CyVent

Recent Posts

2021 CyberSecurity Trends: 5 Recommendations to make your company safer

Posted by CyVent on Jun 7, 2021

Just as we were busy adapting ourselves and our businesses to deal with COVID-19, cybersecurity issues skyrocketed, too.

The year 2020 marked a record-breaking cyber attack environment, not only for individuals and companies, but also for government institutions. The pandemic forced companies to swiftly create remote work environments, run through cloud-based systems, change Access Policies and Data Loss Prevention (DLP) configurations while strengthening VPN Access, Password Policies and Privileged Access Management.

 

Effective Strategies for 2021 Cybersecurity Trends


Using AI as a tool to alleviate the cybersecurity talent gap


According to (ISC)², “the cybersecurity workforce needs to grow 145% to close the skill gap and better defend organizations worldwide”.

But what if technological improvements could increase employee efficiency by 10 times or more? In what ways is AI helping solve security problems?



Automated Threat Detection


The Security Operations Centers (SOCs) continue to mature and deploy next-gen technologies. 93% of Security Operations Center professionals are already applying machine learning and AI policies to improve the SOC intelligence and detect advanced threats.


Asset Management


It’s difficult to keep up with all the patches and updates for all devices with the increased use of IoT, but AI can monitor and manage the firmware update process effortlessly.

 

Gap Detection


In large networks, it’s impossible to manually run diagnostics on a daily basis, but AI can take care of this task.


Incident Response


AI can provide detailed information regarding the attack and its impact, helping the cybersecurity team to understand what can be improved.


2. Strengthening the weakest link

There hasn't been a more pressing time than now to educate our users on cybersecurity, as they are often the weakest link. As attackers look every second for new vulnerabilities and ways to get around our defenses, it is critical that organizations step up and get all staff members educated about cybersecurity basics. Phishing attacks have significantly increased over the years and they are even more sophisticated nowadays. More and more, a cybersecurity educational program, using online-learning tools, is a must-have.

3. Enabling Work-from-Home Security


According to Gartner, “64% of employees are now able to work from home, and two-fifths actually are working from home. From a security perspective, this requires a total reboot of policies and tools and approved machines to better mitigate the risks.”

Here are a few steps that can improve your team's security:


Data Loss Prevention (DLP)


Data Loss Prevention (DLP) software protects data from theft or loss that could cost your company in fines or productivity. Implementing a DLP program is a bare minimum once companies expand their remote work footprint.

But what does DLP software protect?

Intellectual Property

  • Design documents
  • Project plans
  • Patent applications
  • Source code
  • Process documentation


Corporate Data

  • Financial records and statements
  • Employee records
  • Pricing documents
  • User logins


Customer Data

  • End-user logins
  • Credit card numbers
  • Social security numbers
  • Medical data


4. Privilege Access Management

Most companies are aware of the challenge of storing and managing passwords across the footprint while keeping remote employers and contractors productive.


PAM Solutions


Privileged Access Management (PAM) solutions are here to tackle this challenge. They can be used to safely store and share passwords with audit trails and logs, and also change passwords regularly, keeping your environment safe.
They can also be used as jump servers, in order to minimize the attack surface on the company's network.

In this scenario, end-users don’t need to have network access directly to production servers, or devices, but only to the jump servers which will play a special role as proxies and also performing screen recordings of all sessions made to the devices.

ssh-jump-server-header

JumpServer Diagram

 

Insider Threats


Attackers are targeting employers and contractors with a huge amount of phishing and social engineering attacks, having a password expiration/change policy decreases this attack vector.



5. Cyber-savvy boards


Cybersecurity programs and tools are high-priced, and cybersecurity budgets were put on the spotlight.

Gartner points out that the board members will pay even more attention to security matters, also going for the nuts and bolts of its operations, so CISOs and cybersecurity third-party consultants should expect higher scrutiny on security matters as a result.

What is third-party risk and how to mitigate it?

Posted by CyVent on Apr 15, 2021

The rapid increase in digital third-party relationships contributes to escalated cyber risk. With service outsourcing, companies need to grant access to the system to partners or organization’s supply-chain, which puts confidential business information, financial transactions and sensitive employee and customer data at risk.

The problem is not new , Target is just one of countless examples. In 2013, Target’s security breach occurred from e-mails sent to Fazio Mechanical, one of the companies affiliated with Target, that lead to the leak of 70 million customer data and 40 million bank information. Year after year, companies are exposed to more risks from their business relationships, weakened by poor safety standards of other companies.

According to the Ninth Annual Cost of Cybercrime Study (Accenture, 2019),
61% of organizations have experienced an IoT security incident and 67% observed an increase in security breaches in the last five years. Another shocking fact is that over half of all companies have experienced a third-party breach yet only 16% are able to mitigate those risks (Ponemon Institute. Data Risk in the Third-Party Ecosystem. 2018).

CYV_banner_RR_v2_CYV_Post_2_LK

This type of threat is not always malicious. Most of the time, it is caused by negligent behavior. According to a recent report conducted by the Ponemon Institute, negligent behavior is the most costly to companies annually, even though its cost per incident is lower. On the other hand, criminal behavior is less frequent, although it costs approximately 3x more per incident.

The problem involves the entire company, since relations with third parties are present in services that involve logistics, sales, customer support, marketing, among many others. In addition, each company has a partner management model. Thus, the solution needs to be adaptable to different realities.

How to manage your business relationships securely?


In order to avoid commercial relations problems with third parties, the company needs to adopt strict security standards, which involve the choice of its partners and their cyber security management. Compliance and security standards must also be extended to third-party companies.

The Ponemon Institute's “Data Risk in the Third-Party Ecosystem” analyzed companies that were successful in avoiding the third-party data breach and named best practices to reduce incidence of third-party data breaches:

* Evaluation of the security and privacy practices of all third parties
* An inventory of all third parties with whom you share information
* Frequent review of third-party management policies and programs
* Third party notification when data is shared with Nth parties
* Oversight by the board of directors

To meet these protocols effectively, we need to have the support of technology. There are currently several tools on the market that offer risk analysis and protection from third parties. The challenge, however, is to find the most complete and adapted tool to the needs of your company.

At CyVent, we are confident to appoint RiskRecon, a Mastercard company. It’s the only solution that automatically provides risk prioritization and continuous monitoring.

Why choose RiskRecon?


We are thrilled to be RiskRecon partners. RiskRecon automatically collects security information from vendors, partners and your own enterprise to help you understand how well each organization manages their digital footprint.

CYV_Post_3_LK

 

It provides risk-prioritized ratings based on issue severity and the system value at risk. The platform data is independently certified to be 99.1% accurate. The accuracy is achieved by a combination of patent-pending machine learning automation and analyst quality control.
The system evaluates over 40 security criteria across 9 domains. The impact of all vulnerabilities is analyzed to produce a cyber risk score.

There’s a direct correlation between RiskRecon scores and actual data breaches. Based on a sample of 46,000 Companies, entities with a score of “C” experience a 3x higher frequency of breaches than those with a score of “A”.

All assessment details are visible to you and your vendors, and RiskRecon provides a report that includes a summary of your organization's current cybersecurity posture at no additional fee. In addition, the platform automatically produces action plans to highlight only issues that exceed your company’s risk policy.

With all this information, you can easily keep your business secure from businesses that aren’t. It allows you to select new vendors faster, prioritize your third-party assessments based on RiskRecon-rated vendor performance, focus your vendor assessments on areas where you know they violate your risk requirements, improve your M&A analysis and more.

See more and schedule some time to speak with one of our experts: https://www.cyvent.com/en-us/prevent-your-company-from-third-party-risk-with-riskrecon