Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Practical Cybersecurity Cheat Sheet

Why You Should Care about Cybersecurity


Cybersecurity is regrettably easy to ignore—until it’s too late. Once an incident occurs, costs are baked in;
there’s no way to put the genie back in the bottle. The right time to prepare is before an incident occurs.

$8
How much do breaches cost businesses? How much cybercrime?

$9.4
In 2022, the average cost of a data breach in the

noillirt
United States was $9.44m. (Ponemon and IBM)
In recent years, the cost of a data breach has continued
to increase, with no reprieve in sight. As companies
continue to take more and more work online, this trend
million (USD) will likely continue.

$5.6
In 2022, the average cost of a data breach in Canada
was $5.64m USD. (Ponemon and IBM)
Companies in every nation around the world are being
similarly affected. As a company, you’re facing figures like Projected global 2023 cybercrime
these if you do not make cybersecurity a long-term damage. (CyberSecurity Ventures)
million (USD) company focus item.
▶ ~20x global illicit drug revenue (UN)
▶ Nearly half of European Union GDP

Six Practical Steps to Stay Secure


Fortunately, you can achieve a significant security upgrade just by engaging in a number of best practices
that impose minimal new costs. How do you or your business score on this checklist?

Fix Passwords Adopt 2FA/MFA Make Backups


Keep all of your data securely backed
up at all times, so that if the worst
******_ 213 449 happens your data is safe.
✓ Rely on daily automation.

Backups should not be manual or left to


manual or ad-hoc processes that can
✓ Use strong passwords. ✓ Enable 2FA/MFA everywhere. miss data or be forgotten.
They should be long, unpredictable, and Use mobile authenticator apps or
unique for each login. YubiKey—on every login you have. ✓ Consider cloud services.
Cloud storage, applications, and
✓ Get a password manager. ✗ Avoid unless no other choice: backups are significantly safer and
If you can remember all your Email-based 2FA, which is inherently easier to manage than costly and fragile
passwords, they’re not good enough. insecure. onsite backups.

Stop Account Sharing Run Updates Limit Admin Access


Make sure that no “shared” accounts Keep your hardware and software up- Ensure that there is only one user with
are in use. Every user should have his to-date at all times. administrative access in any multi-user
or her own login and password. accounts.
✓ Implement a process.
✗ Don’t cheat. Create a process or calendar item for ✓ Use regular accounts if possible.
Storing accounts in a password assets that need manual checks. Even for services with only one user,
manager, then using it to enable many create separate “admin” and “daily use”
users to “securely” share an account ✗ No EOL software/hardware. accounts when possible, then use
isn’t actually secure. Retire assets when updates end. admin only for admin tasks.

Copyright © 2023 Plurilock Security Inc. May be redistributed freely in unmodified form only. Visit us at plurilock.com
Practical Cybersecurity Cheat Sheet

How to Respond to an Incident


1. Insurance 3. Law Enforcement 5. Preserve Evidence
It is likely that your policy imposes If recommended by legal, notify law Think “evidence” from day one so that
particular notification requirements. enforcement and/or intelligence as it’s required by insurance, legal, or
Be sure to adhere to them. agencies. law enforcement, it’s available.
✓ Understand requirements. ✓ Do involve legal. ✗ Don’t rush.
Know who should be notified and what Rely on legal guidance for agency or Remediate rapidly, but not so rapidly
must accompany your notification. agencies to notify and how to notify. that forensic data is destroyed.
✓ Notify promptly. ✗ Don’t expect miracles.
Most policies require timely or prompt Law enforcement’s role is to prevent 6. DFIR Specialist
notification. future crimes, not to improve your
current situation. Either engage a digital forensics and
incident response (DFIR) specialist or
2. Legal appoint an internal investigation and
4. Notifications remediation stakeholder.
Begin communication with your legal
team or representation about the Under guidance from legal, make any
incident immediately. notifications to third parties or to the 7. Negotiation Specialist
public that you’re required to make.
✓ Be transparent. If you have been the victim of a
Do your best to answer questions and ✓ Do involve legal. ransomware attack, consider engaging
provide information requested. Rely on legal guidance for who to a boutique specialist in ransomware
notify. negotiaton.
✓ Follow recommendations.
To avoid making a bad situation worse, ✗ Don’t head straight to social. ✗ Don’t immediately pay.
carefully adhere to legal Public notifications may be required, Your best chance to retrieve data is
recommendations. but plan carefully—don’t “live tweet” with a specialist, not in acquiescing
the incident on Twitter. right away to ransom terms.

Security Rollout Sequence


A. Identity Protection C. Governance Training E. Endopoint Protection
Identity is the foundation of Identity solutions are only as good as Deploy detection and response—EDR,
cybersecurity; no other strategy your users’ dedicated use of them. XDR, or MDR—for endpoint safety.
matters if identity is insecure.
✓ Provide reasons. ✗ Don’t allow unsafe endpoints.
✓ Implement password security. Users are more likely to comply if they Ensure that every endpoint is
Use or require strong passwords and a understand the reasons for doing so. protected; do not allow work on
password manager. unprotected systems.
✗ Don’t accept shadow IT.
✓ Deploy multi-factor. Ensure that users understand that ✓ Consider a managed service.
Deploy a secure 2FA/MFA soltuion like creating new accounts outside of this A managed service is more effective if
authentictor app(s) or YubiKey(s). framework is forbidden. you don’t have a security team.

B. Governance D. Email Security F. Network Security


After passwords and 2FA/MFA, Implement email security to ensure Deploy, configure, and mandate
implement identity and data that employee email interactions and firewall and VPN solutions.
governance. behavior don’t eventually lead to an
incident. ✗ Don’t allow off-VPN work.
✓ Centralize identity. Limiting work to only VPN endpoints
Manage identities from a central ✓ Deploy a dedicated platform. provides an additional, robust layer of
providerlike Azure AD; deploy a single Deploy an email security platform like network security.
sign-on solution like Plurilock AI. Proofpoint to scan incoming email for
malicious code, URLs, or attacks. ✗ Don’t start here.
✓ Prevent data loss. Having or installing “a firewall” does
Deploy a data loss prevention (DLP) ✓ Hold phishing workshops. not provide you with “enough security”
solution like Plurilock AI to ensure that Ensure that your users understand to skip all the preceding items in this
sensitive data isn’t shared. how to avoid getting phished. list.

Copyright © 2023 Plurilock Security Inc. May be redistributed freely in unmodified form only. Visit us at plurilock.com

You might also like