Page 37 - Cyber Defense eMagazine - December 2017
P. 37

7.  Make Sure You Have a Documented Desktop Configuration Policy

               Make sure you’ve got a good security policy for dealing with access to your common

               desktop. Is the user allowed to do anything they like? Or is it cut down? Do you have a
               VPN access policy, and what is it? What is your policy for identity and authentication?


               There’s  a  whole  world  of  things  that  you  could  do—far  too  many  to  mention  here.

               However, if you don’t document the policy as a starting point, you will almost certainly
               have vulnerabilities.





               8.  Use Multi-Factor Authentication

               Definitely  consider  multi-factor  authentication  (MFA).  MFA  is  very  practical  now,  with

               fingerprints,  facial  scans,  etc.  Biometrics  really  has  changed  the  game,  though  other
               forms of secondary authentication are fine. The main thing is don’t rely exclusively on

               usernames and passwords anymore.




               9.  Have an Incident Response Plan in Place


               Your company should have a set of procedures in place for the “what if” scenario. This
               way, you are prepared if you get hit with malware, if there’s a disaster, or if there’s some

               kind of data breach. If you have a plan already, “you don’t run around like a headless

               chicken,” as Andy puts it. You need to flip over to “Okay, right, there’s a procedure for
               that; let’s deal with it.”


               Remember that you might need to restore data. When talking about security, we often
               talk about computer security. For a company, however, the topic of information security

               looms  large.  A  company  needs  to  be  prepared  to  bring  back  data  if  and  when  an

               incident occurs.









                   37    Cyber Defense eMagazine – December 2017 Edition
                         Copyright © 2017, Cyber Defense Magazine,  All rights reserved worldwide.
   32   33   34   35   36   37   38   39   40   41   42