Page 122 - Cyber Defense eMagazine August 2024
P. 122

1. “Where is my data?”

            The first step to securing data is knowing where it to find it. Once you catalog each device, data source,
            storage location and transfer point where data resides, you can define a cybersecurity strategy that builds
            a  fortress  around  those  targets.  Pursue  a process  of  data  mapping  and  classification.  Detail  all  data
            assets  and  classify  data so  that you  fully understand  what  data  is sensitive  and  subject  to regulatory
            protections.

            For instance,  medical facilities with Personally  Identifiable Information  (PII) and health data covered by
            HIPAA, or a business with financial  data regulated  by FINRA,  should flag that data as carrying  special
            responsibilities for how it must be handled and secured. Crucially, a business should treat all devices and
            environments with the assumption that sensitive data resides there (even after performing data mapping)
            because, in practice, this is too often true—and under-securing such blind spots is a common recipe for
            a data breach.

            To complete  the picture  on your data’s locations, perform a data flow analysis to track the flow of data
            through  your business, from its creation  to its deletion.  Doing so will identify any channels  where data
            transmission  needs  to  be  secured.  Make  sure  that  trustworthy  file  transfer  solutions  and  encrypted
            communication protocols are in place to fully secure all data in transit.



            2. “Who can access my data?”

            Regulatory  compliance  often  hinges  on  whether  or  not  a business  can  prevent  unauthorized  access.
            Securing device and system access—thereby securing data against breaches and your business against
            regulatory action—should be accomplished  via layers of safeguards and active security measures.

            Implementing  role-based  access  control  (RBAC)  empowers  businesses  to  closely  manage  who  can
            access data within its organization. By allowing each employee to access only the data they need to fulfill
            their  role and  tasks,  a business  vastly  reduces  internal  threats  and  the risks  that arise  when  a single
            employee’s  device  or credentials  are  compromised.  Adding  multi-factor  authentication  (MFA)  will then
            protect data even in that inevitable credentials-have-been-compromised  scenario.

            Implementing  continuous  security  monitoring  to  detect  anomalous  behavior  and  take  automated  and
            manual  actions  to  mitigate  attacks  is  essential,  as  is  automated  alerting  to  ensure  swift  security
            responses. Performing access audits to verify the effectiveness of access controls and recognize attack
            attempts  is  another  important  practice.  Businesses  can  also  harden  access  controls  with  automated
            protections  that  make data  inaccessible  when  a device  shows  signs of compromise.  This can  include
            removing or quarantining a device’s data when the user fails too many login attempts, or when the device
            exits a geo-fenced area where access is approved.












            Cyber Defense eMagazine – August 2024 Edition                                                                                                                                                                                                          122
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   117   118   119   120   121   122   123   124   125   126   127