On Notice: Proactively Mitigating Cyber Vulnerabilities

We all continue to see common themes across the headlines: Economic downturn, cross-industry job cuts and global geopolitical uncertainty. For businesses around the world, the turbulent situation can create unintended gaps in critical systems or processes that are core to operations.

These uncertainties can be very disruptive to the workforce itself. Staff may experience feelings of dread, confusion, or even fear for their own job security. These emotions, coupled with pressure to meet certain key performance indicators, have the potential to influence staff behavior. Whether wittingly or not, staff may engage in detrimental behavior.

Afterall, human judgement and behavior are not without fault. According to Verizon’s 2022 Data Breach Investigations Report, 82% of breaches over the last year involved the human element—whether malicious or simply an error. Organizations must take note during “normal” times as well as times of uncertainty.

When it comes to cybersecurity, professionals know it is best practice to mitigate potential risks before they become reality—but during times of distress where everything rises to the level of priority, it can become cumbersome to know where to begin. The good news? There are manageable steps leaders can take to get their arms around risks, known and unknown, presented to their organizations.

Mitigating Vulnerabilities at Inception
Every organization should be concerned with establishing appropriate controls to limit potential vulnerabilities. What those controls look like can and should vary greatly based on the organization’s unique needs, operations, and scale. The sky is the limit in terms of cybersecurity options (and spend). But there are some baseline or foundational practices that represent a critical starting point for every entity.

Conduct risk assessments. These processes are sometimes treated as an exercise of ticking the boxes and moving on. However, this notion is misguided. We can only protect our organizations effectively when we know what threats exist, where our blind spots may be and recognize what assets, we must protect most. Notably, given the rapid advancement of remote work and other digital platforms that have scaled the corporate IT enterprise, critical assets may look different today than even just three years ago for some organizations.

Each organization’s risk profile will be different, so there is no “cookie cutter” approach. Additionally, a risk profile will evolve over time—such as during incidents like mass staff departures or weak financial performance—or the regulatory landscape may change rapidly. As a result, if they have not done so already, it is imperative that organizations evaluate the current lay of the land to see what risks have shifted.

Take the recent AI regulation in the state of Colorado as an example. Guidance was issued by state regulators on a host of issues related to the use of AI by insurers. This is a new digital asset type that organizations are seemingly rushing to without fully appreciating the extent of risk issues associated with it. Any new technology adoption or trail blazing regulation should trigger the thought of risk assessment by business leaders.

Security is an iterative, evolving, and imperfect process. We must continually assess the biggest risks we face and mitigate them accordingly and evolve with the business landscape to ensure primary assets are accounted for and protected.

Defense-in-depth. Design your network and security tooling in a way that offers redundant protections and minimizes potential harm in the event any one measure fails. Utilize virtual private networks (VPNs), firewalls, access controls, multi-factor authentication (MFA), intrusion detection, endpoint monitoring, as well as monitor logging and audit account activity.

Establish patch management/updates. Patch management is essential for internal assets and especially for public-facing assets. Out-of-date software poses a substantial threat to organizations because of the possibilities it creates for threat actors. It can enable anything from remote code execution and initial access to privilege escalation or even data leakage. This process must include an ongoing element of Threat Intelligence – that is, the practice of being proactively aware of threat actor methodologies, emerging trends, published common vulnerabilities and exposures (CVEs) and Zero Day exploit discoveries.

Train staff and then train again. As discussed, the human element can create substantial security issues for organizations. Security training is important, including completion and competency checks to ensure training efficacy.

However, general training on phishing and social engineering are not panaceas. Specialized training should be considered to address business functions. For example, development teams need secure code training, and operations teams should incorporate business continuity/disaster recovery training with security team exercises. Organizations should have deliberately designed Incident Response plans, but those plans require appropriate training, including rehearsals and tabletop exercises, to be effective.

Communicate, communicate, communicate. Being able to identify an issue is only half the battle: all employees must be able to recognize security issues and know how to escalate them for remediation. Ensure there are clear protocols and procedures, as well as user-friendly reporting mechanisms, for when issues arise. Encourage employees to report when something feels “off” rather than fear being wrong—it is better to receive 99 false positives among 100 reports than to miss the one issue that compromises an entire system.

Cybersecurity threats change daily, and new risks emerge to fill in the gaps for those we have already solved for. Yet, it is not all doom and gloom: by having a strong foundational program, regular reviews and updates, and employee diligence, organizations can stand up to the threats emerging every day.

Featured

  • Bringing New Goods to Market

    The 2024 version of GSX brought with it a race to outrun incoming hurricane Helene. With it’s eye on Orlando, it seems to have shifted and those security professionals still in Orlando now have a fighting chance to get out town. Read Now

    • Industry Events
    • GSX
  • Live from GSX 2024: Day 3 Recap

    And GSX 2024 in Orlando, is officially in the books! I’d like to extend a hearty congratulations and a sincere thank-you to our partners in this year’s Live From program—NAPCO, Eagle Eye Networks, Hirsch, and LVT. Even though the show’s over, keep an eye on our GSX 2024 Live landing page for continued news and developments related to this year’s vast array of exhibitors and products. And if you’d like to learn more about our Live From program, please drop us a line—we’d love to work with you in Las Vegas at ISC West 2025. Read Now

    • Industry Events
    • GSX
  • Live from GSX 2024: Day 2 Recap

    Day 2 was another winner at GSX 2024 in Orlando. Aisles and booths were packed with attendees looking at some of the new and latest security technology. Remember to follow the GSX Live page from Security Today, as well as SecurToday on X and Security Today on LinkedIn to find out more about what’s happening on the show floor during tomorrow’s final day. Here’s what was happening with all four of our partners during the event on Tuesday. Read Now

    • Industry Events
    • GSX
  • How Much Carbon is Your Footprint Leaving?

    A more sustainable future is not only shared responsibility, it is increasingly critical. Securitas, is inviting clients and industry partners to make a difference in an ever-evolving world that faces diverse sustainability challenges. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3