360 Degree Cyber Security, LLC

Tag Archive:identify

Be Proactive – Not Reactive

October 15, 2017 – Cybersecurity is not ONLY about responding to a ransomware or hacker but being prepared to prevent it from happening. When you are prepared to prevent an attacker for entering your computers or network, you make it difficult for them to be successful. For an attacker that means they will have to spend more time trying to get what they want. If it is simply to hold your computer and information for ransom, then they will likely move on. If it is your information that they want, they will expend the extra time to get it. But who said you had to make it easy?

So, what can you do? Well, a lot. But don’t despair. It may not cost you a lot to implement. Let’s follow the National Institute for Standards & Technology (NIST) Cyber Security Framework. In the framework there are two areas that are easily addressed. Identify and Protect.


Asset Management – Get a list of EVERYTHING that processes information electronically. It could be a security camera connected to your network, your computers & servers, a printer, all you network devices, etc. Record what it is, what operating system (Windows, Linux, macOS, etc) and what software is installed on it (Office 2016, Adobe Reader, Adobe Flash, and the other programs you use). If it is a device like a printer or a security camera, record the brand and determine the firmware version.


Maintenance – Update your software and firmware when new version are available as they may address security flaws in the software. For Windows and other applications, updates are provided monthly. Others, not so often. Check with the developer and see if they have an email list you can join to be notified when there are updates.

The longer a security flaw remains in your software or firmware the easier you make it for an attacker to be successful in taking or ransoming your information. But by doing these two things, you have done a lot to protect your information and taken a proactive stance in preventing an attack from being successful.

If you need assistance, let us know.  We’ll be glad to help you become proactive!

Critical Security Controls for Truely Small Businesses – Identify

I listen to a number of podcasts weekly.  One of my favorite is Down the Security Rabbit Hole (#dtsr).  Frequently I hear the hosts talk about focused measures and that basically one size does not fit all.  If you look at the Critical Security Controls initially published by SANS & Council on Cyber Security and now promulgated by the Center for Internet Security.
The controls fall into broad categories defined the U.S. Governments National Institute of Standards and Technology (NIST) Cyber Security Framework.  The framework breaks down controls into five areas.  This blog post will cover the first Identify.
The controls while applicable to larger small businesses (20+ endpoints) Let’s take a look at ways that smaller businesses with less can make this happen without going broke.  So breaking this down into items easily accomplished by completed by the business IT person or a consultant. For a small business they can look at “quick wins”.


The Critical Security Controls show seven Quick Wins.  Some are not so easy to implement and may require purchasing additional software and hardware to manage.  But what it comes down to is really knowing what you own.


For example a local accounting firm may only have five or six computers, a server, a couple of printers, and basic networking devices.  For simplicity sake, let’s say 10 endpoints.
Why did I choose an accounting firm?  Typically these firms process a considerable amount of personally identifiable information (pii) and additionally there is quite a bit of financial information about their personal and business clients.  This can make them a juicy target for cyber criminals.
So of the seven Quick Wins, really only two are initially necessary.  I say initially, only because the others can be addressed later as the business is able to.  The same goes for the other items under the Identify framework category.
1.2 – Deploy automated asset inventory.  Well maybe not automated, a hand developed list with manufacturer, model number, serial number, location, and assigned IP addresses.  Maintain and update the list as things change within the business.  Identify those pieces of hardware that process or store information critical to the business.  In the case of an accountant, it might be a server and workstations that store the information.  If you utilize a managed service provider, have them provide this list to you.  To go with this, draw out a map showing how the network is connected. 


2.3 – Deploy software inventory tools.  Again like the hardware, a hand developed list of software is all that is really necessary that contains the developer, version number, and last time updated.  A typical list can be derived by looking at the add/remove programs console.  Given that it is possible that not everything installed will appear in the list, it will contain your major applications and add-ons (Adobe Acrobat, Flash, etc.)
By completing these two items, a small business can meet the intent of the Identify category.  If you require assistance, please contact us.  We will be glad to assist your small business.