{"id":48644,"date":"2023-11-15T07:38:00","date_gmt":"2023-11-15T12:38:00","guid":{"rendered":"https:\/\/centricconsulting.com\/?p=48644"},"modified":"2024-04-24T16:22:43","modified_gmt":"2024-04-24T20:22:43","slug":"how-to-build-an-effective-cybersecurity-program","status":"publish","type":"post","link":"https:\/\/centricconsulting.com\/blog\/how-to-build-an-effective-cybersecurity-program\/","title":{"rendered":"How to Build an Effective Cybersecurity Program"},"content":{"rendered":"

In this blog, we share what to consider when building your business’s cybersecurity program using real-world analogies.<\/h2>\n
\n

Building an effective cybersecurity program presents challenges to businesses of all sizes. Whether you are a 25-employee manufacturer or a Fortune 50 global business, the concepts of cybersecurity do not change<\/a>. Of course, the larger you are, the more employees and financial resources your organization requires, but the basic concepts of developing and maintaining an effective program remain the same. Establish your perimeter, train your people, and protect your data.\u00a0<\/strong><\/p>\n

In this short blog, I\u2019ll break down cyber fundamentals into useable, real-world analogies.<\/p>\n

Build a Perimeter<\/h2>\n

What many consider to be effective cybersecurity<\/a> is merely perimeter defense, like a gated fence that surrounds your backyard, or a garage door secured shut with a code. Modern firewalls, routers, switches, and monitoring devices are absolute necessities, but they are only the first line of defense – not your entire cybersecurity program.<\/p>\n

Treat your security perimeter the same way you would your home \u2013 in other words, even if your gate is shut, you still need to lock your doors.<\/p>\n

Understand Your Data<\/h2>\n

Think of your most sensitive data<\/a> the way you would a piece of jewelry, birth certificate, or emergency stash of cash you keep on hand. These are not items you throw in your nightstand because you lock your doors at night. They are precious belongings that warrant an extra layer of protection, like placing them in a small fireproof safe.<\/p>\n

Conversely, you wouldn\u2019t store a grocery list or a library card in your personal safe. These everyday items not only lack the need for special protection, but they would also occupy valuable space you could use to store genuinely important belongings.<\/strong><\/p>\n

Whether you\u2019re an engineering-based company, a healthcare system, or a financial conglomerate, treat your business assets the same way you would your personal valuables. Take the time to understand where your most sensitive data lives (the key word here: sensitive) and apply the appropriate pressure to protect it.<\/p>\n

Control Access to That Data<\/h2>\n

You wouldn\u2019t give your garage door code or front door key to just anyone, would you? Similarly, if you fired a contractor who was working on your home repairs, you wouldn\u2019t let him or her keep your house keys, would you?<\/p>\n

Once you understand where your sensitive data is, gain an understanding of who has access to that data<\/a> and why.<\/strong> Controlling and monitoring access to systems can be a daunting task, especially if done manually. Providing access to sensitive data in accordance with the principle of least privilege will help to keep your data secure and will prevent the introduction of unnecessary risk.<\/p>\n

Train Your People<\/h2>\n

As most of us know, the one thing you cannot always control is your people. Even well-trained staff can fall victim to social engineering attacks or introduce unnecessary risk to your organization unintentionally. Training your most essential assets, your people, has become easier over the past several years because of cost-effective virtual learning solutions. Training programs are the most effective way to reduce the cyber risk introduced by your employee base.<\/p>\n

As Brian Krebs once said, \u201cSomeone recently asked me how I defined security. I really had to think about that. Fundamentally, it seems to be about making it easier for users to do the right thing [and] harder for them to do the wrong thing.\u201d<\/strong><\/p>\n

Provide Assurance that You’re Protecting Data<\/h2>\n

Once your controls are functioning properly, work independently or with a partner to provide assurance. We commonly see businesses begin their cyber journey by developing the proper program, but when they perform an assurance check, their procedures are not functioning as intended.<\/p>\n

Get in a position where you document your controls and procedures, understand which of those controls are most critical, and put those controls into a periodic testing cycle.<\/strong> This will create peace of mind as well as cyber and process assurance for your leadership team.<\/p>\n

Also, don\u2019t collect data to collect data. Only store and transmit data of relevance and cleanse what\u2019s not important<\/a>. Purging like this will help keep things clean. In other words, double-check your locks before you go to bed.<\/p>\n

There are many areas of cybersecurity that support these core fundamentals (asset management, incident response, patch management, and vendor risk, to name a few). Understanding them is critical to understanding how to build an effective cybersecurity program. For more information on the pillars of cybersecurity, we suggest reviewing the Critical Security Controls<\/a> or the NIST Cybersecurity Framework<\/a>.<\/p>\n

\n

\n
\n Wonder what a cyber attacker sees when they target your organization? Wonder no more. Watch a live network attack demo simulated by an industry-leading offensive security expert. In our on-demand webinar, you\u2019ll learn how to uncover vulnerabilities that the average pen test misses. \n <\/div>\n
\n \n\n WATCH WEBINAR\n <\/a>\n <\/div>\n <\/div>\n","protected":false},"excerpt":{"rendered":"

For businesses of all sizes, the basics of building an effective cybersecurity program remain the same: protecting data and training people.<\/p>\n","protected":false},"author":467,"featured_media":48650,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[1],"tags":[23785],"coauthors":[23791],"class_list":["post-48644","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-cybersecurity","resource-categories-blogs","orbitmedia_post_topic-cybersecurity"],"acf":[],"publishpress_future_action":{"enabled":false,"date":"2024-09-15 13:32:22","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category"},"_links":{"self":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/48644"}],"collection":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/users\/467"}],"replies":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/comments?post=48644"}],"version-history":[{"count":4,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/48644\/revisions"}],"predecessor-version":[{"id":51669,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/48644\/revisions\/51669"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media\/48650"}],"wp:attachment":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media?parent=48644"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/categories?post=48644"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/tags?post=48644"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/coauthors?post=48644"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}