Technology Advisor Blog



Stepping up your Cybersecurity with "Defense in Depth"

Posted by Ann Westerheim on 8/23/21 4:43 PM

When the pandemic hit, businesses all over the globe had to shift to remote work almost overnight.  Now, with the vaccine rollout in full swing, the hybrid work model is gaining popularity. This allows employees to work from home, the office or split their time between both. According to a recent Accenture Report, close to 65% of businesses have adopted a hybrid model, and most workers prefer it that way.  

However, a distributed workforce comes with its own set of challenges. One of the primary concerns of IT leaders across the globe is the unprecedented increase in cybercrime. The FBI reports that cybercrime has shot up by almost 300% since the start of the pandemic.

Relying on one basic security solution will, therefore, prove to be futile against sophisticated attack vectors.  You may have seen advertisements on-line or on television promoting a single security solution that solves all your cybersecurity problems, but it just doesn't work like that! This is where an approach like Defense in Depth (DiD) finds its relevance.  If you've attended any of our security workshops, we also often refer to this as "layers of security".

Defense in Depth is a cybersecurity approach in which multiple defensive methods are layered to protect a business. Since no individual security measure is guaranteed to endure every attack, combining several layers of security is more effective.  

This layering approach was first conceived by the National Security Agency (NSA) and is inspired by a military tactic of the same name. In the military, layers of defense help buy time. But in IT, this approach is intended to prevent an incident altogether.

While Defense in Depth is critical to protecting your business against evolving cyberthreats, it’s an undertaking that requires time, extensive knowledge and experience. Partnering with a technology service provider like Ekaru can simplify the process, reduce stress and minimize opportunities for error.

How Your Small Business Can Help Defend Against Threats

All of the major cybersecurity protocols and frameworks (NIST, HIPAA, CMMC, etc) focus on three primary areas of control:

1. Administrative Controls
The policies and procedures of a business fall under administrative controls. These controls ensure that appropriate guidance is available and that security policies are followed.

Examples include hiring practices or employee onboarding and offboarding protocols, data processing and management procedures, information security policies, vendor risk management and third-party risk management frameworks, information risk management strategies, etc.

2. Technical Controls
Hardware or software intended to protect systems and resources fall under technical controls. Examples of technical controls are firewalls, configuration management, disk/data encryption, identity authentication (IAM), vulnerability scanners, patch management, virtual private networks (VPNs), intrusion detection systems (IDS), security awareness training, etc.

3. Physical Controls
Anything aimed at physically limiting or preventing access to IT systems falls under physical controls.  Examples include  fences, keycards/badges, CCTV systems, locker rooms, etc.


Essential Elements of Defense in Depth:

A technology service provider will help you implement all the elements of an effective Defense in Depth strategy to minimize the chances of threats seeping in through the cracks. These elements include:

1. Firewalls
A firewall is a security system comprised of hardware or software that can protect your network by filtering out unnecessary traffic and blocking unauthorized access to your data.  We strongly advise implementing a "business class" firewall and not simply relying on what your Internet provider installed.

2. Intrusion Prevention and Detection Systems
Intrusion prevention and detection systems scan the network to look for anything out of place. If a threatening activity is detected, it will alert the stakeholders and block attacks.

3. Endpoint Detection and Response (EDR)
Endpoint Detection and Response (EDR) solutions operate by constantly monitoring endpoints to find suspicious or malicious behavior in real time.

4. Network Segmentation
Once you divide your business’ network into smaller units, you can monitor data traffic between segments and safeguard segments from one another.  If there's a breach in one segment of the network, the other segments may be protected.

5. The Principle of Least Privilege (PoLP)
The principle of least privilege (PoLP) is a cybersecurity concept in which a user is only granted the minimum levels of access/permissions essential to perform their task.  If an employee doesn't need access to protected information, they should not have access.  In many cases, over time data winds up being stored in a way that multiple people have access to it when they don't need to.  Conduct regular audits of the data you hold.

6. Strong Passwords
Poor password hygiene, including the use of default passwords like “123456” or “admin,” can put your business at risk. Equally risky is the habit of using the same passwords for multiple accounts. To protect your accounts from being hacked, it’s essential to have strong passwords and an added layer of protection by using practices such as multifactor authentication (MFA)

Read More

Tags: cybersecurity, ransomware, cybersecurity, ransomware, cybersecurity training





Bringing more than just your laptop back to the office.

Posted by Ann Westerheim on 6/21/21 1:34 PM

At the start of the pandemic, there was an intense scramble to enable remote work for many in the “laptop class”.  For many people, working from home was a welcome change from stressful commutes and a hectic family life. Some people are scrambling to get back to the office to escape makeshift dining room desks that compete with family life and chaos, or just crave the social interaction, creative interactions, and other structure that office environments provide. You might be in a hybrid situation, where you are putting in hours both at home and in the office. Either way, you’re back and you’re ready to go.

Read More

Tags: cybersecurity, cybersecurity training





Sharing Too Much on Social Media?  Watch out for Hackers.

Posted by Ann Westerheim on 6/15/21 10:09 AM

Social media is great for a lot of things:  Sharing photos, connecting with old friends, and finding like-minded people and groups to share ideas and hobbies.  Social media is also widely used by businesses to market products and events, keep on top of industry trends, and prospect for new customers.  But when does sharing become over-sharing and when does social media pose a risk?

Read More

Tags: cybersecurity





Old Electronics?  Don't Throw Them in the Trash!

Posted by Ann Westerheim on 5/18/21 4:18 PM

One of the harmful byproducts of the digital age is e-waste.  The average person gets a new cell phone every three years and a new computer every five years.  When electronics end up in landfills, toxic materials like lead, mercury, and cadmium can leak into ground water.  Unfortunately, the EPA estimates that only 20% of electronics are properly recycled.  Improper disposal of electronics also poses a major security risk as the data from old hard drives can fall into the wrong hands.   

Read More

Tags: cybersecurity, e-waste, electronics recycling





Cryptocurrency 101

Posted by Ann Westerheim on 5/3/21 4:54 PM

Cryptocurrency is a term that we hear a lot, but for many of us, it remains a bit of a mystery.  We’ll take a look at it from a high level to provide some understanding.  Why? Well, it isn’t going away, and it only seems to be gaining popularity.  And also, because if you are a target of a ransomware attack, it could very likely be how the hacker demands payment. Now, we are not suggesting you pay that ransom demand - in fact, the US Department of the Treasury has issued warnings against paying -  but getting familiar with cryptocurrency will help you in understanding how these cybercriminals are able to fly under the radar.

Read More

Tags: cybersecurity, ransomware, cryptocurrency, bitcoin





Tax Time and Cyber Scams

Posted by Ann Westerheim on 4/22/21 11:29 AM

It's Tax Season (with an extra month extension for COVID) which means its also the season for tax scams.

Read More

Tags: phishing, cybersecurity, ransomware





ParkMobile Data Breach Exposes Information on 21 Million Users

Posted by Ann Westerheim on 4/14/21 5:21 PM

If you're a user of ParkMobile, the popular parking app, your credentials were just leaked on line after a breach.  KrebsonSecurity reported this week that someone is selling account information for 21 million customers of Park Mobile.  The stolen customer data includes email addresses, dates of birth, phone numbers license plate number, hashed passwords, and mailing addresses.

Read More

Tags: breach,, cybersecurity





Just Published:  The FBI 2020 Internet Crime Report

Posted by Ann Westerheim on 3/22/21 4:26 PM

The FBI's Internet Crime Complaint Center (IC3) has just released its annual report.  Over 700,000 complaints were filed - an increase of more than 300,000 from the previous year -  and reported losses exceeded $4.2B.  

Read More

Tags: small business, phishing, cybersecurity, ransomware





Cybersecurity in 2021 - Security Awareness Training

Posted by Ann Westerheim on 3/11/21 4:43 PM

 

Here's a re-cap of our recent community cybersecurity training event.  Cybersecurity these days is like a game of chess.  For every move, there's a counter move.  As people put more technology protection in place, the cyber criminals just get more clever.  User awareness is often the key to staying safe!  Will your employee click on that dangerous link?  It takes just one wrong click to do a lot of damage.  The more you and your team know about the latest threats, the better.  We were pleased to host close to 100 local small business leaders from Westford, Acton, Littleton, Chelmsford, Concord, Waltham, Southborough, Northborough, and Wellesley during our recent small business cybersecurity awareness training session. Education is a key part of Ekaru's mission, and here are a few highlights from the event.

Read More

Tags: cybersecurity, cybersecurity training





Keep Your Technology Fresh and Stay Secure

Posted by Ann Westerheim on 3/1/21 3:29 PM

An important part of staying secure on line is keeping your technology up to date.  If you're running old technology, you're not benefitting from the latest security protections.  In January of 2020, Microsoft ended support for Windows 7. This led to a massive worldwide effort to get systems upgraded to Windows 10.  However, a recent report on The Verge indicates up to 100 million PCs are still running Windows 7.  Ouch!  If you made the move to Windows 10, kudos for you, but have you kept the rest of your technology up to date?

Read More

Tags: small business, cybersecurity





Subscribe by Email





    Browse by Tag

    See all tags...


    Posts by Month

    See all months...


    Connect With Us



    Older Blog Posts

    For older Ekaru blog posts, go to ekaru.blogspot.com.