100%(5)5 out of 5 people found this document helpful
This preview shows page 9 - 11 out of 14 pages.
Recommended Best PracticesThere are an unlimited number of things that can be done to protect cyber assets and data, butit should all be done in line with the level of the threat. Below is a list of some of the most effective measures that should be used in most technical environments today:•Constantly Educate Users and Employees•Utilize a Firewall•Enforce Safe/Strict Password Policy•Perform Regular Backups•Use Multi-Factor Authentication•Audit Privileged AccessConstantly Educate Users and EmployeesEducating employees and users of acceptable use of company assets and expectations should be an ongoing training. A lot of times, people become complacent in performing the same duties over and over so it is easy to forget some of the most important security protocols. Adding this simple tool had potential to prevent several incidents. Utilize a FirewallA firewall is a guard between the network or computer you may be using and the internet, where all of the potential harm lies. The purpose of a firewall is to filter network traffic, based on a set of rules set up by the system administrator. These rules apply to both incomingand outgoing traffic. With the proper configurations, things like invalid remote connections, prevent downloads from unwanted websites, and blocking messages containing links to
CYBER SECURITY BRIEFING 10unwanted content (Cawley, 2016). These are all valuable parts of an effective security program, and certainly something needed at CCS International.Enforce Safe/Strict PasswordsThe password policy should require a minimum of 8 characters, must include a least 1 capitaland 1 lower case letter, and 1 special character. This policy should be enforced when users attempt to reset their passwords and can be done by group policy standards. Account lockout should also be enabled upon the third unsuccessful attempt to login.Perform Regular BackupsBackups should be completed at normal intervals and verified. For critical systems, it should be considered to store them in another off-site location. Use Multi-Factor AuthenticationPassword cracking has become more and more prominent in the coming years. Even with strong passwords, it is not impossible to guess; just slightly more difficult. For this reason, it is suggested to use multi-factor authentication. There are three factors in which one can be authenticated, something you know, something you have, and something you are. Multi- factor would include using at least 2 of those 3. For example, using a smart card, but requiring that a PIN that only you know be used in order to be authenticated.Audit Privileged AccessAs much as we would like to trust that our employees are doing the right thing all the time, it is important to verify that privileged users are not abusing their access. Conducting a monthly audit will not only help identify any misuse, but also show the employees that there is monitoring. This may deter any unauthorized activity they may have thought about doing.