Three things your business can do to stay cyber-secure
Cybersecurity has become a key priority for business leaders today.
The number of cyber-threats and scams is growing; the threats and scams themselves are increasing in sophistication; and the consequences of a security breach are more damaging. So how can businesses can take to remain cyber-secure? In coming weeks we’ll be describing some key measures your business can take to protect its systems, information and people.
People can be your weakest link or your greatest asset when it comes to cyber-security. Malicious individuals have developed socially engineered threats or scams that deceive people into clicking on dangerous links, opening suspect attachments or even inadvertently sending money to scammers posing as your CEO. So what are some steps you can take to mitigate these threats?
- Educate your employees. Implement and regularly update education programs that teach your employees about how to recognise threats and scams. Extend these programs to employees’ families and partners and customers where feasible. These programs should teach employees that cyber security is everyone’s responsibility – not just IT department or the senior leadership team.
- Implement rigorous cyber-security policies. Businesses should complement education programs with policies governing issues such as the handling of information or devices (including diverse issues such as the use of USB drives; the use of company-owned notebooks on unsecured public networks; and the shutting down of departing employees’ access to systems and data). The policies should also cover steps employees need to take – including who they need to inform – in the event of an incident such as a notebook with sensitive information being left in the back of a taxi.
- Build cyber-security into the culture of your business. This can be achieved through leaders within the business modelling and advocating security awareness; incorporating security into the business’s vision and mission statements; promoting security in recruitment and onboarding processes; and rewarding positive security behaviours.
Taking these steps can play a vital role in building a powerful security risk posture at your business. Call Simon or one of our experts today on +61 2 9409 7000 to find out more about cyber education.
Australia’s new data breach scheme could cost your business $2 million.
Australia’s new data breach notification scheme has been operating for several months. The scheme requires businesses – as well as government agencies and not-for-profits – that handle personal information and turn over more than $3 million per year to notify people affected by serious data breaches.
They must also inform the Office of the Australian Information Commissioner (OAIC). Failing to meet their obligations could cost businesses up to $2.1 million in fines.
The April-June 2018 Notifiable Data Breaches Quarterly Statistics Report revealed organisations had notified the OAIC of 242 breaches – 59% of which were due to malicious or criminal attacks. A further 36% were due to human error, while only 5% were caused by system faults. While 89% of data breaches compromised contact information, a worrying 42% involved financial details, 39% involved identity information and 25% involved health data.
The most common human error was sending email to the wrong person, followed by the unintended release or publication of personal information. However, the OAIC noted that data breaches involving the loss of storage devices affected the largest number of people, at an average of 1,199 affected individuals per breach.
The Australian Cyber Security Centre (ACSC) found at least 77% of cyber incidents during the quarter occurred due to the theft of credentials such as usernames and passwords.
More information is available from the OAIC and the ACSC.
So what are the lessons for small businesses from the launch of the scheme and the April-June report? The key is to recruit or build security capability internally to comply with the requirements of the data breach notification scheme. The second is to implement robust security systems, policies and processes to minimise the risk of data breaches.
Importantly, this is not a ‘set and forget’ exercise – these systems, policies and processes must be updated regularly to combat new threats and to ensure workers and managers remain aware of their obligations. Talk to Roger and his team of experts today on +61 2 9409 7000 to find out more about protecting your business.
Next Generation Firewall is here…
As the digital world continues to evolve, so too do cyber threats. Zero-day exploits are becoming both more common and severe, and staying ahead of them is challenging to say the least.
But despite rapid change in the cyber realm in recent years, there is one tried and true technology that remains foundational to protecting an organisation’s digital assets from malicious attacks – the humble firewall.
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on a set of predetermined security rules. It typically establishes a barrier between a trusted internal network and an untrusted external network, such as the Internet.
Traditional first-generation firewalls, also known as packet filters, controlled network access by monitoring outgoing and incoming packets and allowing them to pass or halt based on the source and destination Internet Protocol (IP) addresses, protocols and ports. Second-generation firewalls built upon their first-generation predecessors by attempting to increase the level of security between trusted and untrusted networks via proxy services – an interface between the user on the internal trusted network and the Internet.
The newest generation of firewalls – often referred to as next-generation firewalls (NGFWs) – are hardware or software-based network security solutions that can detect and block sophisticated attacks beyond traditional firewall technologies. They perform deeper inspections, checking packet payloads and matching signatures for harmful activities such as exploitable attacks and malware. NGFWs also offer administrators greater awareness of and control over individual applications. Most are modular, meaning users can choose to purchase and activate features commensurate with their specific needs and risks.
Irrespective of the type of firewall you’re using or considering, perhaps the most important things to weigh up are whether the product meets the specific security requirements of your organisation, as well as whether it is a good fit for your IT environment. And remember, as cyber threats continue to evolve, firewalls remain an integral asset in your cyber defence line.
FirstWave’s cloud-based NGFW service offering combines application awareness, deep packet inspection and advanced threat prevention to give companies better control over applications for their cloud deployments while also detecting and blocking malicious threats. Also available as a high availability, managed solution, this offering can be customised to meet high-end, enterprise-specific needs. Learn more.
Talk to Neil or the FirstWave team today on +61 2 9409 7000 to find out more about our cloud-based NGFW service.
From Chaotic To Value Driven: How To Progress In Your IT Service Management Maturity
So, where are you at?Let’s discuss what each level means and how Opmantek’s solutions can assist you in improving your position.
Level 0 – Chaotic
This is not where you want to be and most likely not where you are if you are reading this blog. Organizations in the Chaotic stage do things ad hoc and in an undocumented and unpredictable manner. They have multiple unconsolidated help desks, where users call to notify of issues and have minimal mature IT operations. These businesses are most likely part of the 21% of organizations who view IT as an expensive overhead, rather than the 45% of organizations who view IT as necessary.
Level 1 – Reactive
Businesses that are operating on the Reactive level have progressed from chaos, they now have basic backup and recovery (phew!), they have basic inventory management and basic topology. There is basic events management and a system of trouble ticketing, but they are still just fighting fires when they occur.
To progress from a Reactive position requires, at the minimum, performance management, change management, problem management, configuration management, automation, job scheduling and availability management. This is where Opmantek’s solutions can assist!
The progression to have proactive IT Service Management is extremely simple, Opmantek’s core open-source software can handle this, there is no financial implications, just potential time to save.
Opmantek’s solution which will help your rise from the Chaotic or Reactive levels to a basic Proactive level include:
- Open-AudIT – Open-AudIT is an open-source network discovery, inventory and audit program which can tell you exactly what is on your network, how it is configured and when it changes. You will need a program such as Open-AudIT in place to achieve the Reactive level with sophisticated inventory management. Open-AudIT can assist at the Proactive level for basic configuration and change management, with Open-AudIT Enterprise offering enhanced capabilities utilising baselines and Open-AudIT Professional and Enterprise offering network automation functionality.
- NMIS – NMIS is an open-source network management system, which monitors the status and performance of an organization’s IT environment, assists in identification and rectification of faults and provides valuable information for IT departments to plan infrastructure changes and investment. You will need a program such as NMIS in place to achieve the Reactive level and beyond. NMIS can initiate problem management and undertake alert and event management required at the Reactive level. NMIS can also assist with performance management, analyzing trends, thresholding and measuring application availability with automation capabilities.
Opmantek’s commercial modules which will help you achieve a Proactive level (and beyond) include:
- opEvents – opEvents enhances NMIS, reducing the business impact of network faults and failures using proactive event management to fast-track problem resolution, reduce outages, improve performance and decrease the cost of managing your IT environment. opEvents can assist you to achieve the Proactive level by automating the handling of events.
- opCharts – opCharts is a solution that brings to life NMIS data, that allows you to increase your network visibility, reduce organizational complexity and accelerate root cause discovery by visualizing all of the key information about their environment using dashboards, maps and charts. opCharts assists you to achieve the Proactive level through dashboarding and viewing multiple data sets showing trends, problems and availability with data from NMIS. opCharts also continues to be relevant in your progression to the Service and ultimately Value levels.
- opConfig – opConfig assists in disaster recovery, troubleshooting, compliance and change management allowing organizations to compare, track and manage change and compliance, with a full history of configuration information. opConfig can assist you to achieve the Proactive level by providing advanced automated change and compliance management, which then positions you to be able to move on up to the Service or Value stage of maturity.
- opFlow – opFlow is a solution designed to rapidly identify the root cause of poor network performance. opFlow can assist you to achieve a mature Proactive level in relation to your performance management processes.
- opTrend – opTrend is a solution providing cutting-edge analytics, identifying resources that are showing abnormal activity based on historical behavior and providing organizations with a true trend analysis of critical resources. opTrend can assist you to attain and progress from the Proactive stage by providing a more advanced level of trend analysis than NMIS.
Level 2 – Proactive
In a Proactive state, you are doing well as you have the solutions previously discussed in place and, like many others, you may be happy to just stay here and avoid reverting to a Reactive or Chaotic state. However, there is still room for improvement to further optimize your IT operations processes. You may be predicting problems, analyzing trends and automating tasks, but you could also be viewing IT as a service provider, having guaranteed Service Level Agreements (SLA) in place and measuring service availability.
Level 3 – Service
If you have reached the Service level, awesome work! You have almost completed your journey towards a complete optimization of your IT operations processes. At this stage, you understand the costs involved with IT operations, have SLAs in place and are managing service delivery with solutions such as NMIS and opCharts, that allow you to capture key information and then visualize it with dashboards. You are also undertaking capacity planning. All that is left to do now is to transition towards managing IT as a Business.
In addition to the solutions discussed previously, other Opmantek solutions which can help you attain and exceed the Service stage include:
- opReports – opReports extends NMIS, by automating the creation and distribution of detailed operational and executive-level reports. opReports can assist you at the Service by reporting on service availability and capacity management data. It will also in your progression to the Value level with regards to business planning.
Level 4 – Value
To be operating at the highest level, the Value state, you have all the previous measures discussed in place to manage your IT operations. You are also now viewing IT as a strategic business partner, respecting the linkages between IT and business metrics, using management and business application data to improve the business process and inform planning, and experiencing enhanced cost recovery. Solutions such as Opmantek’s opCharts and opReports are allowing you to visualize and report on data you collect through your IT operations, and you are now using such software to inform improved business processes and planning. If you are in this stage of maturity of IT management processes you are likely experiencing a competitive advantage over your competition in your industry.
In conclusion, to achieve optimization of your IT operations processes, it is essential to be operating at the Service or Value level of Gartner, Inc.’s IT Service Management Maturity Model with the help of solutions such as those provided by Opmantek. Progressing through the stages of the model will result in widespread improvements to your overall service management and provide many benefits to your organization. Gartner has reported that in the 1st year of implementing such framework, organizations experienced a 20% improvement to the initial incident response rate, decreased number of problems requiring multiple man-days, a 66% decrease in the number of major failures and a 20% decrease in human error in releases. After 3 years of implementing the framework, organizations experience a reduction in costs of 30%.
Ultimately, Gartner, Inc.’s IT Service Management Maturity Model can help organizations manage risks, improve decision making, increase productivity and gain a competitive advantage from IT. If you need help progressing your level of maturity with respect to the framework, just reach out, a member of the Opmantek team would be happy to guide you through our solutions in a free product demo.
Build your cybersecurity capabilities with government support
Australians are avid users of online social media, banking and government services – making individuals and businesses in this country attractive targets for cybercrime.
According to a recent government cybersecurity review, cybercrime costs us about $1 billion in direct costs alone each year. Victims’ business and employment opportunities may dry up, while reputations and well-being are also at risk.
Scammers are increasingly focusing on very small businesses that may lack the resources and expertise to defend themselves against cyberattacks. The Australian Government recently noted a rise in business email scams – particularly targeting businesses with fewer than 10 employees.
The Government has taken a range of measures to build its cybersecurity capabilities. These include the recent launch of a ‘purpose-built’ Australian Cyber Security Centre (ACSC) headquarters to protect critical infrastructure, businesses and the Australian public; integrating the ACSC into the Australian Signals Directorate (ASD), the organisation that works across intelligence, cybersecurity and offensive operations; and consolidating a range of websites, including those for for ACORN (the Australian Cybercrime Online Reporting Network) and the ACSC, into the cyber.gov.au website.
So how can small businesses take advantage of these consolidated government capabilities to improve their cybersecurity? They can access a range of resources through https://cyber.gov.au/business/, including guides, updates and alert services. They may also advise any workers that may be a victim of a cybersecurity incident to report it and obtain advice through https://cyber.gov.au/individual/report/.
Furthermore, they may access information about partnerships between the ACSC and businesses involved in critical infrastructure or systems of national interest. Eligible businesses may receive threat intelligence and incident management support.
We recommend owners and senior managers at small businesses take the time to understand the government’s measures. They should use the government’s cybersecurity materials to build their own knowledge and capabilities – and ultimately improve the cybersecurity posture of their businesses.
Talk to Roger or one of our experts today on +61 2 9409 7000 about protecting your business.