TZL 1446 (web)

10

In addition, below are a few other strategies I recommend to protect your infrastructure: † † Pay for anti-virus or anti-exploit software. While there are free options, it is worth investing in a paid version. These are typically inexpensive and offer better protection than free tools. † † Implement network segregation. While all your data may be important, there is data that is more critical to restore quickly given an incident. I suggest keeping primary, active project data separate from older, archival data. This will help you quickly and easily target which data to recover first. It also can help prioritize what data can be off-loaded or moved more easily. † † Determine security groups. We use the phrase “principal of least privilege” to help determine the minimum access a user needs to perform his/her job. This is important if malware infects a machine, and then operates and encrypts the network using the compromised user’s account. If the user cannot access certain folders, data in those folders could not be encrypted – therefore, limiting access creates a small barrier that may prevent a mass encryption. 4. User interaction. There’s a joke in IT: If we had no users to support, we would have no issues! But, of course, we wouldn’t be needed either. We have a symbiotic relationship with our coworkers and work to support them in various ways. That said, while the strongest component of our firm is our employees, they are also often the weakest link in our security. To combat this, we focus on educating our employees – warning users, providing examples of what to look for in malicious emails, and sending fake phishing emails to continually train awareness. If you don’t have the bandwidth to do this in your own business, there are options to outsource this type of education and probing effort. In a similar vein, email security is a constant battle, but it can be won. Many firms have access to threat protection tools to help keep malicious emails from making it into employees’ emails. Whether you have an in-house IT department or outsourced support team, ask employees to send any suspicious emails to your IT staff to investigate and make adjustments as needed. Finally, implement multi-factor authentication, such as inputting a code received via text message or having an app authenticate the user’s identity. While this effort doesn’t win the “convenience award,” it does help significantly protect employees, data, and infrastructure for a huge security win. Jason Cunningham is the director of corporate operations at Croy. He can be reached at jcunningham@croyeng.com.

JASON CUNNINGHAM, from page 9

We’ll delve into mitigating risks for a cyber-attack/ corruption soon, but for this “classification” category, it’s important to understand each type of event and how it could impact your business. In either case, our best advice is to create a disaster recovery playbook. This step-by-step, written plan for each scenario with important login information and phone numbers can provide an established, strategic gameplan in the case of an emergency. 2. Insurance. Speaking of cyber security, having the right insurance to protect against infrastructure loss and cyber- attacks is critical and one of the most comforting “tools” you can have in your toolbox. To start, add a cyber-security policy or rider to your existing business insurance. If your firm already has a policy, review it to understand what it does and doesn’t cover. For example, an electronic data loss policy typically only covers the replacement cost for hardware, and not in the case of cyber-attacks or malware events. At Croy, our policy includes access to a third-party security firm that specializes in malware attacks. In the event of an incident, this is our first phone call (the phone number is included in our disaster recovery playbook for quick reference). The security firm will assess the damage, determine if the cost/time for recovery is worth the investment, and even negotiate and pay the ransom, if needed. An investment that is well worth it in our books. After reviewing your insurance policy’s details, follow-up with a call to your insurance provider to dig deeper and get a full picture of your coverage. 3. Infrastructure. Keeping your business environment safe involves prioritizing managing, updating, and/or patching your equipment – including all infrastructure, servers, workstations, and AV – weekly. To begin, check your router, firewall, or wireless access points for firmware and software updates. Threat actors are constantly looking and communicating exploits or bugs that take advantage of weaknesses in either firmware (component-level) or software (the operating system in your router, firewall, etc.), which makes this task a priority. Most providers are proactive about pushing out updates to patch their equipment, but it is still necessary to update your internet-facing equipment and workstations as well. To make sure your machines are receiving and applying updates at regular intervals, I recommend having automatic updates turned on. At Croy, our IT team uses automatic updates and network monitoring tools to keep us informed to see how far behind they are on updates. This allows us to prompt a user to install or reboot when an update or patch needs to be applied. But this step can also be as simple as making sure you and your employees are checking and installing updates regularly.

© Copyright 2022. Zweig Group. All rights reserved.

THE ZWEIG LETTER JUNE 20, 2022, ISSUE 1446

Made with FlippingBook Annual report