Navigating Information Security Risk Post-Pandemic

In celebration of Cybersecurity Awareness Month, we want to spend a few minutes discussing some lessons we’ve learned over the last 18 months since the pandemic started. We believe, like others, that the pandemic has largely accelerated existing trends within the marketplace. It’s encouraging to see the pace of innovation from many of our customers and within the industries where we work. With that change, however, we do see some common struggles among our customer base.

Many of our clients are currently transitioning large portions of their infrastructure to the cloud. With this, they’re incorporating new vendors into the management and support of these platforms. In addition, they’re often trying to integrate these new deployments with legacy technology and applications in traditional data centers. These changes have blurred the lines of traditional network and security boundaries and the roles & responsibilities between internal personnel and third-party vendors. 

The traditional model of perimeter-based security no longer works in this new paradigm. The movement towards BYOD and work from home has created a patchwork of networks and systems that must now be trusted and secured to help protect enterprise data. In addition, all of this has changed the user’s workflow and the way they interact with enterprise systems. Often user authentication and system behavior are quite different from what employees have seen traditionally. This creates a situation where users become targets for phishing attacks.

All of this change comes at a time when attackers’ can easily monetize ransomware events, creating a well-organized black-market industry that is looking to exploit your weaknesses. These are professional threat actors who are employed by well-organized international cybercrime syndicates utilizing sophisticated attack techniques.

Minimizing Cybersecurity Risk in the Current State

With so many changes occurring all at once, organizations must focus on maintaining and updating information security management systems to align with the current state, including:

Update Your ISMS

Update Your ISMS

Ensure you have complete coverage on your core information security responsibilities (Identify, Protect, Detect, Respond and Recover). Map these responsibilities onto your new vendor relationships and make sure these align with your expectations. Don’t assume your vendors have it covered. Ensure you have the appropriate policies and security controls implemented for end point protection, Identity & Access Management, User Awareness Training, Remote Access and BYOD polices.

Read More: Why Vendor Due Diligence is Critical to Your Information Security

Focus on Legacy Application Risk

Focus on Legacy Application Risk

Be thoughtful of how you integrate legacy applications with your hybrid or cloud applications. Legacy applications often require the use of outdated or insecure services and protocols. These are often the entry point for an attacker into the rest of the organization.

Read More: The Downside to Cloud Computing

Minimize User Risk

Minimize User Risk

Ensure your users have the proper security awareness training on new technology deployments and current phishing tactics. Apply multi-factor authentication for your online and cloud-based applications. Implement security controls on the user’s endpoint, which minimizes the impact if a user is phished.

Read More: How a Cyber Risk Assessment Can Prepare You for Adverse Events

Update Your Detection Capabilities

Update Your Detection Capabilities

Ensure your organization can detect malicious behavior across your infrastructure. We’ve found that many organizations are losing much of the traditional monitoring and tracking abilities within their hybrid and cloud-based deployments. It often becomes difficult to track user behavior within and across cloud-based applications. Many applications service user accounts and the backend, making nonrepudiation difficult at best.

Read More: Malicious Actors are Hiding in Plain Sight

Implement A Breach Response Plan

Implement a Breach Response Plan

Prepare for your breach now, before it happens. Ensure you have a well-developed response plan in place. Ensure you have a robust ability to detect attacks early and often, minimizing the potential impact from these events. Before it happens, develop relationships with third-party vendors who will help respond to a ransomware event. Your ability to act quickly is directly correlated to the cost and impact when recovering from these events.

Read More: Ransomware Attacks: How to Prepare, Prevent, and Respond

Revisit Your Cyber Insurance

Revisit Your Cyber Insurance

Ensure you have the appropriate cyber insurance coverage in place and that you’re meeting the security requirements for these policies. Many underwriters are now refusing to pay out coverage because security controls and best practices were not implemented. 

If you’d like more information or to discuss your organization’s cyber security needs, please contact us at Connect@CompliancePoint.com.

Finding a credible expert with the appropriate background, expertise, and credentials can be difficult. CompliancePoint is here to help.