1. Change default passwords
Your network is at risk from failure to modify the default usernames and passwords which come with a multitude of devices. Inspect your firewalls, routers, servers, workstations, tablets etc. to ensure that any default credentials have been removed.
2. Adopt Pass-phrases
User passwords are a perpetual source of risk, not least of all because of outdated guidance. Users should be required to use passwords of a minimum of eight characters but, recognising that such a password can be cracked in as little as 14 minutes, ten or twelve characters is preferred. Consider the use of ‘pass-phrases’.
3. Don’t abuse administrative accounts
Users with administrative accounts must be obliged to use such accounts only for the performance of required tasks. For example, the IT team should have ‘ordinary’ privileges for office tasks.
4. Control anti-virus protection
Confirm that every computer has appropriately configured spyware, malware and anti-virus software installed, and that it receives automatic updates via a subscription. Check that users cannot disable or modify the settings.
5. Adopt a software whitelist approach
Create a list of approved applications (a so-called ‘whitelist’), and block the installation or opening of any application not on this list.
6. Disable legacy and unsupported software
Disable any software for which no license can be identified, or which is not supported by its author. All legacy applications should be removed or isolated from the network.
7. Use two-factor authentication
Enable two-factor authentication wherever possible, especially for mobile devices.
8. Address IT physical security
Ensure the core IT infrastructure (servers, routers etc.), are located in a secure room with strict access controls. Access should be logged.
9. Close network ports
Disable applications which rely upon ‘ports’ to create remote access. Such applications are often used for remote access in support scenarios and include names such as ‘LogMeIn’ and ‘TeamViewer’. These applications can pose significant security risks left running and unmonitored.
10. Terminate consumer-grade file sharing
Terminate the use of consumer grade cloud file share services, such as GoogleDocs, Dropbox, iCloud and so forth. Primarily, such services open the door to corporate data being shared across the personal devices of users which synchronising. Further risks lie in the routine data corruption or loss caused by such services.
11. Test your backups
Test your backups! Ransomware attacks are hugely under-reported, and the true cost can only be speculated. Even if you pay the criminal, your data is likely to not be made available and so your backups are your only true defence. Sadly, too many organisations fail to test their ability to restore a backup, and so may be devastated.
12: Cyber security training!
Invest in a cyber security training course for all staff. Even one hour of training can pay dividends.
Have you read:
- The Relationship Between GDPR and Cyber Security
- The 5 Hidden Risks of File Sharing
- 10 Step Guide to Cyber Security
- Cyber Security vs. Printers and the IoT
- 12 Cyber Security Readiness Tips
- Cyber Security: Integrating Risk and the CIA Triad
- Why Understanding RISK is Central to Cyber Security
- A GDPR Centred Approach to Cyber Security
⏱ 5 Second Summary
Part of our Cyber Security Series
12 easy steps to improve cyber security in any organisation, and to prepare for the Cyber Essentials certification
Recent Posts
Humperdinck Jackman
Director of Consulting Services
Humperdinck has a 30-year career spanning Document Management Systems (DMS), data protection, Artificial Intelligence, Data Protection and Robotic Process Automation. With many articles published in print internationally, he believes the advances in office technology are such that we're entering the 4th Industrial Revolution. Now Director of Marketing and Consulting Services at Advanced UK, he's as active with clients as he is in endeavouring to write original blog articles.