Cybersecurity Tips

5 Simple Ways to Improve Your Organization’s Cybersecurity

Tackling cybersecurity challenges is no walk in the park. However, you can use these five simple actions to improve cybersecurity at your organization.

Join our newsletter:

Review User Privileges and Access Rights

User Groups
One of the most basic principles of cybersecurity is the “principle of least privilege”. The principle of least privileges states that users and programs should only have the necessary privileges to complete their tasks. Another important concept is “need-to-know”. Users should only have access to the information and data they have a “need-to-know” for.
The idea is that the fewer privileges an account has and the less data/information it has access to, the less damage a hacker or insider threat can do with the account.
I see so many organizations not following the principle of least privilege. Don’t be one of them. Review your user accounts and privileged security groups to see which users have more privileges than needed. Revoke privileges and group memberships as necessary.
Before revoking permissions or privileges, coordinate with the management to ensure that employees have enough privileges and permissions to complete their work.

Uninstall non-essential software

Least Funtionality
If you conduct an inventory of the software installed on your end-points and servers you might be surprised at what you find. Spotify, Apple Music, Steam, and other non-essential software are all liable to show up. If you don’t need the software to support your organization's mission then uninstall it. Why? Because of the “principle of least functionality”.
The principle of least functionality requires that systems are configured to provide only essential capabilities and to prohibit or restrict the use of non-essential functions. This includes non-essential software. The less software you have on your servers and end-points the smaller your attack surface and the easier it is to maintain your systems.
Start by creating a software whitelist consisting of mission essential software. From there start uninstalling whatever isn’t on the whitelist. Add software to your whitelist as necessary. You want to enforce your whitelist using a technical control so that only whitelisted software runs on your systems.

Revoke Admin Rights from Non-Privileged Users

Least Privilege
Why do employees who only use their browser and Microsoft Office to complete their work have local administrator rights on their computer? In general, a user does not need local admin rights on their workstation, if they do then confirm it with their manager. Otherwise revoke local admin rights from non-privileged users.
By revoking local admin rights you are mitigating 94% of windows vulnerabilities.

Turn on Multi-Factor Authentication for Cloud Resources

Least Privilege
If an account is used to log into a cloud application then it needs to be protected by multi-factor authentication. Most cloud resources allow you to do this. The last thing you need is a high-profile employee falling for a phishing attack and then having his/her Office 365 account hacked. By turning on MFA for all your cloud accounts you reduce the probability of that scenario from occurring.

Encrypt Portable Storage Devices and Mobile Devices

If you have portable storage devices (USB flash drives and external HDD or SSD drives), laptops, tablets, and smartphones they need to be encrypted. This is because they can be transported out of your secure facility. If the device is lost or stolen and isn’t encrypted, anyone can access the data on the device.
Make sure to use FIPS validated cryptography when encrypting digital media.

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 NIST SP 800-171 & CMMC Compliance App

NIST SP 800-171 & CMMC Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.