Blog

How a Defense in Depth Strategy Protects Your Business

Stepping Up Your Cybersecurity With Defense in Depth (DiD)

When the pandemic hit, many businesses in Myrtle Beach, Conway, Florence, Georgetown and all over the globe had to shift to remote work almost overnight. Now, the hybrid work model has become a reality for many businesses in South Carolina and across the southeastern US . This allows employees to work from home, the office or split their time between both. According to a  recent report from Accenture, 74% of US based businesses are already using or plan to implement a hybrid working model permanently.1

 

However, a distributed workforce comes with its own set of challenges. One of the primary concerns of IT leaders across the globe is the unprecedented increase in cybercrime. Experts estimate that cybercrime has shot up by almost 300% since the start of the pandemic.2

 

Relying on one basic security solution will, therefore, prove to be futile against sophisticated attack vectors. This is where an approach like Defense in Depth (DiD) finds its relevance.  DiD is a cybersecurity approach in which multiple defensive methods are layered to protect a business. Since no individual security measure is guaranteed to endure every attack, combining several layers of security is more effective.

 

This layering approach was first conceived by the National Security Agency (NSA) and is inspired by a military tactic of the same name. In the military, layers of defense help buy time. But in IT, this approach is intended to prevent an incident altogether.

It’s important to differentiate DiD from another cybersecurity concept called layered security. While layered security uses different security products to address a particular security aspect, such as email filtering, DiD is more comprehensive and includes multiple security measures to address distinct threats related to the entire IT infrastructure.

 

While DiD is critical to protecting your business against evolving cyberthreats, it’s an undertaking that requires time, extensive knowledge and experience. Partnering with an MSP can simplify the process, reduce stress and minimize opportunities for error.

 

How MSPs Help Defend Against Threats

As an MSP, Creative Consultants Group  implements and divides DiD into three security control areas:

 

  1. Administrative Controls

The policies and procedures of a business fall under administrative controls. These controls ensure that appropriate guidance is available and that security policies are followed.  Examples include hiring practices or employee onboarding protocols, data processing and management procedures, information security policies, vendor risk management and third-party risk management frameworks, information risk management strategies, etc.

 

  1. Technical Controls

Hardware or software intended to protect systems and resources fall under technical controls. Examples of technical controls are firewalls, configuration management, disk/data encryption, identity authentication (IAM), vulnerability scanners, patch management, virtual private networks (VPNs), intrusion detection systems (IDS), security awareness training, etc.

  1. Physical Controls

Anything aimed at physically limiting or preventing access to IT systems falls under physical controls. Examples are fences, keycards/badges, CCTV systems, locker rooms, etc.

 

 

Essential Elements of DiD

We will  implement all the elements of an effective DiD strategy to minimize the chances of threats seeping in through the cracks. These elements include:

  1. Firewalls

A firewall is a security system comprised of hardware or software that can protect your network by filtering out unnecessary traffic and blocking unauthorized access to your data.

  1. Intrusion Prevention and Detection Systems 

Intrusion prevention and detection systems scan the network to look for anything out of place. If a threatening activity is detected, it will alert the stakeholders and block attacks.

  1. Endpoint Detection and Response (EDR) 

CCG’s Endpoint Detection and Response (EDR) solution operates by constantly monitoring endpoints to find suspicious or malicious behavior in real time.

  1. Network Segmentation 

Once you divide your business’ network into smaller units, you can monitor data traffic between segments and safeguard segments from one another.

  1. The Principle of Least Privilege (PoLP)

The principle of least privilege (PoLP) is a cybersecurity concept in which a user is only granted the minimum levels of access/permissions essential to perform their task.

  1. Strong Passwords 

Poor password hygiene, including the use of default passwords like “1234” or “admin,” can put your business at risk. Equally risky is the habit of using the same passwords for multiple accounts. To protect your accounts from being hacked, it’s essential to have strong passwords and an added layer of protection by using practices such as multifactor authentication (MFA).

  1. Patch Management 

Security gaps left unattended due to poor patch management can make your business vulnerable to cyberattacks. As soon as a new patch gets delivered, deploy it right away to prevent exploitation.

If you’re wondering about where and how to begin creating a DiD strategy for your business, don’t worry. We’re here to make the process as easy as possible. Contact us to take the first step toward making your organization more secure.

8. 365 Monitoring, Reporting, And automated Remediation

Business Email Compromise (BEC) is one of the biggest cyber crimes, costing US Businesses hundreds of million dollars each year.  Essential to mitigate this is constant monitoring of your 365 environment looking for unusual activity and shutting it dwn automatically when it occurs.  Couple that with detailed reporting showing vulnerabilities that need to be addressed and we can better protect your and your customers infomation and money.

 

If you’re wondering about where and how to begin creating a DiD strategy for your business, don’t worry. We’re here to make the process as easy as possible. Contact us to take the first step toward making your organization more secure.

 

Sources:
  1. https://www.accenture.com/_acnmedia/PDF-155/Accenture-Future-Of-Work-Global-Report.pdf#zoom=40
  2. https://thehill.com/policy/cybersecurity/493198-fbi-sees-spike-in-cyber-crime-reports-during-coronavirus-pandemic?rl=1
Creative Consultants Group's Total Care Advanced Security helps your state or local goverment meet Cybersecurity best practices call us today at 843.234.9980

5 Things South Carolina State and Local Governments Should Consider Before Applying For The State and Local Cybersecurity Grant Program (SLCGP)

State and local government (SLG) organizations are increasingly the target of cyber-attacks that can impact and disrupt citizen services. In 2021, President Biden signed the Infrastructure Investment and Jobs Act (IIJA). This act helps provide funding for state, local and academic institutions to help them implement system redundancy, update and enhance system security for critical infrastructure services.

IIJA fostered the creation of the State and Local Cybersecurity Grant Program (SLCGP), which provides funding to eligible entities to mitigate cybersecurity risks and threats to information systems owned or operated by, or on behalf of, state, local or tribal governments. SLCGP allocates $1 billion distributed over four years to help support state, local and tribal agencies in the implementation of cybersecurity best practices.

The Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) released the FY 22 Notice of Funding Opportunity (NOFO), which provides more details for how to  apply for SLCGP funding. The funding opportunity requires participants to prioritize the establishment of a cybersecurity planning committee, the development of a statewide or local cybersecurity plan, perform security assessments, and the adoption of cybersecurity best practices.

This blog post provides guidance and recommendations for state and local governments in South Carolina, North Carolina and beyond as to some of the requirements and resources your state, city, or local government should consider as your organization strives to meet the SLCGP funding requirements. Note: the SLCGP funding’s overall per state allocations are not sizable enough for each local organization to implement their own security measures effectively. Participating state and local government entities should take a strategic and enterprise approach to leverage these funds in a manner that will make a broader impact in risk reduction, and to make their infrastructure more resilient.

THE SLCGP FUNDING REQUIREMENTS

SLGCP has a tight 60-day window for submission, therefore, grant program participants need to act quickly while meeting the requirements of the grant application.  This grant program requires 80 percent of the funds to be allocated to local governments. For those entities pursuing the grant for enterprise initiatives, like consolidated IT programs, approval from local government representatives maybe required. The SLCGP also includes stringent grant reporting requirements that must be adhered to for success. These reporting requirements may be considered cumbersome to some smaller local government participants that may not have a grants office or knowledgeable staff to support these efforts. Local government organizations can consider leveraging the statewide grant offices to support meeting the grant application and reporting requirements.  As well as Creative Consultants Group (CCG) can assist with reporting requirements and with guidance of aspects of the application process.  We are therefore reaching out to all cites and counties in North and South Carolina to offer our assistance in maximizing your benefits.

CONSIDERATIONS TO HELP MEET THE SLCGP FUNDING OPPORTUNITY

Government entities must apply for SLCGP funds before the deadline on or before Nov. 15, 2022. As the SLCGP require establishing a cybersecurity planning committee, the following are recommended approaches for a cybersecurity planning committee to consider to secure funding:


      1. Streamline and standardize cybersecurity solution procurement and operations to speed implementation and reduce costs

      Government entities can take advantage of independent software vendors’ (ISV) solutions that can provide visibility, integration, automation, and protection at scale. However, the cybersecurity planning committees in charge of reviewing and submitting requests for these solutions should prioritize reducing various agencies’ requests — rather, they should look broadly across all requests to identify repeated themes and focus on areas that can scale across agencies and departments. In taking this approach, states can standardize capabilities and better operationalize threat data that they can use to make actionable decisions. Ransomware is one of the most predominant cyber security threats for state and local government (SLG) organizations, so having an integrated system that allows for simplified operations and automated response can benefit SLG covered entities that are resource constrained. Committees can utilize CCG’s advanced security tier including our SentinelOne Singularity and fully staffed Security Operations Center (SOC) to provide the level of protection and reporting required to effectively mitigate Ransomware threats.

    1. Implement immutable and geographically redundant offsite encrypted backup services with automated testing capabilities 
      One of the key components to increase resiliency, reliability, and offer low-cost disaster recovery are centralized immutable backup offerings form CCG. Our immutable and offsite backup services can automate data protection across your enterprise regardless of whether they are on premises or in the cloud. Our backup services secure your backups by encrypting your data in transit and at rest, which reduces risk of data compromise.

    2. Prioritize resiliency for your infrastructure 
      SLG organizations looking to secure SLCGP funding may consider prioritizing resilience for their infrastructure. Organizations can build resilience and an effective data strategy with various CCG services including automated failover, internet redundancy, and cloud services such as our Microsoft 365 services along with 365 Cloud Security monitoring, alerting, and automated mitigation services.

    3.  Implement required, managed, and monitored cybersecurity training
      The NOFO requires covered organizations to adopt cybersecurity best practices and implement cybersecurity awareness training to be eligible for funding. SLG entities must have a fully capable cybersecurity training program that can track employee completion and provides testing/ reporting capabilities for continuous improvement. CCG’s advanced security tier includes this service at no additional cost, or you can purchase this training separately if desired. The training offers easy lessons on cybersecurity-related topics like secure communication, data classification, phishing, physical security, social engineering, data privacy, third-party/application security, laptop standards, data protection data, and acceptable use, as well as simulated phishing tests that track which users performed tasks that they should not have, which would ultimately put your organization at risk. This testing helps you target which employees may need further training and helps you reinforce to your entire employee base any topics which maybe at issue or greater risk.  Our enhanced training also meets accessibility requirements.

    4. Think long-term with a modernization strategy

      Lastly, for subsequent year SLCGP efforts, SLG organizations should focus on long-term strategies, like local and statewide modernization of critical applications and infrastructure. Covered entities can use various onsite and cloud services to help meet the NOFO requirement to implement best practices like implementing zero-trust architecture, which can further support efforts to secure citizen data while enhancing the citizen experience.

      CONCLUSION

      State and local governments throughout North and South Carolina should not be deterred by the grant submission timeline and reporting requirements. This funding opportunity can help implement local and statewide risk mitigation strategies to protect government and citizen data privacy, secure your infrastructure and serve to protect citizens across South.

      Do you have questions about how your agency can use Creative Consultants Group’s Advanced Security Products to support your cybersecurity goals? Call us today at 843.438.1649 or visit http://ccgpro.com.