I gave a talk today at the Council of New Jersey Grantmakersโ virtual conference.ย I spoke about risk assessmentsโwhat they are, why theyโreย important, how to conduct themโbutย not surprisingly people asked all kinds of questions about other security topicsย as well.ย Since these might beย securityย questionsย youโveย thought about, I wanted toย answer them in this post.ย Letโsย start with the security question that someone asked before the talk started.ย
Do We Need Cyber Insurance?ย
Weย donโtย get asked this security question that often.ย Thatโsย because a CFO (not an IT Director) is making the decision. Today, most people will tell you that yes, you do need toย purchaseย cyber insurance. Why? There are two main reasons.ย
- It will save you money. Like other kinds of disasters, a breach of your network will cost a lot to fix. In fact, many small businesses go out of business within six months of aย breach. Whenย youโveย been breached, thereโs work to do to find and fix the breach, restore data,ย sendย out a communication and verify thatย the network is clean.ย
- Buying cyber insurance will force your organization to adopt a cybersecurity program.ย Cyber insurersย wonโtย write a policy for you if theyย donโtย see evidence thatย youโreย trying toย maintainย some defenses. Purchasing cyber insurance can kick-start a campaign to implement security measures.ย
Are Cloud Providers Secure?ย
As I talked about relying on a cloud services provider (such as Salesforce,ย Microsoft,ย or Google),ย the moderator stopped me to ask this security question: are cloud providers secure?ย
The short answer is, yes, cloud providers are secure.ย Thatโsย certainly the case with the major service and platform providers. These providers have a strong incentive toย comply withย various security standards. Without such compliance, cloud providersย couldnโtย sell to government,ย military,ย and educational organizations.ย ย
There is some variety among cloud providers. Someย comply withย more regulatory guidelines and standards than others. We recommend that you check to see if the cloud provider you use (or are thinking of using)ย followsย the standards relevant to your organization. Even if your organizationย isnโtย subject to any regulatory standards, you still want to know if the cloud providerย complies withย a standard that sets a high bar.ย ISO 27001 and FIPS 140-2 are two examples of strong standards.ย
Here are links to sites describing compliance to regulatory standards for a few of the larger cloud providers.ย
Make Sureย Youโreย Using โEnterprise-Gradeโ Servicesย
Thisย wasnโtย a security question anyone asked, but it is a point worthย noting.ย We worked with a customer recently where usersย had set up Google Drive accounts that they used for sharing documents with partner organizations. Unfortunately, they had subscribed to the free, โconsumer-gradeโ Google Drive accounts, which offer little in the way of sharing controls. I could tell you comparable storiesย around Box, Dropbox,ย OneDrive,ย and other services.ย Each of these services have โconsumerโ and โenterpriseโ flavors.ย
Itโsย not that the data centers running these โconsumerโ services are any less secure than for the โenterprise-gradeโ versions of the same services. The problem is that the โconsumerโ versions typically offer more controlย to the user, less (if any) auditing, and fewer administrative controls. So, a good security question for you to ask is, โare we using the enterprise version of this service?โย
MiFi Hotspot Security Risksย
As I talked about home Wi-Fi network security, one audience member asked a security question about MiFi (cellular) hotspot security. She said that she works in a remote area, where cellular data service is the onlyย choiceย for connecting toย the Internet.ย
I told her that the same security principles apply.ย
- Like home routers, MiFiย devices may have an administrative interface. It might be through an app or it might be through the smartphone itself. Regardless, you want to change the name and password for the admin account.ย Otherwise, someone could discover your MiFi device on the Internet and take it over.ย
- You also want to password-protect access to the MiFi network. Password protection isย probably onย byย default butย turn it on ifย thatโsย not the case.ย
Should I Use an Encryption Tool Other Than the One Microsoft Provides?ย
Answering this security question is a littleย tricky becauseย encryption happens in different places. Weย talkย about encryption โat restโ and โin transit.โย Encryption โat restโ refers to encrypting a storage device, while encryption โin transitโ refers to encrypting data whileย itโsย being transmitted or received.ย
In either case, the tools that Microsoft or another cloud provider uses are fine.ย Theyโreย based on the same encryption standards (e.g., AES-256)ย that other tools would use, and are robust.ย
The other approach to this security question is to talk about use of a VPN, or Virtual Private Network. A VPN creates a secure, encrypted โtunnelโ between the device and the network, so that snooping or intercepting data being transmitted would not be valuable. VPNโs were common when most applications and dataย residedย on an organizationโs own network.ย
The challenge with VPNโs is that they are cumbersome to use. They insert overhead into the data transmission, which canย be a problem in some situations. Also, most websites now use SSL (Secure Socket Layer) encryption, whichย endsย the need for a separate VPN application.ย
Do I Need Penetration Testing?ย
When I heard this security question my first thought was, โwho planted the shill in the audience?โย (Did I mention we offer penetration testing?) The answer is yes, you need penetration testing as part ofย yourย cybersecurity program.ย
Penetration testing uses a tool to examine the elements of your network andย figure outย if any software vulnerabilities exists. You can run penetration testing behind or in front of your networkย firewall. And you canย go beyond this testing to see if any potential vulnerabilities can be exploited. You can read more about penetration testing here.ย
We recommend that you conduct penetration testing at least one a year.ย
Thatโsย a Wrapย
I thought this was a great security discussion.ย I heard lots of good security questions from aย non-IT audience. Plus, the house cleaners didnโtย arrive until after the session wasย over,ย so Iย didnโtย have to contend with noise management on my end. Yes, COVID-19 has changed the thingsย weโreย thankful for.ย




0 Comments