help secure their schools. In reality, schools must prioritize what budget they have while navigating the complexities surrounding school security and lockdown. Read Now

  • How a Security System Can Enhance Arena Safety and the Fan Experience

    Ensuring guests have both a memorable experience and a safe one is no small feat for your physical security team. Stadiums, ballparks, arenas, and other large event venues are increasingly leveraging new technologies to transform the fan experience and maintain a high level of security. The goal is to preserve the integrity and excitement of the event while enhancing security and remaining “behind the scenes.” Read Now

Featured Cybersecurity


New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3