
Businesses, established enterprises and public sector organizations have at least one thing in common: they are all prime targets for cybercriminals. With that in mind, understanding and implementing cybersecurity best practices is essential.
According to the most recent IBM Cost of a Data Breach report, each public sector incident costs $2.07 million on average.
By following these cybersecurity best practices, you can help equip your public sector organization to anticipate threats, neutralize attacks and recover in the event of a serious data breach.
Cybersecurity practices are relative. The “best” practices for one organization might not be best for another. Organization size, industry, size of the value chain and other factors can all impact the level of risk an organization faces, as well as its resulting cybersecurity needs.
To help you identify the cybersecurity best practices you need to know, we’ve grouped the following recommendations into three categories (plus one best practice that every executive leadership team should consider):
The first and most pivotal of all cybersecurity best practices is simply knowing what you’re up against. To that end, it’s good to understand common types of threats and where they come from:
These commonly involve a deluge of illegitimate traffic directed at a network, internet service provider (ISP), or cloud service provider. When this happens, legitimate traffic can slow to a halt as the servers work to handle the flood of false requests.
This is not an exhaustive list of all possible types of threats. While you should look out for all of them, the reality is that risks evolve. The more sophisticated threats are, the more sophisticated your risk management strategies need to be.
Cybercrime costs are expected to hit $8 trillion in 2023. Identifying the risks your organization faces is just the first step in making sure you don’t contribute to that sum.
Simply knowing about threats won’t protect your organization, but taking a shotgun approach to cybersecurity won’t help you much, either. Identifying your organization’s most valuable digital assets and determining where your current cybersecurity measures need to be improved to shield them from malicious activity is essential.
One tool that can help with this is the National Institute of Standards and Technology Cybersecurity Framework, or NIST CSF. Developed initially to standardize infrastructure within a niche of organizations, it has expanded based on the IT community’s feedback. Today, the CSF includes guidance on self-assessment, planning guidelines and other updates in response to advancements in security threats.
The NIST Cybersecurity Framework outlines five functions that represent critical steps in your approach to cybersecurity risk management:
These functions are further broken down into categories and subcategories. This structure runs the gamut of cybersecurity best practices and objectives without overcomplicating the issue.
Beyond implementing this or another CSF, consider bringing in a contractor to perform an audit of your cybersecurity systems. This will provide an unbiased view of the policies, procedures and technologies you have in place in the form of actionable feedback that you can use to improve your cybersecurity measures.
Whatever standards you decide to abide by, compliance software empowers you to manage assessments, monitor compliance and track improvements.
All discussion of cybersecurity best practices centers around helping your organization employ basic cyber hygiene. The following are among the most vital elements of this practice:
Keeping in mind the importance of a robust cybersecurity system, your public sector IT team should include at least one expert on cybersecurity. Additionally, consider including a cybersecurity expert on your board.
Critical issues like cybersecurity can be challenging to reach the forefront where they belong when decision-makers don’t fully understand them. Finding the right person here can be tricky, and it’s not hard to see why.
Steve Durbin, managing director for the Information Security Forum, said, “The person must be a hybrid with strong communication skills, who understands how to operate at the board level, and have an understanding of the cyber space.”
Durbin stresses the importance of finding a candidate with technical knowledge and leadership abilities. Take care when deciding who to put in this position, as their work will protect your organization from cyberattacks.
As you begin your search for cybersecurity professionals, remember that you don’t have much time to waste. The risk of falling victim to a cyberattack continues to grow, and you need to be prepared as quickly as possible without taking shortcuts. For this reason, leveraging the expertise of a managed security services provider (MSSP) may be your best bet, at least for the time being. There are several advantages to taking this approach:
There’s no doubt that your organization leverages several external applications in order to function. Sometimes the developers of those apps release updates with new features or user interface components, but more often, those regular updates contain security fixes.
Cyber threats are constantly evolving, and software companies update their products accordingly. You don’t want to be caught using the old version of a program with a known security vulnerability.
After all, a single vulnerability in one of your programs could be just the access point that cybercriminals need to force access into your network. Your hardware also plays a role in cybersecurity. Most computers and mobile devices reach a point when they can no longer run the latest version of their respective apps and operating systems.
When this happens, it’s time to let them go. Remember that the investment in upgrading your devices is far lower than the cost of a data breach.
2020 completely changed how we work, pushing nearly everyone whose job allowed it into home offices. While the overall workforce was already seeing a gradual trend toward work-from-anywhere (WFA) policies, the sudden shift posed a staggering cybersecurity challenge.
Insufficiently secured home offices and data transfers over unsanctioned platforms (such as personal email and instant messaging) played a significant role in data breaches in 2021 and 2022. They will continue as hybrid working remains.
Organizations can combat this by investing the resources necessary to develop new cybersecurity best practices that shore up security for home networks and devices used and provide specific security training designed to encourage safe behavior.
Researchers at Bitdefender suggest that employees are likely to take shortcuts for convenience while working at home. During training, everyone needs to learn about steps they can take to help keep your organization’s assets secure, such as:
It’s also a good idea to start using a VPN for an additional layer of security. The free services are tempting, but it’s unlikely that they are as secure as enterprise solutions. Just be sure to do your due diligence when selecting a service provider; the last thing you need is for the solution you choose to be the cause of a data breach.
Even following all cybersecurity best practices cannot serve as a 100% guarantee that your data is safe. You should still be prepared in the event that any of your assets become compromised. Aside from being good practice in general, regularly backing up your data helps ensure that you can continue operations in the event of a virus or ransomware attack.
In fact, having a recent, uncorrupted backup is the only way to recover from ransomware attacks without paying the ransom. When searching for a solution, keep in mind that malware can go undetected for a long time before showing obvious symptoms. For this reason, work with a provider that offers the longest-possible version history that your budget allows.
It’s also a good idea to follow best practices for your backup strategy, especially regarding the number of copies and frequency of backups. Some organizations — such as those dealing with a high volume of constantly changing data — will need to perform several backups daily. In contrast, others can get away with a single backup overnight or during periods of little activity.
Only you and your team can decide what’s necessary for your organization, which is why you need a high-ranking IT specialist.
Put simply, a common controls framework (CCF) reflects all the controls that different departments have in common. It considers overlapping industry standards and organizational needs to create a single, streamlined framework. Implementing a CCF can help you use a similar process across different instances, standardizing your cybersecurity practices.
A CCF is also a great foundation for improvement. Since you’ll have a central set of practices, it’s easier to analyze, assess and improve them as industry standards — and risks — evolve.
Third parties add value to the organizations they partner with. They also introduce risk. Many organizations have incomplete third-party data, and they also give third parties a higher level of access than they need. Third parties may also work with vendors that introduce risks of their own.
Through bad intentions or even negligence, all of these things can expose organizations to cyber attacks. Organizations must have a thorough third-party risk management program in place, one that identifies and monitors the cybersecurity implications of working with third parties. This should include the following:
High-level organizational authorization is necessary, though it poses a significant risk. Numerous data breach reports show that internal actors account for many of the data breaches that occur. You want to trust your teams and do your best to hire trustworthy people, but you should still implement cybersecurity best practices that help you keep an eye on them.
You don’t necessarily need someone sitting in a room watching your users’ every move in real time. Still, your security software or MSSP solution should be smart enough to recognize suspicious behavior with user activity monitoring before it becomes a problem. With that said, do take care in implementing this practice.
In an era with seemingly limitless surveillance technology, there’s no shortage of privacy concerns. Be transparent about your monitoring practices, including what you’re looking for, what data is collected and why.
Further, if there is an incident, keep the evidence presented in context. You want to differentiate between malice and mistakes, and making accusations is an excellent way to put even innocent people on edge.
Finally, when someone leaves the company, access should be revoked immediately to prevent them from using outdated credentials to wreak havoc on your network.
It’ll take some work to implement, but one way to minimize risks from users with high clearance levels is to implement zero trust security. Zero trust is a comprehensive approach to security that operates on the premise of “never trust, always verify.”
Rather than a particular technology or solution, it is a philosophy that combines the following security principles to protect your assets:
Additionally, zero trust architecture breaks down entities into six components — identities, devices, data, apps, infrastructure and network. Each of these components has its own security concerns, so each is handled separately according to your organization’s needs and the cybersecurity best practices you have in place.
With growing pressure from stakeholders to hold executive leaders accountable for cybersecurity governance, education on cyber risk is paramount. Regardless of where an organization stands in its cyber risk maturity, a small amount of training can significantly impact the quality of conversations directors have with experts.
Better communication is a more constructive use of executive leaders' precious time. It can ultimately lead to an enhanced cybersecurity strategy that saves organizations reputationally and financially.
A cyber risk and strategy certification is a straightforward way of achieving this goal. Courses like this include insights from subject matter experts, interactive eLearning modules and an alumni network, facilitating ongoing engagement around cybersecurity.
Cybersecurity best practices in 2022 weren’t the same as cybersecurity best practices in 2021. This isn’t news. But you might not know how cybersecurity has changed year-to-year, let alone over the past four years.
Below, we’ve charted some key trends in cybersecurity for 2020, 2021, 2022 and 2023 so you can see how risks evolve and whether or not your practices have kept up.
As complex cyber risks continue to evolve at a rapid pace, it’s more important than ever for boards to hone their cybersecurity skills.
Enroll in the Diligent Cyber Risk & Strategy Certification course to access exclusive interactive learning modules that will help you implement cybersecurity best practices and improve your cyber risk oversight.