7 Practices that Make Your Organization Vulnerable to Cyber Attacks

April 14, 2017 Amy Burnis

 

Today I read “How you can be the smartest cybersecurity expert in the room” on CIO.com. The author notes, “many CIOs and senior IT leaders are almost clueless about where to focus and how to start building next-gen security functions.” He references 20 CIS Critical Security Controls presented by the SANS Institute that organizations can implement to dramatically reduce risk. He acknowledges that list is too much for most busy IT teams, so he directs readers to focus on the top five CIS controls which can still lead to an “85 percent reduction in raw cyber security vulnerabilities.”

If you happen to be one of the smartest security people in the room, you already know that critical security control #5 is “Controlled Use of Administrative Privileges.” Where does this stand on your priority list?

Answer the questions below and consider whether or not your team has good or bad habits in place. If you answered yes to the questions below, your organization is susceptible to an attack. It’s time to implement controls around privileged credentials.

Learn more in The CISO View research report, “Rapid Risk Reduction: A 30-Day Sprint to Protect Privileged Credentials.”

 

Previous Article
New Wave of Ransomware Could Put Utilities at Risk
New Wave of Ransomware Could Put Utilities at Risk

The stakes for protecting against ransomware are about to get higher as malicious tools evolve to target In...

Next Article
Your Greatest Threat Might Already Be Inside Your Network
Your Greatest Threat Might Already Be Inside Your Network

Insider activity—both malicious and simple error—accounts for a growing share of data breaches. Statistics ...