MAIN MENU
Devolutions Blog

Announcements, updates, and insights from Devolutions.

Poll
March poll results spring cleaning devolutions blog

March poll results: What’s on your cybersecurity “spring cleaning” list?

MFA, backups, and account audits top this year’s cybersecurity spring cleaning list. See what other smart steps IT pros are taking to stay secure.

Photo of Steven Lafortune Steven Lafortune

Spring has sprung in our part of the world — well, at least as far as the calendar goes. Outside, it’s still pretty cold and cloudy. But not for long! Soon, the skies will clear, the sun will shine, flowers will bloom, and temperatures will soar. Good times.

Between now and then, many of us need to go through (or get dragged through) the annual ritual known as spring cleaning. And in the spirit of tidying up and getting organized, last month we asked: What’s on your cybersecurity spring cleaning list?

As we had hoped, there were many interesting responses. Let’s take a look at them below, starting with a focus on the three most popular cybersecurity tasks.

#1: Implement multi-factor authentication (MFA)

Implementing MFA was the most popular cybersecurity spring cleaning task. Most community members plan to establish MFA internally, while a few mentioned that they want to implement it for clients.

MFA is a necessary safeguard that should be implemented in all organizations, and enforced for all users. Research has found that enabling MFA can prevent 99% of automated hacking attacks.

While any kind of MFA is far better than no MFA at all, most experts recommend using authenticator apps, biometrics, or hardware devices instead of text message codes and security questions, as the latter are more vulnerable (yet still better than only using a password).

Devolutions can help with this pivotal cybersecurity spring cleaning effort:

#2: Review the backup process and test data

The second most popular cybersecurity spring cleaning task was about the thing that has rescued countless organizations from a fate too terrible to imagine: backups!

Specifically, many community members wisely want to analyze their backup process, in order to ensure that it’s efficient and effective. And just as prudently, they want to increase how often they test backup data (and the associated restoration process) for reliability and integrity. After all, backups that are corrupt, infected, incomplete, or outdated aren’t useful — they’re nightmares.

At Devolutions, we are extremely focused (OK, obsessed — but in a good way) about backups; both when it comes to our data, and helping our users achieve this critical objective. For example:

#3: Audit all accounts and align them with the principle of least privilege (POLP)

Rounding out the top three most popular cybersecurity spring cleaning tasks this year is another critical priority: auditing all user accounts — including old, unused, and forgotten ones — and verifying that each aligns with POLP. This is a policy in which users are given only the amount of access they need to carry out their jobs, and nothing more.

The importance of identifying and eliminating “privilege creep” cannot be overemphasized. Stolen credentials are the cause of 37% of breaches. What’s more, many organizations have two-to-three times more privileged accounts than actual employees, and 85% of privileged accounts are not accessed for months (and sometimes years) at a time.

Devolutions helps drive POLP in multiple ways:

Other tasks

Here are the rest of the important cybersecurity spring cleaning tasks that community members plan to take care of in the weeks and months ahead:

Spring cleaning is a state of mind

Let us wrap things up with some words of wisdom from community member Ron: “Let’s be honest, if you do the spring cleanup every year, you’re already way too late and running behind the facts. One should treat the spring cleanup as a daily routine.”

The winners are…

To start with, every community member who completes even one task on their cybersecurity spring cleaning list is a winner. Anything that reduces the size of the attack surface and makes the organization more secure is a step in the right direction. And remember, Devolutions is here to help — just ask!

Now, let’s reveal the two randomly selected poll participants who have each won a $25 Amazon gift card. Congratulations Brent Quick and p4sticcio! Please email asguerin@devolutions.net to claim your prize.

Stay tuned

A new poll is just around the corner. Stay tuned, and get ready to have some fun!

More from Poll

Read more articles