MAIN MENU
Devolutions Blog

Announcements, updates, and insights from Devolutions.

Security
Cyber Security Quick Wins

5 Cybersecurity Quick Wins

One of the defining features of cybersecurity is that it is an ongoing (read: endless) commitment vs. a one-time event. Despite this, many IT security professionals are under extreme pressure to produ...

Photo of Max Trottier Max Trottier

One of the defining features of cybersecurity is that it is an ongoing (read: endless) commitment vs. a one-time event. Despite this, many IT security professionals are under extreme pressure to produce some “quick wins” and prove that investments and resources are being put to good use.

If you are facing this scenario, or if you need to dramatically improve your organization’s cybersecurity posture in a relatively short period of time, here are 5 quick-win suggestions that yield near-term, high-impact results:

1. Implement Two-Factor Authentication (2FA)

Compromised credentials are commonly used to log into client networks through remote access systems, such as VDI, VPN, Web Access, Outlook, and so on. And because the activity seems normal, threat detection alarms fail to go off.

Implementing 2FA – which combines something users know (username + password) with something they have (device) or something they are (biometric) – adds a vital additional layer of authentication. Granted, 2FA is not bulletproof. However, it is a step in the right direction, and depending on the number of users in your organization, it can be implemented within hours or days.

Learn More: For our comparative review of the most popular 2FA solutions (now updated with FreeOTP, Authenticator Plus, and SoundLogin), click here.

2. Establish a Strong Password Policy

Weak passwords continue to be the number one security risk. That’s where establishing a strong password policy can make the difference between a costly hack and staying out of harm’s way. Here are several best practices:

Learn More: For more advice on all of the password management best practices highlighted above, click here.

3. Implement Privileged Access Management

Mismanaging access to privileged accounts is something that 65% of organizations are guilty of doing, which can lead to security breaches, regulatory penalties, customer churn, lawsuits and lasting reputation damage. In some cases, it can even lead to extinction: a study by the National Cyber Security Alliance found that 60% of SMBs go out of business within six months of being victimized by a major cyber attack. Here are a few best practices for implementing a robust PAM system to consider:

Learn More: For more advice on all of the PAM best practices highlighted above, click here.

4. Create a Culture of Security Awareness

As noted above, implementing a strong password policy is critical to ensuring that users are part of the solution instead of the problem. However, it is important to go further by educating them — through presentations, videos, emails, or any other suitable methods — about risks such as email phishing and even online shopping. It is also wise to have users enroll in free online cyber security training so they grasp the fundamentals.

Learn More: For advice on how to educate your users and create a culture of security awareness, click here.

5. Implement Patch and Vulnerability Management

It is critical for all computer systems and mobile devices that interface with your business data to have the latest patches and updates. Here are the best practices in this area:

Learn More: For additional advice on all of these patch and vulnerability management best practices, click here.

Advice from Our CSO Martin Lemay:

Some of the controls presented in this paper might seem costly for some organizations. My advice is to prioritize your investment according to your risk profile. Threats are different from one organization to another. Quick wins presented in this article might not necessarily apply “as-is” to your organization. However, they tend to be common controls that offer the best cost-benefit ratio. Perform a risk assessment and invest in what you are actually trying to protect.

Looking Ahead

The cyber threat landscape is getting worse — not just because user and corporate data is becoming a more valuable commodity, but because hackers are using more sophisticated tools and tactics. These aren’t the script kiddies of old who were intent on destroying machines and wreaking havoc. Today’s hackers are motivated by money, and they are surprisingly well-organized and highly funded.

The 5 quick wins described above will help you clearly and measurably strengthen your organization’s cybersecurity in the near-term, so that you can minimize your chances of getting hacked, as you strive to stay a step or two ahead of the bad guys.

More from Security

Read more articles