Don’t Forget the Little Things in Your Cybersecurity Strategy

Don’t Forget the Little Things in Your Cybersecurity Strategy

Most organizations get the big things right when it comes to security. They are really good at securing the perimeter and patching the major security holes. They understand what they need to do to keep critical systems and applications secure.

Problems often arise with the little things in the environment — small applications that weren’t intended for production or components that are added to the network but don’t meet enterprise security standards. The little things create gaps and leave weaknesses that give hackers a foothold that enables them to go after the bigger systems and applications.

1.png

The Intersection of OT and IT

Many of these problems arise with networked operational technology (OT) systems. OT devices are employed for a wide range of functions, such as building security, energy conservation and environmental controls. Increasingly, these devices have Ethernet ports or Wi-Fi capabilities, and connect to a server in the data center.

Often they are added to the network with little thought as to potential security concerns. However, OT devices have notoriously weak security and few IT teams have developed the policies and procedures needed to protect them. Default usernames and passwords are left unchanged, and the devices are not monitored by security tools.

The servers these devices connect to aren’t given much attention, either. IT teams might not think a server is critical because it only controls bathroom lights, for example. The server isn’t hardened, and hackers can get and start exploring other parts of the network.

2.png

Unauthorized Devices and Applications

People also bring in their own equipment, which creates a significant vulnerability point. In many cases, users don’t understand a device’s functionality and jeopardize the network unintentionally. For example, they might install a switch to connect various devices without realizing that it’s also broadcasting a wireless signal. They don’t intend to do anything nefarious but cause security vulnerabilities by mistake.

Of course, sometimes users bring in devices to circumvent security. People will stand up their own Wi-Fi access points because connectivity to the network through authorized channels is a hassle.

Users will also download and install applications or use an app template to build something using Microsoft Office tools. These downloads may be riddled with malware or provide a hacker with a backdoor into the network. IT doesn’t secure them because IT doesn’t know about them.

3.png

How DeSeMa Can Help

The DeSeMa team can identify these components and recommend ways to isolate them so that they don’t cause issues. Network segmentation is a key technique. DeSeMa can segment the network into zones so that the systems that support critical applications and services are kept separate from OT systems and anything that people bring in on their own.

If a user brings in a device that isn’t supposed to be there, that device shouldn’t be able to attach to the network. DeSeMa can set up policy-based controls to block connections by unknown users or devices. Our team can also establish controls that prevent users from downloading and installing unapproved apps.

At the same time, DeSeMa can modify network software to make life easier for users. Connecting a smartphone or other device will be quick and easy, so there’s less incentive to bring in a Wi-Fi access point. Additionally, we can help implement policies and procedures for adding OT systems.

All too often, security threats crop up in the little things that nobody thinks about. Let DeSeMa help you identify risky devices and apps so that you can shore up your network security.

Get Started Today!