{"id":59943,"date":"2022-03-04T12:42:00","date_gmt":"2022-03-04T17:42:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=59943"},"modified":"2022-10-18T18:58:27","modified_gmt":"2022-10-18T22:58:27","slug":"shields-up-remember-your-cyber-security-fundamentals","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/shields-up-remember-your-cyber-security-fundamentals","title":{"rendered":"Shields Up: Remember Your Cyber Security Fundamentals"},"content":{"rendered":"\n

It\u2019s an uncertain and troubling time in the world. Geopolitical conflict has enveloped Eastern Europe, but the frontlines aren’t restricted to that region. Cyber attacks can swiftly cross international borders. Nation states, as well as hacktivists,<\/a> could adopt cyber warfare as a tactic to extend the battlefield, everywhere. This is a sensitive topic, and it\u2019s important to stay vigilant in times like these and review your security best practices in preparation for any major escalation in these attacks.<\/p>\n\n\n\n

It\u2019s been said that unintended consequences are among the only certainties in war. A discussion about cybersecurity is appropriate given the velocity and worldwide reach of these events. Your organization\u2019s best defense is to proactively plan and implement security best practices. Taking the time to review your cybersecurity posture limits the potential for unintended consequences.<\/p>\n\n\n\n

Security Best Practices<\/h2>\n\n\n\n

The threat environment is so concerning that The Department of Homeland Security (CISA) has advised organizations of all sizes to put their \u201cshields up<\/a>.\u201d You don\u2019t have to be a government agency to (hope for the best\u2026 but) prepare for the worst. Just begin with the basics. Cyber security is more approachable when it\u2019s broken down into three essential concepts:<\/p>\n\n\n\n

Practicing Good IT Hygiene<\/h3>\n\n\n\n

Remember the Colonial Pipeline hack? It occurred due to poor IT hygiene<\/a>, which is catch-all terminology for inappropriately configuring and maintaining all of your user accounts, apps, and devices throughout their life cycles. The pipeline attack wasn\u2019t an example of master spycraft: it happened because old user credentials were unmanaged and had access to resources that enabled attackers to pivot onto bigger things. Tip: don\u2019t be like them, follow <\/em>Zero Trust Security<\/em><\/a> instead.<\/em><\/p>\n\n\n\n

Zero Trust Security is a concept that trusts nothing and verifies everything<\/em>, which in essence states that in order for all<\/em> users to be authenticated and authorized to access resources, they must be continuously challenged inside and outside of your organization. <\/p>\n\n\n\n

For example, the old security paradigm was \u201cBen trusts Katie, and Katie trusts Tyrone, so Ben trusts Tyrone.\u201d That\u2019s no longer satisfactory given the scope and omnipresence of today\u2019s cyber threats. Configure your systems with the belief that \u201cnothing is secure\u201d and you\u2019ll be far better off. These are some of the steps that you should take to implement Zero Trust:<\/p>\n\n\n\n