GFC team after bike 4k

Explore opportunities to join one of the country’s largest independent business technology providers!

CURRENT POSITIONS   BENEFITS

support_icon

Technical Support
Quick Help

SERVICE CALL

Toll Free: 800.333.5905

Corporate Headquarters:
2675 Research Park Drive
Madison, WI 53711

support_icon

Elevity Technical
Support

5 Steps to Better Cybersecurity For Businesses

David Eichkorn
12/13/2018
banner_curve
Too many businesses treat cyberattacks like an act of God or extreme weather – something that is potentially devastating but nothing you need to think about on a day-to-day basis. But a cybersecurity breach is not like a fire, storm or explosion; it is an ever-present threat that only needs the slightest window of opportunity to breach a network.

We prefer to think of cybersecurity not as an act of God, but as a law and order issue. And, just like law enforcement, your IT team needs to be able to patrol for threats, identify potential intruders, and deploy appropriate deterrents or countermeasures when a threat is detected. Or, as the National Institute of Standards and Technology puts it: Identify, Protect, Detect, Respond and Recover.

How do you secure a modern networked, digital business? It’s a straightforward process. Think of it like a plan of action or escalation of force used by police officers. The way to mitigate risk and respond to cyberthreats is the same as any other law enforcement issue — as a program of vigilance and a plan for force escalation in response to identified threats and activities. 

Law and Order on the Net

It’s easy to feel powerless and fearful, given that nameless, faceless criminals are probing your business for weaknesses. But the good news is that it’s possible to defend yourself. It’s not possible to eliminate cyberthreats entirely, but you can mitigate and control the exposures you may face. Thanks to the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF), cybersecurity is not a reactive, passive practice. It’s a process in which defenders continually monitor, assess and react to the threat environment and intelligently respond to threats and keep data secured with well-established best practices. 

According to Gartner, the NIST-CSF is used by approximately 30% of U.S. organizations and projected to reach 50% by 2020. Elevity has adopted the NIST framework, which is a set of activities, outcomes and references that provide detailed guidance for developing individual organizational profiles for cybersecurity. Through the framework, an organization can align and prioritize its cybersecurity activities with its business requirements, risk tolerances and resources.

Identify, Protect, Detect, Respond, Recover

When considered together, these functions provide a high-level, strategic view of the lifecycle of an organization’s management of cybersecurity risk. The CSF is not intended to be a series of steps performed in an order, rather, the functions should be performed concurrently and continuously.

Once you adopt these five cybersecurity functions, there are five repeatable steps you can take to implement this process. The following steps are not set in stone, but they are a basic framework for how an organization can create a new cybersecurity program or improve an existing one. As mentioned earlier, these steps should be repeated as necessary to continuously improve cybersecurity.

1. Identify your business and mission objectives and priorities. With this information, you can support the different business lines or processes within an organization, which may have different business needs and levels of risk tolerance.

2. Identify related systems and assets, regulatory requirements, and overall risk approach. This step needs to be taken once the scope of the cybersecurity program has been determined. The organization then tries to identify the vulnerabilities to those systems and assets.

3. Create a current profile of the company. Focus on risk tolerance, which should support the organization’s overall risk management process. Most important is assessing the likelihood of a cybersecurity event and the impact that the event could have on the organization. It is important that organizations identify emerging risks and use cyber threat information from internal and external sources to gain a better understanding of the likelihood and impact of cybersecurity events.

4. Create a target profile that imagines the cybersecurity profile the company or organization would like to achieve. This step compares your current profile and the target profile to determine gaps. You’ll also need to determine the resources, including funding, staffing and outsourcing of services necessary to address the gaps.

5. Implement the plan based on realistic expectations. That means assessing the current cybersecurity practices and the steps needed to achieve the target profile.

We believe that the NIST framework is a flexible, repeatable, performance-based and cost-effective approach to manage cyber risks. The framework focuses on using business drivers to guide cybersecurity activities and to consider cybersecurity risks as part of the organization’s risk management processes. 

The framework enables organizations — regardless of size, degree of cybersecurity risk or cybersecurity sophistication — to apply the principles and best practices of risk management to improve security and resilience. It provides a common organizational structure for multiple approaches to cybersecurity by assembling standards, guidelines and practices that are working effectively today. 

Contact Elevity to learn more about how our Managed IT services can help secure your local or cloud-based IT infrastructure.

You May Also Like

These Stories on Cybersecurity

Subscribe by Email