Consulting with a Conscience™

A cruciallogics blog

Written by CrucialLogics
on March 07, 2019

For the majority of CIOs, security remains a top priority. With nearly one million new threats emerging each day, and the challenge of Bring-Your-Own-Device policies changing the security landscape, it’s understandable why organizations would be focusing on ways to enhance their protection infrastructure.

And while you may be tempted to pat yourself on the back for running a tight ship, security is one area where we can never afford to let our guard down. In 2018 alone, we saw massive brands suffer damaging data breaches, including Amazon, Facebook, Under Armour, and Delta Airlines. With the average breach costing an organization $3.5 Million, taking frequent inventory of your organization’s security measures is critical to mitigating risk.

Today, we’re sharing an easy 10-question quiz that will reveal just how secure your organization is.

1) Do you have a Single Sign On (SSO) identity framework?

SSO not only makes it easier for your employees to log into various applications, but it also heightens security. The best case scenario would be to use Multi-Factor Authentication through a platform like Azure Active Directory and Identity Protection.

2) How sturdy is your disaster recovery program?

Automatic backups, business continuity exercise drills, and recovery services like Azure Site Recovery are excellent ways to make sure that in the event of a breach, all data remains accessible.

3) Do you monitor for unauthorized intrusions?

Custom intrusion detection systems are built to specifically meet your network and business needs. They run continually, ensuring that the responsibility of checking for intrusions isn’t left up to an individual team member, making them much more reliable.

4) What is your security policy?

Having a defined security policy enables your team to continually be on the same page regarding your objectives and responsibilities as they pertain to your cybersecurity infrastructure. Base your policy on ISO 27001 to ensure compliance and alignment with best practices.

5) How do you connect to cloud services?

Given that nearly a quarter of the information contained in the cloud is sensitive, it’s critical that organizations ensure that their cloud connections are conducted in a safe fashion. Azure Virtual Network and Microsoft 365 provide secure connectivity to the cloud via secure portal solutions.

6) How do you monitor for data leaks?

Too many companies place the responsibility of security monitoring onto individual team members. It’s a job far too big for any human to handle. The most secure companies are those that have a comprehensive data protection program in place with rule detection logic. Thankfully, Azure and Microsoft 365 can offer the technology to develop a custom program that meets your needs.

7) How efficient are your software security updates?

The ability to install updates on time is critical to the mitigation of risk. For providers such as Microsoft, threat detection knowledge from global sources is continually being integrated into new functionality, and every second spent waiting to update is a second that’s exposed to known danger. Running your applications in an environment like Azure or Microsoft 365, in which updates are automatically installed, is an easy way to ensure that new functionality is being utilized.

8) Who can access which resources?

Does your organization limit or restrict access to certain resources? If not, you could be placing your data in danger of breach. Azure AD allows the user to deploy access control features, which launch an authentication process prior to granting access to employees seeking contact with resources.

9) Do you assess your environment for vulnerability?

A secure system is a system that is continually audited to assess its challenges. Choose a vulnerability management system that has cloud offerings, and train your IT team to handle vulnerability reports. Once an issue is discovered, commit to fixing it immediately.

10) How prepared are you for a ransomware attack?

To ensure that the propagation of malware is stopped in its tracks, you should be using a comprehensive solution for all systems. Patch systems and apps regularly, and stay up to date with bug reports and awareness campaigns to remain aware of zero-day potential risks.

How Did You Score?

Depending on your answers to the 10 quiz questions, you may have discovered that your organization isn’t as secure as you previously thought. As a Microsoft Gold Partner, our clients benefit from our DEEP technical expertise. We harness the unparalleled security features of Microsoft 365 and Azure and put them to work for your organization quickly and seamlessly, ensuring that each system is optimized to address your unique security concerns.

Contact our team today to learn more about how CrucialLogics can help your organization become more secure.

You may also like:

Cybersecurity

How Safe Are Password Managers?

Password managers are often seen as a safe and practical way to manage online security. While they can significantly red...

Cybersecurity

What is SIEM? Security Information & Event Management

Security information and event management (SIEM) is a comprehensive cybersecurity solution that collects, analyzes, and ...

Cybersecurity

Zero Trust Security Model: Architecture & Core Principals

Zero trust is a security approach that requires strict authentication and authorization for every request for access, re...