top of page
Writer's pictureAll Things Being ISOs

Five Strategies for Businesses to Fortify Cyber Defences

ISO 27001 Certification, Advanced Authentication, and Up-to-Date Training Among Key Measures to Enhance Cybersecurity.


In an era marked by escalating cyber threats, businesses are urged to adopt proactive strategies to fortify their information security. From obtaining ISO 27001 certification to embracing advanced authentication methods, here are five crucial investments that can significantly enhance cybersecurity programmes.


1. Get ISO 27001 Certified:

ISO 27001, established by the International Organisation for Standardization (ISO), serves as a gold standard in Information Security Management. It ensures effective management of information security risks and data. The certification aids organisations in establishing and maintaining an Information Security Management System (ISMS), systematically assessing risks, and implementing policies and procedures to manage them. An ISMS reduces the likelihood of data mishandling, destruction, or loss, offering a structured response in case of incidents.


2. Deploy Multifactor Authentication:

Multifactor Authentication (MFA) stands as a robust safeguard against credential-based attacks. Requiring a second form of identity verification beyond usernames and passwords, MFA has proven effective in preventing a majority of such attacks. Notably, businesses should consider "unphishable" MFA options, including hardware security keys, to counter evolving hacking techniques like phishing.


3. Explore Passwordless Authentication:

Passwordless authentication, though still evolving, presents a promising avenue for businesses. It includes approaches like biometrics (fingerprint or facial recognition) and complete elimination of passwords, relying on mobile device authentication capabilities or a blend of biometrics and cryptography. Industry leaders such as Apple, Google, and Microsoft are supporting "passkey" authentication, aiming to facilitate logins without passwords.


4. Keep Awareness Training Updated:

Given that human error often constitutes a weak link in cybersecurity, ongoing security awareness training for staff is vital. However, training regimens need to align with current attacker trends. While many training programs focus on spotting obvious phishing attacks, the landscape has evolved. Training should adapt to address subtle and sophisticated phishing techniques, emphasising the urgency often associated with suspicious activities.


5. Empower Employees for Secure Work:

In addition to training, empowering employees to work securely is crucial. Rather than scolding employees for using unauthorised applications (shadow IT), organisations should encourage self-reporting when using unsanctioned applications for productivity reasons. Creating an environment where employees feel empowered to make secure choices without fear of retribution is essential.


6. Keep Risks in Perspective:

Understanding the evolving threat landscape is crucial for effective risk prioritisation. Despite concerns about malware, a significant portion of malicious activity (71%) is now malware-free, relying on tactics like stolen credentials. Businesses need to raise awareness about adversaries' actual tradecraft, with a specific focus on credential-based attacks that demand more attention.


As businesses navigate the complex cybersecurity landscape, these strategies offer a comprehensive approach to strengthening information security and mitigating potential risks.


A message from our sponsors, The Ideas Distillery


If you would like to look at how to implement an ISO 27001 information security management system, then simply contact us.


Or, if you want to see what's involved in more detail, then get a completely free, no obligation, totally tailored ISO Gap Analysis for your business (only available to UK businesses).

1 view0 comments

Comments


bottom of page