On Notice: Proactively Mitigating Cyber Vulnerabilities

We all continue to see common themes across the headlines: Economic downturn, cross-industry job cuts and global geopolitical uncertainty. For businesses around the world, the turbulent situation can create unintended gaps in critical systems or processes that are core to operations.

These uncertainties can be very disruptive to the workforce itself. Staff may experience feelings of dread, confusion, or even fear for their own job security. These emotions, coupled with pressure to meet certain key performance indicators, have the potential to influence staff behavior. Whether wittingly or not, staff may engage in detrimental behavior.

Afterall, human judgement and behavior are not without fault. According to Verizon’s 2022 Data Breach Investigations Report, 82% of breaches over the last year involved the human element—whether malicious or simply an error. Organizations must take note during “normal” times as well as times of uncertainty.

When it comes to cybersecurity, professionals know it is best practice to mitigate potential risks before they become reality—but during times of distress where everything rises to the level of priority, it can become cumbersome to know where to begin. The good news? There are manageable steps leaders can take to get their arms around risks, known and unknown, presented to their organizations.

Mitigating Vulnerabilities at Inception
Every organization should be concerned with establishing appropriate controls to limit potential vulnerabilities. What those controls look like can and should vary greatly based on the organization’s unique needs, operations, and scale. The sky is the limit in terms of cybersecurity options (and spend). But there are some baseline or foundational practices that represent a critical starting point for every entity.

Conduct risk assessments. These processes are sometimes treated as an exercise of ticking the boxes and moving on. However, this notion is misguided. We can only protect our organizations effectively when we know what threats exist, where our blind spots may be and recognize what assets, we must protect most. Notably, given the rapid advancement of remote work and other digital platforms that have scaled the corporate IT enterprise, critical assets may look different today than even just three years ago for some organizations.

Each organization’s risk profile will be different, so there is no “cookie cutter” approach. Additionally, a risk profile will evolve over time—such as during incidents like mass staff departures or weak financial performance—or the regulatory landscape may change rapidly. As a result, if they have not done so already, it is imperative that organizations evaluate the current lay of the land to see what risks have shifted.

Take the recent AI regulation in the state of Colorado as an example. Guidance was issued by state regulators on a host of issues related to the use of AI by insurers. This is a new digital asset type that organizations are seemingly rushing to without fully appreciating the extent of risk issues associated with it. Any new technology adoption or trail blazing regulation should trigger the thought of risk assessment by business leaders.

Security is an iterative, evolving, and imperfect process. We must continually assess the biggest risks we face and mitigate them accordingly and evolve with the business landscape to ensure primary assets are accounted for and protected.

Defense-in-depth. Design your network and security tooling in a way that offers redundant protections and minimizes potential harm in the event any one measure fails. Utilize virtual private networks (VPNs), firewalls, access controls, multi-factor authentication (MFA), intrusion detection, endpoint monitoring, as well as monitor logging and audit account activity.

Establish patch management/updates. Patch management is essential for internal assets and especially for public-facing assets. Out-of-date software poses a substantial threat to organizations because of the possibilities it creates for threat actors. It can enable anything from remote code execution and initial access to privilege escalation or even data leakage. This process must include an ongoing element of Threat Intelligence – that is, the practice of being proactively aware of threat actor methodologies, emerging trends, published common vulnerabilities and exposures (CVEs) and Zero Day exploit discoveries.

Train staff and then train again. As discussed, the human element can create substantial security issues for organizations. Security training is important, including completion and competency checks to ensure training efficacy.

However, general training on phishing and social engineering are not panaceas. Specialized training should be considered to address business functions. For example, development teams need secure code training, and operations teams should incorporate business continuity/disaster recovery training with security team exercises. Organizations should have deliberately designed Incident Response plans, but those plans require appropriate training, including rehearsals and tabletop exercises, to be effective.

Communicate, communicate, communicate. Being able to identify an issue is only half the battle: all employees must be able to recognize security issues and know how to escalate them for remediation. Ensure there are clear protocols and procedures, as well as user-friendly reporting mechanisms, for when issues arise. Encourage employees to report when something feels “off” rather than fear being wrong—it is better to receive 99 false positives among 100 reports than to miss the one issue that compromises an entire system.

Cybersecurity threats change daily, and new risks emerge to fill in the gaps for those we have already solved for. Yet, it is not all doom and gloom: by having a strong foundational program, regular reviews and updates, and employee diligence, organizations can stand up to the threats emerging every day.

Featured

  • Creating a Safer World

    Managing and supporting locks and door hardware within a facility is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Read Now

  • Creating More Versatility

    Today, AI has become top of mind for most security professionals. It is the topic of conversation in the technology world and continues to transform the way data is used to make important business decisions. Read Now

  • Report: 78 Percent of CISOs Seeing Significant Impact from AI-Powered Cyber Threats

    Darktrace recently unveiled its 2025 State of AI Cybersecurity report. The findings reveal that 78% of Chief Information Security Officers (CISOs) surveyed say that AI-powered threats are having a significant impact on their organizations, a 5% increase1 from 2024. While an increasing number of CISOs report feeling a significant impact from AI threats, more than 60% now say that they are adequately prepared to defend against these threats, an increase of nearly 15% year-over-year. However, insufficient AI knowledge and skills and a shortage of personnel and talent continue to be listed as the two top inhibitors to a successful defense. Read Now

  • Teaching AI New Tricks

    You have probably heard that AI-enabled security cameras are evolving the role of traditional surveillance cameras, shifting the focus from passive monitoring to active problem-solving and operational insights. AI technology changes fast, so what is new can be considered old news in just a few months. Read Now

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.