Chapter 12: Mistakes Made in
Cybersecurity
Stolen information and data will not lead to the end of the
business. It is not a great sign for the business either. Studies
and research indicate that a data breach in an organization’s
network can lead to a loss of $15.4 million, and the amount
increases each year. People do not want to lose their money because
of some issues or vulnerabilities in the system, do they? Indeed,
businesses and organizations cannot make mistakes. These mistakes
can lead to the loss of data, but a large organization is bound to
make such mistakes. What the organization must do is to learn from
those mistakes. You cannot expect your organization to do the exact
thing repeatedly only because the outcome may change at one point.
This chapter covers the different mistakes organizations make. You
must protect your organization from making such mistakes during
these times.
Failing to Map Data
Every organization must focus on understanding how and where
the data flows. It should also look at where the data is saved.
Remember, data is the livelihood of your company. It is only when
you assess and identify the flow of data that you can see where it
must be protected. You must know if the data is flowing out of your
organization and who it is shared with. When you have visibility,
you will know what ends the hacker can attack. You will also know
where you can catch the hacker.
Neglecting Security
Testing
Vulnerabilities will reside across the database, systems,
applications, and network. These vulnerabilities now extend to
various devices like the IoT or Internet of Things and smartphones.
Organizations must test these devices and connections regularly to
scan for any vulnerabilities. This book
covers the different processes you can use to perform this task.
You can also perform some penetration tests to learn about the
vulnerabilities. Remember, you cannot guess the vulnerabilities,
and will only find them when you test them.
Concentrating on Wrong
Aspects
It is true that prevention is not an anachronism. As
technology advances, so make the threats against it. Remember, a
hacker will find a way to enter the border. A firewall will not
always protect your systems if you have an employee who does not
know what he is doing. Once a hacker is inside the system, he can
acquire privileged information. He can also pretend to be an
employee of the organization. Hackers can evade any security scans
for a long time. If you have better visibility, you can find a
hacker and reduce the chances of data leaks.
Forgetting the Basics
Often, it is the simple things you can use to overcome and
threats to the system. You must train all your employees. Help them
understand the type of password they must use. They must perform
the right actions as well. It is only when this happens that you
can maintain the network components properly and minimize the risk
of data loss. You can also find ways to configure the data to
prevent any changes adequately.
Avoiding Training
Remember to train your employees to know what they must do to
prevent any attacks. The most common form of hack is a social
engineering attack. The hacker will send information from a
malicious source and mask the information to seem legit. He can
then use the information the employee
feeds into the website, and attack the configuration of the system
and network. Make sure to train your staff about protecting their
systems and how to identify social engineering attacks.
Security Monitoring
Most businesses cannot set up their security operations center
or center of excellence since they lack the budget. This does not
mean you cannot monitor the security of the systems and network.
You must investigate the network and look for any threats or
vulnerabilities. You can use these methods to minimize the effect
of an attack on the data and security.
Avoiding Vendor Risk
Assessments
From earlier, you know vendor risks are the reasons for
numerous data breaches. Hackers can enter the organization’s
systems through the vendor’s application or network side.
Therefore, you must have a plan to help you assess the risks in
third-party systems. You can also read the reports they share about
their systems to learn more about their security.
Ignoring Shadow IT
Remember, the end-points in any network are
often connected to other networks, and this makes it hard to
control the flow of data through the network. Most employees access
shadow devices and applications from their laptops and desktops.
The IT department in most organizations does not support the use of
such applications. If you do not know how to stop shadow device
usage, you must find a way to hide them. You can block these
applications and websites.
It is not only about
Malware
Most hackers use malware to establish their presence in a
system or network. Once they are inside the network or system, they
will use different strategies to perform the hack and move through
your network. So, you need to find hack into the system in a
legitimate way and perform the hack to detect any vulnerabilities.
The previous chapters covered the different methods you can use to
perform this type of testing.
Breaches won’t Happen
This is one of the biggest mistakes most companies make. Some
organizations do not protect their business and network since they
believe cybercriminals do show mercy. This is never going to
happen. Cybercriminals will attack any company, regardless of its
size. You must prepare your defenses and identify the response to
an attack. This will help you minimize the damage and react faster
to any threats if the day does come.
Forgetting about the
Management
You must understand that security must mature over time, and
this is one of the primary objectives of an information security
professional. In some instances where businesses have reached high
levels of maturity, security is a part of the organization’s
culture. You must obtain permissions and approvals from the
management before you investigate any attacks or the systems. This
is explained in detail earlier in the book.
Doing it on Your Own
As mentioned in the first chapter, there is
a shortage of skills in the cybersecurity industry. Regardless of
whether you own a small business or are a part of a larger
organization that lacks security skills,
you must find someone to help you with testing your network and
systems. Hire an penetration tester to test the networks and
systems. You can also partner with Managed security service
providers. Alternatively, you can speak to your management and hire
the right professionals, or you can train the employees in your
firm.
You must avoid making these mistakes if you
want to improve the security of your organization’s systems and
networks.