Data breaches are common. And preparing for and preventing them is one of the biggest issues facing organizations today. Not only are the number of cyberattacks increasing – in fact, two-thirds of companies that have suffered an attack are hit again within a year.
Most data breaches go undetected for a long time – over 200 days according to the latest statistics. And, the longer a breach goes undetected, the more harm it can do to your business.
What kinds of data are malicious actors looking for?
Cybercriminals launch most cyber attacks, especially those against commercial entities, for financial gain. These attacks often aim to steal sensitive data, such as customer credit card numbers or employee personal information, which the cybercriminals then use to access money or goods using the victims’ identities.
Important questions you should be asking yourself:
- What kinds of data do I have?
- Is it financial information of your customers or employees?
- Does the information give the attacker an ability to steal more?
- Is the information a corporate secret which could be used by your competitors?
The most common data targets that attackers go after include:
Proactive strategies for preventing a breach
Once you know what types of information are vulnerable, it’s time to protect yourself. While you can’t fully eliminate all risks of a breach, there are always ways to reduce the chance of one occurring – or occurring again.
Do a thorough vulnerability assessment
Organizations must do everything possible to protect critical assets. Between nation state actors, ransomware groups, and malicious actor cells, organizations are faced with more and more advanced attacks than ever before.
Proactively identifying and addressing vulnerabilities before they can be exploited and used in an attack is the key to prevention. Vulnerability management is the continuous process of identifying, classifying, prioritizing, remediating, and validating that security controls are effective in reducing the risk of an attack.
Your organization’s entire attack surface should be scanned to identify all your IP addresses, including external, internal (datacenters, corporate HQ, and satellite offices) and Cloud IPS like AWS, Azure, and Oracle. This will allow you to create an asset inventory along with a list of vulnerabilities associated with these assets. This list can be prioritized and sorted by severity level (CVSS score) as well as risk of exploitability so that remediation efforts can be initiated for the ones that pose the most risk to the organization.
Organizations should review their reported vulnerabilities on a monthly basis, preferably weekly or daily.
Subscribe to a risk assessment methodology
Risk assessments will help you understand the cybersecurity risks to your operations (i.e., mission, functions, image, or reputation), organizational assets, and individuals. In a number of circumstances, a risk assessment enables your organization to make informed business decisions by highlighting potential issues and revealing priorities for which areas to fortify first. Protecting your organization from adverse events like data breaches is a big reason why risk management is beneficial in cybersecurity.
Leverage threat intelligence
Every day new advisories, patches, and exploits are published by vulnerability databases, CISA advisories, and software vendors like Microsoft, VMware, Oracle and Adobe. A threat intelligence feed is a continuous stream of data related to current or potential security threats and offering information on various attacks.
With attackers becoming increasingly sophisticated, understanding the threat landscape allows organizations to identify and prioritize risks and implement the correct security controls to respond to threats. This threat intelligence can be used to investigate potential threats and the attack methods used by malicious actors.
Protect the data you collect
In business, data collection happens on many levels. IT systems regularly collect data on customers, employees, sales, and other aspects of business operations when transactions are processed and data is entered. Organizations also conduct surveys and track feedback from customers.
A data security threat can jeopardize the confidentiality, integrity, and availability of data. There are many security threats that organizations face daily – including malware, ransomware, phishing attacks, and social engineering.
To minimize threats, organizations should know exactly what type of data you have and to classify it into categories:
- Public information
- Confidential information
- Sensitive information
- Personal information
Sensitive data is often classified as confidential or secret. It includes:
- Personally identifiable information (PII)
- Protected health information (PHI)
- Electronic protected health information
- PCI data
- Intellectual property
Organizations should take care in establishing and enforcing policies and procedures governing its use, encrypting it, deploying security technologies including firewalls and antivirus protection, and by conducting vulnerability assessments to identify areas of risk for it being disclosed.
There will come a time when your data becomes outdated and is no longer in use. It is important to get rid of that data when this happens because it could still harm your users if it were to be breached. This includes physical copies of any information kept on paper.
Require two-factor authentication for all employee accounts
Multi-factor authentication (MFA) adds an extra layer of security on top of credentials like usernames and passwords. It provides greater certainty that a user is who they claim to be before granting them access to an application, online account, or corporate network.
Here are a few examples of each type of MFA:
- Knowledge-based factors include PINs, passwords, or the answers to security questions. Since this information is easy to lose or guess, it can be stolen by hackers through phishing and social engineering attacks.
- Possession-based factors include mobile phones, key fobs, and hardware authentication tokens. Since these store or receive login credentials, they are more secure than knowledge-based factors. For example, SMS authentication sends an MFA code or one-time password to a user’s mobile device.
- Biometric factors offer the highest level of assurance because they are unique to each user – fingerprints, facial recognition, and voice characteristics.
Even if bad actors manage to steal login credentials, MFA can stop them from gaining unauthorized access to accounts.
Establish security hygiene practices
Cybersecurity is everyone’s responsibility. With that in mind organizations and their employees should be aware of these cyber hygiene best practices:
Train your staff
One of the biggest challenges with data security is the human aspect. Nearly a quarter of data breaches are caused by humans. And this doesn’t account for insider threats or phishing attacks.
Training your employees on data security is vital to your security and can help prevent a data breach. Security awareness training will help employees identify major types of cybersecurity threats:
Have a breach/incident response plan
Assembling your team in advance of an incident allows all those involved to thoughtfully and thoroughly vet through team members to find the best qualified candidates for your needs. Depending on the size and nature of your organization, these may include representatives from legal, forensics, information security, information technology, operations, communications, and management.
Once the team is assembled, preparing and practicing your response plan will ensure each member understands their role and can work together as an effective team. Thorough preparation for a breach incident can lead to faster reaction, and lower costs should a breach occur.
Being proactive in preparing for a potential breach can help your organization reduce some of the enormous recovery costs associated with an attack. The fact that most businesses suffered repeated attacks suggests that vulnerability management should be a priority in preventing cyberattacks. Proper management of any vulnerabilities found can prevent bad actors from exploiting the same flaw many times.