The question is very broad as it depends on what industry you are in and if you are B2B or B2C and how transactional your website is. Ideally, you should request a cyber security consultant to provide some advice.
My priority would be to request a comprehensive IT & Risk Assessment. Small MSP's can perform these at very affordable prices and sometimes credit the fee back if you subsequently buy other products and services from them.
A good IT & Risk assessment will provide you with visibility of everything attached to your network(s) and a thorough analysis of each of them. One of the biggest threats to an organisation is leaving servers and applications on old versions of software - patching. That is what criminals are looking for as an easy route into your company. The second threat is poor password management. A good assessment will notify you about devices you didn't know you even had and their patch status. It will also notify you of users with passwords that need to be reset and their login history of all the systems they have access to. We sometimes find credentials of employees who left the company months ago are still being used to login to critical systems - That is a big alarm bell!
If you are considering a penetration test (pen test) - great, but have a network assessment first and clean up all the easy stuff so that the pen testers have to work hard for their money.
The contributors to this article who talked about staff being the weakest link are correct. Email phish simulation and training can cost as little as $1.5 per person per week. Over a fairly short time, it makes a massive difference to the likelihood of an attack getting into your company. MSP's that provide assessments usually offer a staff awareness platform too. Staff benefits from vital cyber skills in their personal lives too.
You must perform a vulnerability assessment on all your devices, for example with Tenable Vulnerability Management. Then you must remedy the critical and high vulnerabilities.
Always evolving your technologies with security threats and trends is needed , similarly user awareness of security is a key . As an IT person with a limited budget of SMB organization they should opt for UTM (NGFW) , better endpoint with EDR,ATP and email security . An enterprise should be always ready for any targeted or rogue attacks hence a defence in layers is required , firewall, network layer ATP (sandboxing), Email with zero day attack intelligence, device controls, EDR and EPP , WAF for web servers and an honeypot to trap and known the threat vectors for their organization.
No matter what tool you used, we can't stop all the threats.
We need 360 degree visibility and need to categorise the risk factor and work continuously to improvise on enhancing security posture. There are end number of tools available depending on the risk factor
IT Consultant Supervisor at a financial services firm with 5,001-10,000 employees
Consultant
2022-08-10T02:25:35Z
Aug 10, 2022
1) Awareness - educate people. People is the weakest link in security
2) Move your infra to cloud. Its cheaper and easier to protect.
3) Adapt Desktop-as-a-service for all employees. They can easily work anywhere using any of there own device or the company can just provide chromebook or tablet to access there workstation on the cloud.
4) Protect your cloud environment by adapting best practice suitable to your setup and size.
Find out what your peers are saying about Microsoft, Palo Alto Networks, Fortinet and others in Advanced Threat Protection (ATP). Updated: December 2024.
1. People buy - very important - it's not the technology adopted but the mindset and willingness of the people.
2. Choose your technology based on actual need and available budget.
3. Ensure that all possible exposure points are covered in your defense mechanism - laptops, server, firewalls, VPN - all are exposure points.
4. At the time of final design consider the threat landscape you are in and what all factors are contributory to it - your industry type and technology used, the endpoints involved, the type of people who are using these endpoints
The product and technology you finally choose AFTER you answer these basic questions will define your future defense mechanism as this will be the start point of your company's defense mechanism and its future evolution.
Technical Manager (SOC Operations) at Novac Technology Solutions
Real User
Top 5
2021-07-20T04:55:28Z
Jul 20, 2021
People are the weakest link in security so frequent awareness training is a must.
The top management needs to understand the implications of data/security breaches and also understand that they also need to comply with security policies. Form a TI team for detailed information on what threats are most likely to affect the organization/industry, and indicators to help prevent and detect more attacks.
There is no one-size-fits all. This is more of a knowledge and process challenge than a technology purchase gap, at least to start. Get in a security consultant for what ever amount of time your budget permits, and they can look at your business, risks and technology and set direction.
If your checkbook is burning a hole in your pocket, invest in security awareness training for your people, as hacking the human is the most common entry point for a problem. Back that up with relentless patching of operating systems and applications, coupled with locking down computers so people can't install whatever eye candy they browse to on the internet.
First of all, you need to know what you have inside your company, not only computers, but every device that is connected to the network, this will help you to identify where are the potential threats. There are products focused on making inventory of your network assets.
After that you can plan the best approach, based on your needs.
Surprisingly, the worst threats can come from places you don't even know they exist.
Advanced Threat Protection (ATP) refers to a suite of security solutions designed to defend against sophisticated malware or hacking-based attacks targeting sensitive data. ATP solutions are crucial for businesses looking to safeguard their digital environments from emerging threats.
Awareness Awareness and Awareness, the Problem is the Head.
True story, issues take place on the senior lvl (Open USB Port, no Clean Desk Policy, etc.)
Afterwards "we" (the working lvl) can talk about trainings and SW/HW Solutions.
So first is that security means not only buying a SIEM or ISMS Monitrin, its a mindset.
Some sort of taking care for the company like taking care for your family :)
@Norman Freitag great advice!
The question is very broad as it depends on what industry you are in and if you are B2B or B2C and how transactional your website is. Ideally, you should request a cyber security consultant to provide some advice.
My priority would be to request a comprehensive IT & Risk Assessment. Small MSP's can perform these at very affordable prices and sometimes credit the fee back if you subsequently buy other products and services from them.
A good IT & Risk assessment will provide you with visibility of everything attached to your network(s) and a thorough analysis of each of them. One of the biggest threats to an organisation is leaving servers and applications on old versions of software - patching. That is what criminals are looking for as an easy route into your company. The second threat is poor password management. A good assessment will notify you about devices you didn't know you even had and their patch status. It will also notify you of users with passwords that need to be reset and their login history of all the systems they have access to. We sometimes find credentials of employees who left the company months ago are still being used to login to critical systems - That is a big alarm bell!
If you are considering a penetration test (pen test) - great, but have a network assessment first and clean up all the easy stuff so that the pen testers have to work hard for their money.
The contributors to this article who talked about staff being the weakest link are correct. Email phish simulation and training can cost as little as $1.5 per person per week. Over a fairly short time, it makes a massive difference to the likelihood of an attack getting into your company. MSP's that provide assessments usually offer a staff awareness platform too. Staff benefits from vital cyber skills in their personal lives too.
You must perform a vulnerability assessment on all your devices, for example with Tenable Vulnerability Management. Then you must remedy the critical and high vulnerabilities.
Always evolving your technologies with security threats and trends is needed , similarly user awareness of security is a key . As an IT person with a limited budget of SMB organization they should opt for UTM (NGFW) , better endpoint with EDR,ATP and email security . An enterprise should be always ready for any targeted or rogue attacks hence a defence in layers is required , firewall, network layer ATP (sandboxing), Email with zero day attack intelligence, device controls, EDR and EPP , WAF for web servers and an honeypot to trap and known the threat vectors for their organization.
No matter what tool you used, we can't stop all the threats.
We need 360 degree visibility and need to categorise the risk factor and work continuously to improvise on enhancing security posture. There are end number of tools available depending on the risk factor
1) Awareness - educate people. People is the weakest link in security
2) Move your infra to cloud. Its cheaper and easier to protect.
3) Adapt Desktop-as-a-service for all employees. They can easily work anywhere using any of there own device or the company can just provide chromebook or tablet to access there workstation on the cloud.
4) Protect your cloud environment by adapting best practice suitable to your setup and size.
1. People buy - very important - it's not the technology adopted but the mindset and willingness of the people.
2. Choose your technology based on actual need and available budget.
3. Ensure that all possible exposure points are covered in your defense mechanism - laptops, server, firewalls, VPN - all are exposure points.
4. At the time of final design consider the threat landscape you are in and what all factors are contributory to it - your industry type and technology used, the endpoints involved, the type of people who are using these endpoints
The product and technology you finally choose AFTER you answer these basic questions will define your future defense mechanism as this will be the start point of your company's defense mechanism and its future evolution.
People are the weakest link in security so frequent awareness training is a must.
The top management needs to understand the implications of data/security breaches and also understand that they also need to comply with security policies. Form a TI team for detailed information on what threats are most likely to affect the organization/industry, and indicators to help prevent and detect more attacks.
Training & awareness to the insider, understand the risk involved and have mitigation plans.
The recommended tools are APT Patch Management tools and Content filtering.
There is no one-size-fits all. This is more of a knowledge and process challenge than a technology purchase gap, at least to start. Get in a security consultant for what ever amount of time your budget permits, and they can look at your business, risks and technology and set direction.
If your checkbook is burning a hole in your pocket, invest in security awareness training for your people, as hacking the human is the most common entry point for a problem. Back that up with relentless patching of operating systems and applications, coupled with locking down computers so people can't install whatever eye candy they browse to on the internet.
First of all, you need to know what you have inside your company, not only computers, but every device that is connected to the network, this will help you to identify where are the potential threats. There are products focused on making inventory of your network assets.
After that you can plan the best approach, based on your needs.
Surprisingly, the worst threats can come from places you don't even know they exist.