Our last blog examined the need for Endpoint Security, and some of the best practices that are involved. In this blog, we continue with that theme.
The Best Practices – Continued
- Disable any Ports that are not in use:
Although this sounds like an obvious task that should be done, but very often, this goes overlooked. Many organizations leave their Network Ports wide open, thus leaving an extremely easy point of entry for the Cyberattacker. It is highly advised that your IT Security staff should check for any open ports that are not being used on a weekly basis. If any are discovered, they should be closed off immediately. Of course, if there are any Network Ports that are open and being used, they must be secured as well, especially at the endpoints. This is critical for wireless devices, especially where Bluetooth is being used.
2. Make use of Multi Factor Authentication:
Many Cybersecurity experts advocate the use of Two Factor Authentication (2FA), but even this is not proving to provide adequate levels of Security. Therefore, it is recommended that more than two layers of authentication should be implemented, especially at your endpoints. Perhaps consider implementing at least three to four layers of authentication, one of them which should be making use of Biometric Technology. This can guarantee much higher levels accuracy when confirming the identity of an individual.
3. Implement the “Zero Trust Model” established by Forrester:
The traditional Security models basically state the following:
“The fundamental problem in network security is the broken trust model where Cybersecurity pros, by default, trust the users and traffic inside their network, and assume that all those external to the network are untrusted.”
In other words, you can implicitly trust the objects and daily interactions within your IT Infrastructure, but not outside of it. But with the Zero Trust Model, you there is absolutely no level of trust whatsoever, internal of external. Generally speaking, this can be implemented onto your endpoints with these five steps:
- Identify and classify your sensitive information;
- Map the data flows that are coming to it and leaving it;
- Craft and implement your own unique Zero Trust Model to fit these particular data flows;
- Establish an automated rule-based system that will trigger the appropriate alerts and warnings;
- Keep monitoring the Zero Trust Model ecosystem on a daily basis.
4. Make sure that your Endpoints are well protected:
This means that you have implemented the right mixture of Security Technologies, primarily those of Firewalls and Routers. But the cardinal rule here is that do not simply use the default settings that have been set up by the Vendor and assume that they will provide the adequate levels of Security. These settings must be set up and established that are dictated by specific Security needs of your organization. Also keep in mind that many Network Infrastructures are remain static in nature unless there is a specific reason to change them. Because of this, make sure that your Virtual Private Network (VPN) stays up to date and secure, especially when it comes to your employees accessing the endpoints through this.
5. Make use of the Office 365 “Secure Score”:
Many businesses and corporations are now heavily dependent upon the tools and applications that reside within Office 365; and as a result, this has become a prime target for the Cyberattacker. Microsoft provides a specialized tool called the “Secure Score”, which is made available exclusively to the Network Administrator. With this, all of the Office 365 packages that are being used in your organization are closely scrutinized, such as the daily activities of your employees, and all of the relevant Security settings. Once this task has been accomplished, you get a score (this is very similar to that of receiving a Credit Score). The higher it is, the more secure your Office 365 environment is, the lower it is, the less secure it is. All of this means that you need to tweak and adjust the settings and configurations of the Office 365 portals that fit the Security needs of your organization.
Overall, this series of blogs has examined some of the best practices that you should implement in order to keep your endpoints more secure. It is important to keep in mind that this not an all-inclusive list, and whatever Security practices you have implemented must be checked and updated on a regular basis in order to keep up with the ever-changing Cybersecurity landscape.