We aim to provide you with a round-up of our latest offers and essential info to help increase your productivity and keep you secure.
Re-launch of ’10 Steps to Cyber Security’
In association with CPNI, Cabinet Office and BIS, GCHQ is pleased to announce the re-issue of the highly successful ‘10 Steps to Cyber Security‘, offering updated guidance on the practical steps that organisations can take to improve the security of their networks and the information carried on them.
Following its successful launch in 2012, the highly acclaimed guidance has made a tangible difference in helping organisations large and small understand the key activities they should evaluate for cyber security risk management purposes.
10 Steps to Cyber Security Summary:
1. Information Risk Management Regime
Assess the risks to your organisation’s information assets with the same vigour as you would for legal, regulatory, financial or operational risk. To achieve this, embed an Information Risk Management Regime across your organisation, supported by the Board, senior managers and an empowered information assurance (IA) structure. Consider communicating your risk management policy across your organisation to ensure that employees, contractors and suppliers are aware of your organisation’s risk management boundaries.
2. Secure configuration
Introduce corporate policies and processes to develop secure baseline builds, and manage the configuration and use of your ICT systems. Remove or disable unnecessary functionality from ICT systems, and keep them patched against known vulnerabilities. Failing to do this will expose your business to threats and vulnerabilities, and increase risk to the confidentiality, integrity and availability of systems and information.
3. Network security
Connecting to untrusted networks (such as the Internet) can expose your organisation to cyber attacks. Follow recognised network design principles when configuring perimeter and internal network segments, and ensure all network devices are configured to the secure baseline build. Filter all traffic at the network perimeter so that only traffic required to support your business is allowed, and monitor traffic for unusual or malicious incoming and outgoing activity that could indicate an attack (or attempted attack).
4. Managing user privileges
All users of your ICT systems should only be provided with the user privileges that they need to do their job. Control the number of privileged accounts for roles such as system or database administrators, and ensure this type of account is not used for high risk or day-to-day user activities. Monitor user activity, particularly all access to sensitive information and privileged account actions (such as creating new user accounts, changes to user passwords and deletion of accounts and audit logs).
5. User education and awareness
Produce user security policies that describe acceptable and secure use of your organisation’s ICT systems. These should be formally acknowledged in employment terms and conditions. All users should receive regular training on the cyber risks they face as employees and individuals. Security related roles (such as system administrators, incident management team members and forensic investigators) will require specialist training.
6. Incident management
Establish an incident response and disaster recovery capability that addresses the full range of incidents that can occur. All incident management plans (including disaster recovery and business continuity) should be regularly tested. Your incident response team may need specialist training across a range of technical and non-technical areas. Report online crimes to the relevant law enforcement agency to help the UK build a clear view of the national threat and deliver an appropriate response.
7. Malware prevention
Produce policies that directly address the business processes (such as email, web browsing, removable media and personally owned devices) that are vulnerable to malware. Scan for malware across your organisation and protect all host and client machines with antivirus solutions that will actively scan for malware. All information supplied to or from your organisation should be scanned for malicious content.
Establish a monitoring strategy and develop supporting policies, taking into account previous security incidents and attacks, and your organisation’s incident management policies. Continuously monitor inbound and outbound network traffic to identify unusual activity or trends that could indicate attacks and the compromise of data. Monitor all ICT systems using Network and Host Intrusion Detection Systems (NIDS/HIDS) and Prevention Systems (NIPS/HIDS).
9. Removable media controls
Produce removable media policies that control the use of removable media for the import and export of information. Where the use of removable media is unavoidable, limit the types of media that can be used together with the users, systems, and types of information that can be transferred. Scan all media for malware using a standalone media scanner before any data is imported into your organisation’s system.
10. Home and mobile working
Apply the secure baseline build to all types of mobile device used. Protect data-at-rest using encryption (if the device supports it) and protect data-in-transit using an appropriately configured Virtual Private Network (VPN).
‘10 Steps to Cyber Security’ has been updated to ensure its continuing relevance in the climate of an ever growing cyber threat. It now highlights the new cyber security schemes and services that have been set up more recently under the National Cyber Security Programme (NCSP).
Gartner Magic Quadrant for Secure Email Gateways
From the Report: “The secure email gateway market is fractured between providers of basic protection delivered by embedded functionality from incumbent email, firewall, or endpoint protection solutions; and vendors that focus on the state of the art in advanced attack and information protection.
Secure email gateways (SEGs) provide basic message transfer agent functions; inbound filtering of spam, phishing, malicious and marketing emails; and outbound data loss prevention and email encryption.
The SEG market is mature. The penetration rate of commercial SEG solutions is close to 100% of enterprises. Buyers are becoming more price-sensitive; 80% of recently surveyed reference customers said that price was important or very important in their next SEG purchase (see Note 1). The market growth rate has leveled off, and there are no significant market entrants or acquisitions — all classic signs of a mature market.
Despite the market maturity, companies can’t do without SEG solutions. Global spam volumes declined slightly again in 20131 as spammers moved to other mediums, such as social networks, but spam still represents as much as 66% of email. Phishing and malware attachments also declined slightly in 2013; however, there is ample evidence that email is the preferred channel to launch advanced targeted attacks…”
Please email Infosec Cloud to request your Gartner Magic Quadrant for Secure Email Gateways 2014 report, courtesy of Proofpoint.
Mobile Malware: A New Look at Old Threats
BLUE COAT SYSTEMS 2014 MOBILE MALWARE REPORT
The explosion of mobile devices means that there are now 1.5 billion new ways to steal data, passwords, or money.
In this report you will discover what has replaced pornography as the leading mobile threat. You’ll get fresh insights into other new tricks cybercriminals have perpetrated as well as learn more about:
* Today’s most prolific mobile threats
* The stages of a mobile attack
* How user behavior drives mobile threats
* What directs users to mobile malware
* Best practices for avoiding trouble
Click here to email Infosec Cloud to request your free copy of the report.
Office 365 offer:
13 months for the price of 12
Click here to see our pricing.
Our Office 365 offerings are exactly the same as those found on the Microsoft website and hosted in the same Microsoft data centres – but with 4 major benefits – making Infosec Cloud the number one choice to purchase Office 365.
We offer flexible, discounted prices, free migration and full ongoing support.
Smartphones as Security Keys
Shetland Islands Council contacted IT service provider Infosec Cloud to research cost-effective, proven 2FA solutions with straightforward and flexible logins.
Infosec Cloud recommended SecurAccess, as this has the advantage that users do not need to use costly and cumbersome additional tokens for two-factor authentication. The developer of the software, SecurEnvoy, makes use of something that virtually everyone already has with them – the smartphone – instead of supplying additional physical tokens.
SecurAccess allows users to receive dynamically generated passcodes, for example via SMS, which they then enter in addition to a username and password in order to authenticate themselves
“We needed a solution that was quick to implement, easy to use and would become part of the day to day login process of our staff. Taking a tokenless approach has saved us money and means we do not have to manage a physical token inventory. “
Michael Marriott, ICT Team Leader
For more information or impartial advice, please
email: [email protected] or call 01256 379970