Page 72 - Cyber Warnings
P. 72
2. Deploy zero trust endpoint management for every endpoint on every device and for
every stakeholder. One approach is to make the edge ‘invisible’ to the rest of the
internet. To all illegitimate entities, protected applications and devices appear to be
disconnected. There is no way to fingerprint or breach a perimeter that is not visible.
Invisibility creates immunity against DoS attacks. Even high-end state sponsored
assaults are thwarted.
3. Deploy management of every stakeholder and enforce two-factor authentication for all
users, apps and servers. Using stakeholder management provides simple, instant, local
control and access to only secure connections, drastically improving the effectiveness of
the security infrastructure.
4. Deploy data protection for all data. Make sure all sensitive data is encrypted and that
tools are in place to control what can and cannot be exported from your company.
5. Make sure your anti malware has heuristics. Heuristics look for malware that has not yet
been identified and categorized. Make sure every device (including BYOD), inbound
email, all impoted data, USB, bluethooth, WiFi, nearfield, and Internet connection is
screened for malware. Screen all data that is imported into your company from
whatever source. Ensure your plan covers EVERYTHING. Think USB, hotspots, leave
no stone unturned.
6. Re-architect your existing security based on what is needed not what you have done in
the past. If you always do what you always did, you will always get what you always got.
7. Put written processes, governance and controls in place to manage the human element.
This is your chance to gain a secure business enterprise and the only way to stand a chance to
win this war on data protection.
P.S if you like this article please share it !
References:
1. Zero trust endpoint management: http://blacksands.danati.com
2. Two factor authentication: http://blacksands.danati.com
3. Stakeholder Management: http://blacksands.danati.com
4. Data protection: https://www.microsoft.com/en-us/security
5. Heuristics i.e. http://support.kaspersky.com
6. Security architecture: https://www.linux.com/news/nine-principles-security-architecture
7. Processes, governance and controls: http://www.iso27001security.com/html/27014.html
72 Cyber Warnings E-Magazine February 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide