X

Blog

#CSTC2017 Take Home: Security Controls

Where do you want to be?

At #CSTC2017, Tom reminded us of the two points in time related to a security breach and the cost differential.

Left of Boom: Prevention and Preparation | Right of Boom: Mitigation and Recovery

                                                                               $ | $$$$$$$$$$$$$$$$$$$$ (20 – 50 Times)

Tom’s Take Home Message about Security Controls

There are effective ways to control cyber security threats and you must address security needs at every level.  It can be overwhelming so you should consider a security partner like Integrity IT to help you assess your current state, evaluate your needs and create a plan that best fits your business.   Below is a list of things to consider.

Foundation

  • End User Training
  • Multi-Factor Authentication
  • User Privilege Management
  • Security Risk Assessment
  • Compliance Assessment
  • Cyber Security Plan
  • Get a new generation firewall

System Protection

  • Next Generation Firewall
  • Network Segmentation
  • IDS/IPS/Monitoring & Management
  • SIEM
  • Ransomware Defense
  • Identity Management
  • Zero Trust Access Control with Multi-Factor Authentication
  • Audit Logs
  • Change Management
  • Patches, Updates & Images
  • Server Security Configurations

Data Protection

  • Data Classification & Segmentation
  • On-the-Fly, End-to-End Encryption
  • Ransomware Defense
  • Sandboxed Storage Access
  • Isolated Long-Term Storage
  • Date Recoverable Storage
  • Data Life-Cycle Management
  • Unsupported Software/Hardware Program

End Point Protection / Application Protection

  • Anti-Malware Applications
  • Software Firewall
  • System Image
  • Endpoint Encryption
  • Unsupported Endpoint Security

Physical Protection

  • Access Control
  • Fire/Flood Protection
  • Surveillance

Internet Protection

  • Website Security / SSL
  • Remote Access/VPN w/ Multi-Factor Authentication
  • Secure Browsing
  • Email Security
  • DDoS Protection & Mitigation
  • Malware Detection/Mitigation (including Ransomware)

 

You can learn more about Thomas Norman at https://www.linkedin.com/in/thomas-l-norman-cpp-psp-280a3a15/

You can learn more about Integrity IT’s Security Services – Click Here

About the Author

The Author has not yet added any info about himself