Your IT Department is NOT your Cybersecurity Team

Your IT Department is NOT your Cybersecurity Team

So, you’ve got yourself a head of IT and they can do it all! You hired the best of the best. They can manage your cloud infrastructure, setup and administer all your company laptops, secure your wired and wireless networks, and even figured out a way to get that ancient printer/copier onto the network for everyone to use. The corporate space has long heralded the prodigious “IT Person’ as the crown jewel of all things computer and technology. However, as technology has advanced, companies have started leveraging more and more of these incredible advancements. From fully cloud-based infrastructure and virtualization to advanced digital communications and collaboration tools, the venerable ‘IT Person’ has never had a plate so full. On top of all that, many of these companies have made the frankly naïve and ultimately costly mistake of handing cybersecurity responsibilities to that very same ‘IT Person’. 

Anyone in the cybersecurity space will tell you the same thing: cybersecurity may be IT, but IT is NOT necessarily cybersecurity. Having someone( or better yet a team of people) with specialized knowledge and focus is absolutely vital to survival in the sea of never-ending cyber threats. One of the best places to start is with a Security Engineer. The job of a Security Engineer is to be able to understand the organization as a whole, including its culture, technology, data assets and liabilities, and leverage that understanding to deeply integrate low friction, seamless security controls around information systems within the organization’s existing structure. The key here is the deep integration, and low friction. A proper engineer is able to provide what your ‘IT Person’ just doesn’t have the specialized skills to deliver. Anyone can set astronomically high password requirements, turn off permissions for important systems unless requested, and set up a messy and slow VPN connection that employees are required to use. But all of those things are perfect examples of high friction systems that lead to constant pushback from employees, and constant holes to plug as people find a way around these frustrating restrictions. A Security Engineer has the skills necessary to build systems that work WITH your organization and its structure to make your workflows more secure, while remaining as low friction as possible. This big picture approach will ultimately lead to better buy-in from employees, which in turn leads to dramatically more secure infrastructure. 

While a Security Engineer is a strong and effective role to fill, it is undoubtedly aspirational for most smaller organizations. It would be entirely unrealistic to say every company has a need or the resources to house an expensive employee focused solely on security. So what about everyone else? Enter the IT Security Specialist. You could reasonably think of this role as something along the lines of a Jr. Security Engineer. This is a role that strives to achieve many of the same goals as a Security Engineer, but perhaps with a few years less experience, and a few less certifications under their belt. However, there is one thing the IT Security Specialist has that makes it a fantastic role for most companies to start with: hands-on IT experience. The IT Security Specialist is designed to work side-by-side with your existing IT operations. By bringing specialized, security focused insights and strategies, as well as the ability to implement those strategies, you’re able to alleviate additional burden on the already famously thin-stretched IT department. This should bring a ‘security first’ mindset into the organization.

So we’ve covered the entry points of small and medium organizations, but say you’ve just signed a handful of your biggest clients yet, and have major expansions planned over the next few years. An IT Security Specialist isn’t going to cut it, and a Security Engineer or two seems nice, but some of these big partnerships have some massive security requirements, including high level management focused on protecting their data. What are you supposed to do? This is exactly where a CISO, or a Chief Information Security Officer, is designed to fit in. Most simply described as the head of all things security, you are committing to establishing an entire division of your organization to the quality, strength, and importance of data privacy and security. A CISO can report directly to the CEO, or to a separate CIO (Chief Information Officer); however, comparing the two roles is an entire conversation in and of itself. From developing and managing security programs like company wide training to implementing network monitoring systems and incident response teams, a CISO is the one responsible for making all these things happen without burdening the CEO or other key areas of the organization. This is a great way to show potential clients, partners, or even investors that you are deeply committed to your organization’s security infrastructure. This shows that they can trust you to take every precaution necessary to protect their data, as well as brand reputation from the devastating consequences of a data breach.

While there is no one-size-fits-all solution to cybersecurity infrastructure, one thing is abundantly clear for organizations of all sizes: your magical, wonderful, and altogether impressive ‘IT Person’ should not shoulder the burden of your cybersecurity infrastructure. With the incredible complexity in which modern organizations operate such as remote cloud infrastructure, nested virtualized networking, and fully digital, internet connected communication and data storage systems, IT has enough on their hands as it is. Specialization is what today’s cybersecurity programs demand. With a seemingly endless stream of new threats and the escalating consequences they bring with them, falling behind is not an option.

Is your business looking for a certified partner to assist your “IT Department”? CyberData Pros has many years of experience in IT, data privacy, and cybersecurity to make sure your business is secure. Contact us now for a free consultation and to learn more about our services.

read more

What is a Privacy Impact Assessment? Does My Business Need One?

Privacy is progressing across the US and it stops for no one – so what does it take to keep up? Well, as an increasing number of privacy regulations following the example of GDPR and CPRA arise, it naturally follows that more companies than ever are going to be newly bound to rigorous sets of privacy standards. In the interest of meeting those standards it’s crucial to have some standardized form of data system assessment to weed out privacy risks, which is exactly the role Privacy Impact Assessments (PIAs) fill. These assessments are thus primed to become an invaluable asset for organizations newly assessing privacy risk at the behest of legislation, as well as existing privacy-conscious organizations aiming to maintain their privacy posture – so it’s a great time to take a look at what a PIA is, whether or not you need one, and what one entails.

What it is

Essentially, a PIA is a tool that enables organizations to identify, categorize, and ultimately remediate privacy risks present in their data systems in accordance with relevant legislative standards. The objectives of these assessments are a few: to verify the data system’s privacy conformity with organizational and legal requirements, to determine the privacy risks present in the data system, and to evaluate solutions to mitigate identified risks. 

Who Needs it

Understanding what constitutes a PIA and its goals, a natural follow-up question would be who needs one. The necessity of one largely depends on the requirements of whatever regulations your business must abide by – different frameworks require these assessments at different stages of data handling. Odds are, however, that if you are bound to privacy legislation and handle customer Personally Identifiable Information (PII) you will at minimum be required to conduct a PIA when said data is newly processed or sold. Additionally, whenever significant changes/additions are made to the data system’s structure or its processes, then a PIA is typically highly-advised, if not required outright. 

Even past the explicitly-required cases, most any organization that handles PII should heavily consider conducting these assessments at least every three years. Remember that these assessments aren’t just a box to tick for compliance’s sake – they exist to help protect consumer information from undue exposure and thus protect the company who would be held liable. At its core, a PIA is a tool to mitigate risk and should be considered as such.

How it Works

So – if you decide upon conducting a PIA, what exactly does it involve? Generally, the assessment takes the form of both an analysis process and a report document. The process itself will vary again depending on the regulatory requirements an organization faces, but will typically include steps like the following:

  • An identification of the scope of the assessment along with the staff and stakeholders associated with in-scope systems
  • A categorization of data should take place, categorizing them according to their sensitivity 
  • A technical mapping of where and how information flows throughout its system: from acquisition to storage to transfer to use to disposal
  • An analysis and cataloging of privacy risks based on the data system’s state – take note to consider non-technical privacy impacts as well, an example being how easily communicable an otherwise safe process is to concerned consumers
  • A determination of whether or not the risk of holding different types of PII is proportional and reasonable to its business purpose
  • A consideration of mitigatory measures that could be taken to further protect the data system’s privacy as well as potential future data gathered

At the conclusion of the above steps a PIA report should be prepared documenting the results. The report should be easily interpreted and comprehensive of the steps and considerations taken – aid to this end can be found from online templates and/or privacy consultants. After the report’s completion, ensure that it’s published and sent where necessary by regulation. Ultimately, the PIA report is a living document. Ongoing reviews of the report should take place where there is any progress toward implementing the identified PIA recommendations or if any changes to the system are documented. 

With the PIA’s goals, use-case, and process in mind, hopefully you’re left with a clearer picture of these assessments going forward. Like many system assessments, the process can seem daunting at first, but with some practice it will become a tremendously helpful tool in your GRC toolbox, helping you adapt and thrive in our privacy-conscious future.

Need some help conducting your Privacy Impact Assessment? Let CyberData Pros carry one out for you, from scoping to publication. Contact us now for a free consultation and to learn more about our services.

read more

The Best Defense is a Good Offense

Within the realm of cybersecurity, there are a multitude of steps your organization can take to help better secure your infrastructure, network, and applications. While it might sound easy to go with an out-of-sight, out-of-mind approach, a particularly important component of a strong security posture involves digging to uncover weaknesses before they become a real security incident. Oftentimes discerning what these various tests, scans, and reports are in the first place can leave one confusingly scratching their head, let alone recognizing which option might be best suited for your business. Two of the more common techniques that often get lumped together are penetration testing and vulnerability scanning, but while there can be some overlap, it’s important to distinguish and understand the differences between the two. 

Both penetration testing and vulnerability scanning can be beneficial to an organization in their own way. Depending on a multitude of factors and circumstances, one might be chosen over the other, i.e. if there are budget limitations, or perhaps one is required by a standard, regulation, or contractual agreement. While on their own both options carry great value, the strongest results come from a combination of the two as both methodologies complement each other to form a comprehensive approach. To briefly define, vulnerability scanning is a process that uses automated tools to search for and identify known vulnerabilities across an organization’s devices, systems, and networks. Penetration testing, often referred to as ethical hacking, takes a more manual approach by attempting to actively exploit any weaknesses that exist, in order to simulate what damage could be done by a real attacker. 

Aside from the core definition, there are benefits and comparisons between the two that are important to discuss when you are considering implementing either or both options. When a vulnerability scan is completed, the results are generated into a report that identifies, categorizes, and scores each found vulnerability. Since there is no attempt to actively exploit, the purpose here is primarily informative. It requires manual analysis to sift through the false positives and carry out the remediation steps to mitigate the risks associated with the findings, prioritizing  the most critical findings first. Vulnerability scans are performed more frequently than penetration tests (ideally quarterly) and are useful to compare to previous scans to monitor progress. Due to their more lightweight nature, vulnerability scans are much quicker and cost-friendly than penetration tests. 

By contrast, as the goal of a penetration test is to think like the “bad guys”, they are significantly more detailed and thus require substantially more time and effort. Because of the thorough and in-depth nature, a penetration test takes days to weeks to complete. Naturally, the cost associated with a penetration test is higher than a vulnerability scan, but it’s worth noting that a retest is frequently included in the cost. Additionally, they do not need to be conducted as frequently as vulnerability scanning; annually is the most common interval. 

Pages could be written diving into the details of each, but the aim here is to give you a short synopsis and explanation of these often confused terms, and hopefully by doing so allow you to have a better understanding of the real world applications of each. Each carries its own value, but the best approach combines the advantages of both to take your company’s security strategy to the next level. 

Here at CyberData Pros, our team is proud to offer these services to our clients, and we encourage you to contact us to discuss how vulnerability scanning and penetration testing can help your ability to strengthen your company’s security. The best defense is a good offense.

read more