MAIN MENU
Devolutions Blog

Announcements, updates, and insights from Devolutions.

News
Cybersecurity threats in smbs best practices devolutions blog

Cybersecurity Threats in SMBs + Best Practices on 5 Principles & Policies

Today, we continue this important discussion by highlighting five principles and policies that help SMBs significantly reduce cybersecurity risks, while increasing visibility, governance, and control.

Photo of Laurence Cadieux Laurence Cadieux

Last week, we began taking a closer look at the Devolutions State of IT Security in SMBs in 2022 Survey report (download the report here).

We highlighted some key cybersecurity trends and issues, such as that 67% of SMBs are more concerned about threats this year vs. last year. We also shared practical and effective recommendations to help SMBs develop a defense strategy that:

Today, we continue this important discussion by highlighting five principles and policies that help SMBs significantly reduce cybersecurity risks, while increasing visibility, governance, and control.

1. Principle of Least Privilege

Principle of Least Privilege (POLP) is when end users only get the access they need to carry out their day-to-day activities.

We recommend that SMBs adopt these best practices for implementing and enforcing POLP:

2. Zero Trust

Zero trust compliments POLP, and is rooted in the understanding that nobody is automatically trusted from the outset. Instead, access management is evaluated based on end user context, behavior and location vs. authentication secrets provided at login. For this reason, some might say that a better label for this policy (and one that is probably more agreeable to non-IT end users!) is “trust, but verify.”

While zero trust has been an important policy for many years, it has become even more crucial and relevant in today’s work-from-home (WFH) reality, which blurs the boundary between the corporate network and cloud usage.

We recommend that SMBs adopt these best practices for implementing and enforcing zero trust:

3. Segregation of Duties

Segregation of duties is based on the fundamental understanding that when two or more people are involved in a sensitive workflow, then there is a lower risk of misuse or manipulation than if a single individual carries out the activity.

We recommend that SMBs adopt these best practices for implementing and enforcing segregation of duties:

4. Defense-in-Depth

Defense-in-depth uses multiple layers of protection to slow hackers down, as they attempt to snake their way to the perimeter, and from there to mission-critical assets.

We recommend that SMBs adopt these best practices for implementing and enforcing defense-in-depth:

It is also extremely important for SMBs to monitor access and usage! Slowing a hacker down with multiple prevention controls is important, but it is not enough if unauthorized access or attempts to elevate are not monitored and detected.

5. Four-Eyes Principle

The four-eyes principle (sometimes referred to as the two-person principle/rule) requires that any activity by an employee that involves material risk must be reviewed and confirmed by a second employee who is independent and competent.

We recommend that SMBs adopt these best practices for implementing and enforcing the four-eyes principle:

Looking Ahead

In our next deep dive into the Devolutions State of IT Security in SMBs in 2022-23 Survey report, we will highlight key elements of a Privileged Access Management (PAM) solution to help SMBs bridge the gap between authentication and authorization.

More from News

Read more articles