Share this article on:
With the cyber threat landscape evolving at an ever-increasing pace, the strategies adopted by IT security teams are under constant review, Scott Hesford at BeyondTrust writes.
CISOs and CIOs know they need to keep their organisation’s IT infrastructure secure at all times but often have limited budget and resources, especially at a time when skilled security professionals are hard to find.
As a result, security teams want to focus on the key strategies that will deliver the best possible protection against current threats and those that will emerge in the months and years ahead.
Of all the strategies currently being adopted by Australian organisations, there are five that warrant particular attention. These are:
1. Focusing on protecting privileged identities
Effectively protecting digital identities is perhaps the most important challenge for IT teams and none are more important than privileged identities. The credentials for these privileged accounts can fast-track access to sensitive data and open up lateral pathways that enable attackers to broaden their sphere of attack.
To get the most value from this strategy, organisations should:
2. Ensuring secure remote access for all users
Access to all sensitive resources should be locked down and tightly monitored, especially when large numbers of staff continue to work remotely. One concern is that when credentials are being entered remotely, these are exposed to the local computer and to any malware or attack that can sniff them out.
The path forward to addressing these challenges involves extending privileged access management best practices such as least privilege, privileged password management and session monitoring, beyond the perimeter.
To achieve this, IT teams should:
3. Apply endpoint privilege management
A least privilege security strategy can not only outright counter many types of malware and other attacks from executing, but it can also maroon attackers who do gain a foothold by sharply reducing the potential for privilege escalation and lateral movement.
Steps to take as part of this strategy include:
4. Undertake hardening and vulnerability management
Remote and BYOD endpoints pose a significant security challenge with regards to how configurations, controls, and patches are implemented. However, enforcing least privilege and removing admin rights, as covered earlier, is an essential control that can help mitigate these risks.
Steps to take include:
5. Prevent the tampering of remote and mobile endpoints
Some attacks involve criminals breaking into homes or offices and stealing physical devices. Ensuring the integrity of remote and mobile endpoints, and the data that resides on them, is therefore critical.
To achieve this additional security:
By following these strategies, IT teams can be confident they are well prepared to defend against a range of cyber attacks. Taking these steps now will make the organisation more secure in the future.
Scott Hesford is the director of solutions engineering, Asia-Pacific and Japan at BeyondTrust.