When approaching improvements to your organisation's security posture, knowing where to begin can be overwhelming — particularly when you have a complex set of user requirements, service level agreements, and then you are presented with complicated post-security test reports.
This difficulty, coupled with resource challenges and the wealth of advice available to businesses on every security subject, can make it significantly harder to know what security risks to prioritise which can result in basic issues not receiving the attention they need.
Even if you don't have a security improvement plan in place, it's important to take a structured approach to remediating security issues. Doing this gives you the space to contextualise and prioritise, plan, and execute high-quality improvements that can significantly strengthen your security posture.
Taking a step back
Whether you've received recommendations following a cyber security assessment or want to proactively reduce your cyber risk, it's important to take a step back and prioritise what needs to be done to protect your business. Being proactive provides the necessary breathing space to map out the issues you or the assessment has identified, and most importantly, prioritise these.
While there will be a number of "sticking plaster" tactical fixes that can be implemented across your organisation, you should generally use these as method of reducing the current risk to an acceptable level, whilst you ensure that medium-term enhancements and long-term strategic priorities are not forgotten.
To make this process as straightforward as possible, bucket the issues identified through the cyber assessment in order of priority and identify the phases in which these issues should be addressed.
The short, medium, and long-term
What issues can you address now?
Quick fixes shouldn't need to involve complex change requests and should take a minimal number of days to plan, check and implement.
When prioritising these issues, it's important to think about how easy this issue could be to exploit and the impact on the network. However, it's also crucial that you don't forget to consider the compound risk. The outcomes of a red team or incident response are often dramatically higher in impact than a list of the issues would appear. The attack chain can be either broken, or at minimum monitored at key points, but this should be part of the immediate risk reduction.
What is needed to enhance your posture in the medium-term?
While medium-term enhancements should involve at high-level design and user acceptance testing, they should still be part of your company's rapid change programme. This may require you to decommission legacy systems and bring in new ones.
Other impactful changes could include implementing robust application whitelisting across endpoints or EDR implementation.
What strategic solutions will contribute to your future resilience?
Longer-term strategic decisions will require new design, hardware, and software — this will take some time to design and implement, given the complex changes and interdependencies involved.
Too often, cyber security is applied too late in the development cycle of systems or applications, and in some cases, isn't applied at all during the organic growth of an enterprise estate.
Unpicking the interdependencies and designing a new system as part of a longer-term strategic security improvement is an ideal opportunity to change this. When you make security a consideration from the start, you're preventing it from becoming a blocker in the future.
Moving forward
Taking ownership
All of this can only be achieved when buy-in is secured across the board — without full understanding and commitment, whoever is responsible for driving the security strategy forward will struggle to make any tangible improvements. This is where having a clear improvement plan in place is critical.
Applying the fundamentals of security
Despite end-user awareness and security education improving over the last few years, many businesses still fall into the trap of forgetting how effective the basics can be.
Multi-factor authentication on your internet facing resources is a must. Too often we see poor quality and reused passwords being the trigger for catastrophic breaches. Internal systems should have the same rigour applied to them as those on the obvious frontline.
These fundamentals are even more important as the future of work continues to evolve. Earlier this year, we published a piece on the eight security fundamentals that all organisations, working remotely or not, should work towards.
The National Cyber Security Centre (NCSC) also has a range of resources available for organisations, including advice on how to achieve the best possible security across networks, systems, and information, as well as guidance for boards on how they can establish a baseline of security across their organisations.
The benefits
Having a defined security strategy that breaks down the quick fixes, medium and long-term issues is crucial to improving your security posture via rapid risk reduction transitioning into strategic improvement.
By understanding your existing security challenges and risk profile, developing, implementing and measuring a structured improvement plan and upskilling your team to defend and monitor your network in the long term, you can make reducing cyber risk a much easier process.
Doing research on how to improve your security posture?
Download this article as a PDF to share or save for later, or reach out to an expert to find out which options are the best fit for your organisation.