Top Banner
This quick security assessment will give you an overall idea of how well you’re securing yourself or your customers’ IT environment. Are you vulnerable to threats?
6

Are you vulnerable to threats?...Are you vulnerable to threats? Sherweb 5 5 or fewer “No“ responses 6 to 10 “No“ responses 11 or more “No“ responses Your results Every

Jun 27, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Are you vulnerable to threats?...Are you vulnerable to threats? Sherweb 5 5 or fewer “No“ responses 6 to 10 “No“ responses 11 or more “No“ responses Your results Every

This quick security assessment will give you an overall idea of how well you’re securing yourself or your customers’ IT environment.

Are you vulnerable to threats?

Page 2: Are you vulnerable to threats?...Are you vulnerable to threats? Sherweb 5 5 or fewer “No“ responses 6 to 10 “No“ responses 11 or more “No“ responses Your results Every

2

Are you vulnerable to threats? Sherweb

To get more insight into how you’re doing, email us or call us at 1 (855) 253-3213. Our dedicated team will be happy to answer all your questions!

Questions

1

2

3

4

Why we ask

Do you have a way to determine how many electronic devices and cloud services are in your environment?

Do you have the tools to ensure an inventory of sensitive data?

Do you know who actually has accounts in your environment?

Do you automatically and regularly patch your systems?

Yes

Yes

Yes

Yes

No

No

No

No

Unaccounted for systems are a key vector for attackers. In 2017, manufacturing companies were hit hard by the WannaCry ransomware attack because many of them used unsupported legacy systems.

Sensitive data is often stored in places no one intended, causing it to be forgotten and potentially made accessible to users without proper permissions.

An often-overlooked aspect of security is that end-users may have too many account privileges, or may not be authorized to have accounts in the first place.

60% of companies that have experienced security breaches say they could have occurred because a patch was not applied (Ponemon, 2019). Regular patching is necessary

Page 3: Are you vulnerable to threats?...Are you vulnerable to threats? Sherweb 5 5 or fewer “No“ responses 6 to 10 “No“ responses 11 or more “No“ responses Your results Every

Are you vulnerable to threats? Sherweb

3

Questions

5

6

7

8

9

Why we ask

Do you block unnecessary or harmful files from reaching you via email?

Do you scan removable media or block auto-running of content in your environment?

Do you keep track of how admin privileges are assigned among end-users?

Do you look for patterns of malware events in your environment?

Do you monitor login behaviors in your environment?

Yes

Yes

Yes

Yes

Yes

No

No

No

No

No

Email is the biggest vector for attacks. Despite transition to fileless attacks and phishing, attachments are nevertheless a common way to be breached.

In 2016, University of Illinois researchers left 300 unmarked usb flash drives around the campus, and nearly half of them were plugged into a computer within six minutes.

The admin role has powerful permissions but its assignment is often unchecked, making it far too easy to miss hackers with illegitimate high-level access.

Malware events can occur as singular incidents, but hackers often launch large coordinated attacks with a barrage of malware.

A popular way for hackers to breach systems is try logging directly into a targeted environment.

Page 4: Are you vulnerable to threats?...Are you vulnerable to threats? Sherweb 5 5 or fewer “No“ responses 6 to 10 “No“ responses 11 or more “No“ responses Your results Every

4

Are you vulnerable to threats? Sherweb

10

11

12

13

14

15

Do you regularly and automatically disable inactive accounts?

Do you regularly compare consecutive vulnerability scans?

Do you enforce policies for removing unauthorized hardware and software?

Do you automatically and regularly back up your most important systems and data?

Do you have three copies of your data: two stored on different media, and at least one stored off-premises?

Are you able to restore critical systems after a breach or disaster within 90 minutes?

Yes

Yes

Yes

Yes

Yes

Yes

No

No

No

No

No

No

Half of all user accounts are dormant, and are favored targets for cyber criminals.

Studying snapshots of vulnerabilities is a good short-term practice, but is insufficient long term.

Unauthorized devices and software are easy paths for malware and other threats to enter your environment.

Hard drives can fail, risking data breaches or permanent loss of critical information.

Backups kept in the same place as your original data are as at-risk as what you’re trying to protect.

Restoring your data as quickly as possible can be the difference between your business closing its doors or keeping them open. The average cost of a data breach is $3.92 million (Ponemon, 2019).

Page 5: Are you vulnerable to threats?...Are you vulnerable to threats? Sherweb 5 5 or fewer “No“ responses 6 to 10 “No“ responses 11 or more “No“ responses Your results Every

Are you vulnerable to threats? Sherweb

5

5 or fewer “No“ responses

6 to 10 “No“ responses

11 or more “No“ responses

Your resultsEvery “Yes” response is a reason to celebrate! It’s the “No” responses, however, that you need to add up

You’re doing well with regards to cyber security. You’ve put measures in place to improve your security posture. But this doesn’t mean your security journey is over! Have you looked into compliance requirements? How do you stay informed about emerging cyber security trends and threats? There are still conversations to have and actions to consider due to the constantly evolving nature of cyber threats.

It looks like you can improve on cyber security measures you’ve already put in place. You’ve certainly raised your baseline security, but there’s more that can be done. Reduce your current risk even further by strengthening solutions and policies you’ve already implemented.

It looks like you might be vulnerable. You could be breached by cyber criminals at any moment. There’s an urgent need to improve your security posture now, beginning with a detailed analysis of your network, endpoints and policies, followed by development and implementation of effective security solutions.

Below, you’ll find an overview of our recommendations for mitigating threats.

• Audit the devices in your network on a regular basis.

• Apply a data inventory and mapping solution.

• Create and regularly maintain an inventory of accounts in your system.

• Deploy a solution with automatic patch management to mitigate threats.

• Provide awareness training about the dangers posed by email.

• Provide awareness training for end-users and develop a policy to enforce that unverified media is not to be accessed on your network.

General recommendations

• Configure your system(s) to log changes in account activity, particularly for admin accounts and assigned privileges.

• Keep a log of malware events for your environment.

• Audit login activity in your environment to guard against suspicious activity such as logins from odd locations.

• Routinely review user accounts.

• Deploy a solution that automatically seeks out vulnerabilities, and study the evolution of vulnerabilities over time.

• Deploy a network scan or endpoint protection to defend against suspicious activity from devices connected to your network.

• Have a backup solution in place with options for automatic and regular data backups.

• Have three copies of your data: two stored on different media, and one copy stored very far away from your office(s).

• Have an enforceable plan in place to restore critical systems to the latest viable state as quickly as possible.

Page 6: Are you vulnerable to threats?...Are you vulnerable to threats? Sherweb 5 5 or fewer “No“ responses 6 to 10 “No“ responses 11 or more “No“ responses Your results Every

6

Are you vulnerable to threats? Sherweb

Security is special. The stakes are high, the legal requirements are complex, and the threats keep on shapeshifting.

The general recommendations above can be done without extra help, but it’ll take time and a lot of extra legwork if you’re just starting out. Sherweb has a range of solutions and experts on hand to help you implement all of these recommendations easily and can give you a deeper dive into your security posture than this short assessment provides.

Take this assessment at assessment.sherweb.com to get a full report with detailed threat-specific recommendations

How Sherweb can help

Published by Sherweb Inc. Content from this publication may only be reprinted with written permission and when credit is given to Sherweb. The information in this document is based on best available resources at the time of its publication. Opinions reflect judgment at the time and are subject to change. All other brand, company, and product names are used for identification purposes only and may be trademarks that are the sole property of their respective owners.

© 2020, Sherweb Inc.

Check out our infokit at sherweb.com/infokit, explore partnership opportunities at sherweb.com/partners or give us a call at 1 (855) 253-3213.

Want to learn more?