Fall 2015 Issue of Horizons

Safeguard Your Data Data protection must be company-wide. Think about the various ways in which your company interacts with technology and data. Use these areas to develop policies, procedures and technology solutions. Each of the areas listed on the following page is part of a layered defense approach, so that if any one layer is compromised, the additional controls can still provide protection and detection capabilities. Physical Environment Safeguarding your data begins with a secure physical environment. Restrict access to physical areas with sensitive information and monitor who accesses the area. Maintain secure destruction of paper and media, including PC drives, USB drives, servers, copiers, scanners, etc.

Technology Infrastructure Understand your inventory of hardware, software, and applications so you can recognize something out of the ordinary. Implement web content filtering and automated “threat intelligence” feeds to block outbound access to known malicious sites. Install and update antivirus and anti-malware protection regularly. Decide who receives mobile devices and set up protocols for how and when they are used. Consistently monitor for malicious or abnormal behavior across the network, applications, and end- user workstations. Finally, establish solid perimeter controls, including firewalls and intrusion detection/prevention programs which include regular review.

Cyber Security Health Check The areas listed below are covered in the “The Critical Security Controls for Effective Cyber Defense, Version 5” found at www.RubinBrown.com/CriticalControls and include aspects of the National Institute of Standards & Technology (NIST) Framework for Improving Critical Infrastructure Cybersecurity, International Organization for Standardization (ISO) 27000 series, and can be linked to other standards as well.

Data Retention & Secure Destruction

Access & Authentication Controls

Change Management

Data Security

End-Point Protection

Information Security Policies

IT Risk Assessment Process

Logging, Auditing & Monitoring Mobile Devices

Network Architecture, Design & Implementation

Password Management

Patch Management

Perimeter & Network Segmentation

Recovery, Response & Continuity Plans

Remote Access & Authentication Controls

Third Party Security & Cloud Usage

Vulnerability Management

Wireless Security

www.RubinBrown.com | page 19

Made with FlippingBook - Online catalogs