Cybersecurity tips for Small & Medium Businesses
With the recent headlines about ransomware, data breaches, and hacks, you might believe these threat actors only target large corporations like Verizon and Equifax. Or maybe large cities, like the ransomware that hit the city of Atlanta or more recently, the 20-odd Texan towns hit simultaneously. But ransomware, and malware in general, can be blasted to hundreds of thousands of business email addresses with ease. And if you’re a small business and feel the need to safeguard your data consider taking these proactive steps.
-
Disable PowerShell : While a handy tool for any sysadmin, the use of malicious PowerShell scripts increased 1000% since last year, again according to that Symantec report (at the end of the post below). Even if users aren’t local admins over their computers, chances are they are allowed to run powershell.
-
Have off-site backups: The most popular vendor in this field is Veeam. Their community edition allows you to try out their product for free, forever, in a limited capacity. It allows you to back up 10 Virtual Machines and On-Premise Servers. But also look at Azure backup and Site recover. They’re intuitive and bill based on usgae. On an added note to this: conduct Disaster Recovery testing as part of a larger business continuity strategy to confirm backups are sufficient to replicate the production environment. Backups are not a silver bullet though. When a threat actor successfuly accesses your network and gets domain-admin access, they typically won’t turn on a switch to encrypt all your files. Most often they’ll do more reconnessence to get a lay of the landscape.
-
ENABLE MFA ON EVERYTHING: Even with good training, an employee that fell victim to a spearfishing attack might give up a username and password without realizing it. A threat actor would normally have everything they need but with MFA, they’ll be hit with a challenge prompt (say a 6 digit PIN) before they can really do serious damage. For an added layer of security, and to prevent employees from making their PINs 123456, employ a dictionary that prevents most commonly guessed password and PINs. Those 20-odd Texan towns were hit simultanously because their MSPs RMM (Remote monitoring and management) software was compromised and because user accounts did not have MFA enabled. Consider Azure AD native MFA function to help in this effort.
-
Enable Geo fencing: This especially holds true for SMBs where employees would not frequently have to leave the country. Azure AD has a very intuitive geo-fencing configuration to prevent international threat actors from doing much with stolen credentials. Of course, if they’re using a VPN, this extra layer of protection may be moot. Still, it’s worth the effort.
-
Put RDP behind a VPN Generally, only allow access to network recourses from inside your network. Practically, this means only employees connected to the company’s VPN can access those assets. Internet-facing RDPs are a common attack vector in cyber attacks.
-
Block emails that fail SPF/DMARC: Sender Policy Framework is part of the triad of email authentication. Next to DMARC (Domain-based Message Authentication, Reporting & Conformance) and DKIM (Domain Keys Identified Mail), SPF allows the owner of the domain to specify which IP addresses are permitted to send mail. Basically, creating this rule means emails coming from untrustworthy sources trashed. For various technical reasons, this is not a magic bullet against all phishing emails, not even just considering the fact that this authentication method sometimes tends not to be maintained by some embarrassingly large companies. To truly buttress your cyber efforts, create a DMARC record which would block bad actors from spoofing your company email address to your own employees.
-
Patch everything: Back in 2017, Equifax was hit by an exploit in Apache Struts, a popular open-source web framework that had a patch available for months. Patching your operating systems is important but remember to patch the other software your business critical infrastructure runs on.
Here’s a link to the Symantec report