Best Practices

Thu
09
Mar

Manual Access Re-certification to Avoid Risk of Data Breach

Some of the major data breaches have been carried out by internal users. A couple of examples are Sports Direct in 2017 and Sage in 2016. In fact, a research by Intel Security had estimated that around 43% of data breaches happen because of internal users. That makes internal users a big risk in terms of data security. As a direct consequence, access of employees to information assets within an organization is a major security control. The biggest challenge in managing access risk is how to have the correct access levels for different employees in different functions and at different roles. Too restrictive access policies can impact the efficiency of business operations, while very open access controls can substantially raise the risk of data breach – by employees intentionally or unintentionally.
 
Thu
09
Mar

Security Information and Event Management (SIEM) Solution -Best Practices

Security Information and Event Management (SIEM) Solution -Best Practices
Security information and event management (SIEM) systems is an approach to get a centralized view of the information coming out of multiple defense mechanisms, end user devices, applications and servers of the organization in most understandable and standard format. It serves multiple purposes like auditing, reporting, log retention, incident response and most importantly real-time monitoring which provides a capability to alert at the initial stages of cyber-attacks to your organization. In Summary, it will show what you want to see.  Hence, to get most out of it, it should be managed properly. 
 
Fri
13
Jan

Cybersecurity v1.1 draft (NIST)

Released Jan 10, 2017 https://www.nist.gov/cyberframework/draft-version-11 NEW REVISION: Cyber Supply Chain Risk Management – The organization can quickly and efficiently account for emerging cyber supply chain risks using real-time or near real-time information and leveraging an institutionalized knowledge of cyber supply chain risk management with its external suppliers and partners as well as internally, in related functional areas and at all levels of the organization. The organization communicates proactively and uses formal (e.g. agreements) and informal mechanisms to develop and maintain strong relationships with its suppliers, partners, and individual and organizational buyers.

Mon
07
Nov

Draft SP 800-181 NICE Cybersecurity Workforce Framework (NCWF) by NIST

Draft SP 800-181 NICE Cybersecurity Workforce Framework (NCWF) by NIST

NIST released draft NICE Cybersecurity Workforce Framework (NCWF) to more effectively identify, recruit, develop and maintain nation’s cybersecurity talent. The framework provides a common language to categorize and describe cybersecurity work that will help organizations build a strong labor staff to protect systems and data.

As the threats to cybersecurity and the protections implemented grow and evolve, a cybersecurity workforce must be prepared to adapt, design, develop, implement, maintain, measure, and understand all aspects of cyber security. A cybersecurity workforce includes not only technically focused staff but those who apply knowledge of cyber security and its inherent challenges when preparing their organization to successfully implement its mission. A knowledgeable and skilled cybersecurity workforce can implement and maintain protections and take actions to meet nation’s needs.

Wed
21
Sep

10 Effective ways to get more out of risk management

10 Effective ways to get more out of risk management
To counter organization's operation risks in today’s dynamic world, there is a need for robust risk and control self-assessment framework which will enable your company to assess control's maturity level regularly against the risks to operations. You may think of including (but not limited to) the following actions/activities as part of risk & control self-assessment.
 
  1. Agree risks are complete and accurate - Take into account risks identified through internal and 3rd Party risks, security audits, incident logs (IT only) , significant business changes/ new regulations, external data, and risks identified in ICAAP scenario sessions(Banking and Financial sectors).
     
  2. Identify root cause of Risks.
     
Mon
05
Sep

Security Awareness- How much is enough?

Security Awareness- How much is enough?

Security awareness- A very big buzz word. We all know and often say that awareness is the key to security. An organization who is aware has much more likelihood of being secure than its counterparts. But to what extent do we give awareness to the audiences? When we address them, generally we talk about what is information, what is meant by its security, what aspects of information we secure, what are the general controls we have and what are the common/ grave mistakes one could do and what could be its possible impact.

Well, if we say awareness is directly related to perception of information security risks, then awareness in itself might become another risk because you are making aware the audiences what could go wrong sometimes, without realizing the fact, that unless you would have told them, they might never get to know about that and thus giving them a chance to say “Ah, I don’t know that this kind of breach is that simple?”

Thu
09
Jun

Interactive Application Security Testing : Things to know

Interactive Application Security Testing : Things to know

Vulnerabilities in web application are the major cause for security breaches and are being treated as a pain by enterprises. Continuous monitoring of web applications is a hectic process, as the organizations are adopting agile delivery to face the business challenges. Traditional DAST and SAST are widely known technologies which make it easier to perform web application security assessments.

Sat
28
May

Cyber-security Definition?

Regardless of your role with respect to cyber-space, when you engage in any discussion of cyber-security, make sure everyone in the dialogue is working with the same definition.  Doing so will help avoid confusion, conflict, and missed expectations.
If you browse the Web for the definition of cyber-security, you will get a wide variety of definitions.  Some definitions encompass the spectrum of IT and data security.  All exclude the broader field of "information security" which would include information in non-electronic form.  Some definitions limit the scope to cyber-space...the realm of connected computers, their transactional activities and data exchanges.  Futher, some limit scope to malicious attacks.  Others expand scope to include all threats to networks, systems, applications, and data.

Mon
09
May

Key Security Learnings from Bangladesh Bank hack !!!

Key security learning from Bangladesh Bank hack

About Bangladesh Bank hack -  The attackers who stole $81 million from the Bangladesh central bank probably hacked into software from the SWIFT financial platform that is at the heart of the global financial system

Key Security Learnings -  (can be easily mapped to OWASP Top 10 Attacks)

Wed
27
Apr

12 Best practices to secure your data from cyber criminals

12 Best practices to secure your data from cyber criminals

Ransomware, a serious form of extortion is a malware attack in which the attacker encrypts the victim’s data, making it unavailable to the victim and demands ransom for revealing the decryption key. This cyber-attack has gained prominence as reputed organizations are being victimized.

Protect yourself from ransomware

The following are certain proactive measures that can help you secure your data from cyber criminals.

1. Regular Data Backup

Regularly updated backup is one act that can help an organization to refrain from giving up to ransomware attacks. It has been observed that ransomware has the capability to encrypt drives that are mapped. Hence, backup has to be planned regularly to an external drive which is not assigned a drive letter. Refrain from being connected to backup service post backup activity. Connect only when it’s required.

Pages

Subscribe to RSS - Best Practices