Page 236 - Cyber Defense eMagazine August 2024
P. 236

Secure remote connections and hardware

            All hardware and connection points among collaborators  must be secure. If you use networked storage,
            configure your device to use an HTTPS connection, ensure you have a valid SSL/TSL certificate installed,
            and get your data backed up.

            You should also ensure you and your collaborators keep all hardware and software up to date and fully
            patched, along with securing WiFi networks  by logging into your router and disabling WPS and remote
            access, enabling HTTPS logins and WpA2 encryption, and updating the firmware.


            Other best practices for keeping hardware and remote connections secure include using a virtual private
            network (VPN) or desktop-as-a-service  (DaaS) platform, ensuring all endpoints have anti-virus and anti-
            malware protection, and educating stakeholders on the risks of human engineering attacks.



            Identity access management  (IAM)

            Speaking of educating stakeholders,  we all know that humans are the weakest link in any cybersecurity
            posture.

            And while security awareness training can help a ton, you also need to protect people from themselves
            with strong password enforcement and access management controls such as multi-factor authentication
            (MFA) or two-factor authentication  (2FA). Enforcing the principle of least privilege—where  stakeholders
            only have access to the data they need to do their jobs, and nothing more—is also highly encouraged.

            Once you’ve developed  a list of role-based  access policies, enforce  it with automated  IAM software to
            keep your rules effective and enforced at scale.



            Strong encryption

            Strong encryption such as Advanced Encryption Standard (AES) is a must when working remotely and
            transferring data to other remote workers and locations. That’s because even if your other measures fail
            and your system is breached, strong encryption ensures hackers won’t be able to read the data.


            And  although  hackers  can  (and  do)  break  cryptography  using  various  methods  such  as  cypher-text
            attacks, cracking those codes takes a lot of work and know-how. Unless the hacker is coming after you
            and your work specifically, it’s likely they’ll just move on to a softer target.

            Always keep your files encrypted  while at rest (and in flight during data transfers).  Most data breaches
            come down to human error, not Enigma-style code breaking.











            Cyber Defense eMagazine – August 2024 Edition                                                                                                                                                                                                          236
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   231   232   233   234   235   236   237   238   239   240   241