Select Page

Three Must Have Security Policies In 2018

Three Must Have Security Policies In 2018

The nature of the Internet and worldwide connectivity has changed the traditional centuries old paradigm regarding proximity.  We now see threats from all parts of the global. What are three cybersecurity policies for a firm that would mitigate risks for cybersecurity attacks at the global level? Cybersecurity threats continue to rise year after year and the problem continues grow due to the global nature of attacks. Organizations must implement security policies in order to protect themselves against such threats. Below are three policies that would help organizations better defend against global threats.

Continuous Diagnostics and Mitigation

All organizations operating online need to have an effective monitoring plan in place that is continually reviewed and updated. The Department of Homeland Security publishes a comprehensive framework called Continuous Diagnostics and Mitigation (CDM) for the purpose of providing federal agencies tools to better monitor their own infrastructure. Organizations should adopt a similar program in order to effectively monitor and protect against global threats. CDM provides Federal Agencies with capabilities and tools and identify cybersecurity risks on an ongoing basis, prioritize these risks based on potential impacts, and enable cybersecurity personnel to mitigate the most significant problems first (“Continuous Diagnostics and Mitigation (CDM),” 2018).

Employee Awareness Security Training

In an article about the employee life cycle and identification of internal organizational threats, (Conrad, Duran, Conrad, Duggan, & Held, 2009) asserts that within an organization, the employee population is the source of potential malicious insiders. Organizations need to address this threat head on. Whether employees accidentally or deliberately cause a vulnerability that exposes the organization to increased risk, proper security training, policies and procedures need to be put in place. In addition to policy, proper roles based access control should be implemented and the least privilege principle should be adhered to in account management.

Restriction on non-company issued devices

Organizations need to provide policies and effective procedures that deal head on with the Bring Your Own Device (BYOD) trend that has increased in recent years. If organizations are going to allow employees to use their own device, steps must be taken to apply appropriate security hardening. Platforms such as Microsoft’s Company Portal can help with this, but ultimately the organization will need to maintain and uphold these restrictions. In recent years, jail breaking phones and devices to use unrestricted software has become popular. Unfortunately jail breaking or ‘rooting’ a device can often leave it vulnerable to malicious code or unintentional security vulnerabilities (“AhnLab Announces Mobile Security Threat Trends for 2012,” n.d.). These vulnerabilities could then be used to breach the corporate network.

AhnLab Announces Mobile Security Threat Trends for 2012. (n.d.). Retrieved February 11, 2018, from https://www.informazione.it/c/4FC30FB1-8A20-4ABB-979B-7FBA85ADB9EA/AhnLab-Announces-Mobile-Security-Threat-Trends-for-2012
Conrad, S., H., Duran, F., A., Conrad, G., N., Duggan, D., P., & Held, E., B. (2009). Modeling the Employee Life Cycle to Address Insider Threat. Presented at the Sandia National Laboratories (SNL-NM), Albuquerque, NM.
Continuous Diagnostics and Mitigation (CDM). (2018). Retrieved February 11, 2018, from https://www.dhs.gov/cdm

Image Credits: Photo by Denys Nevozhai on Unsplash.

Related Articles

About The Author

Ian Carnaghan

I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment. In my spare time I teach undergraduate classes in web development.

Leave a reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.