• Latest
  • Trending
  • All
  • Trading & Investing
  • Strategies & Techniques
  • Risk Management & Portfolio Allocation
  • Technical Analysis Tools & Indicators
  • Fundamental Analysis & Research
  • Blockchain Technology
  • DeFi & NFTs
7 Best Practices for Enterprise Attack Surface Management

7 Best Practices for Enterprise Attack Surface Management

May 12, 2024
X spaces repeat with bluhale

X spaces repeat with bluhale

May 5, 2025
Build Meowverse in Telegram Play-to-Aarn Mini Game

Build Meowverse in Telegram Play-to-Aarn Mini Game

April 4, 2025
What is the future of generative AI?

What is the future of generative AI?

April 1, 2025
How traders stay in front of the curve

How traders stay in front of the curve

March 26, 2025
How to improve crypto investment strategies using AI analysis

How to improve crypto investment strategies using AI analysis

March 23, 2025
Large XRP whale movements are concerned in the midst of Sec Appeal

Large XRP whale movements are concerned in the midst of Sec Appeal

March 21, 2025
Krypto debate raises questions about Warren’s hostile attitude

Krypto debate raises questions about Warren’s hostile attitude

March 8, 2025
Expert Eyes Bitcoin at $ 750,000 as Fidelity Assigns 1-3%

Expert Eyes Bitcoin at $ 750,000 as Fidelity Assigns 1-3%

March 8, 2025
Bitcoin price forecast – Forbes Advisor Australia

Bitcoin price forecast – Forbes Advisor Australia

March 7, 2025
3 Unconnection Statistics Crypto Investors used to detect Bitcoin network activity

3 Unconnection Statistics Crypto Investors used to detect Bitcoin network activity

February 28, 2025
4 Crypto Price Analysis Patforms that can improve your trades

4 Crypto Price Analysis Patforms that can improve your trades

February 28, 2025
From pennies to wealth in the satirical world of tap-to-earn game: interview with bums

From pennies to wealth in the satirical world of tap-to-earn game: interview with bums

February 27, 2025
  • Home
  • Trading & Investing
    • Risk Management & Portfolio Allocation
    • Strategies & Techniques
    • Fundamental Analysis & Research
    • Technical Analysis Tools & Indicators
  • Crypto News & Analysis
    • Bitcoin
    • Market Overview & Trends
    • Altcoins
    • Technical Analysis & Charting
  • DeFi & NFTs
    • Decentralized Finance (DeFi)
    • Non-Fungible Tokens (NFTs)
    • Exchange Hacks & Security Breaches
    • Wallet Hacking & Phishing Attacks
  • Blockchain Technology
    • Supply Chain & Logistics Solutions
    • Enterprise Adoption & Applications
    • Healthcare & Medical Innovations
    • Energy & Sustainability Initiatives
Thursday, May 8, 2025
  • Login
UnCirculars
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
    • Home – Layout 4
    • Home – Layout 5
  • Crypto News & Analysis
    • All
    • Adoption & Use Cases
    • Altcoins
    • Bitcoin
    • Market Overview & Trends
    • On-Chain Data & Metrics
    • Security & Scams
    • Technical Analysis & Charting
    X spaces repeat with bluhale

    X spaces repeat with bluhale

    Build Meowverse in Telegram Play-to-Aarn Mini Game

    Build Meowverse in Telegram Play-to-Aarn Mini Game

    What is the future of generative AI?

    What is the future of generative AI?

    How traders stay in front of the curve

    How traders stay in front of the curve

    How to improve crypto investment strategies using AI analysis

    How to improve crypto investment strategies using AI analysis

    Large XRP whale movements are concerned in the midst of Sec Appeal

    Large XRP whale movements are concerned in the midst of Sec Appeal

    Krypto debate raises questions about Warren’s hostile attitude

    Krypto debate raises questions about Warren’s hostile attitude

    Expert Eyes Bitcoin at $ 750,000 as Fidelity Assigns 1-3%

    Expert Eyes Bitcoin at $ 750,000 as Fidelity Assigns 1-3%

    Bitcoin price forecast – Forbes Advisor Australia

    Bitcoin price forecast – Forbes Advisor Australia

    3 Unconnection Statistics Crypto Investors used to detect Bitcoin network activity

    3 Unconnection Statistics Crypto Investors used to detect Bitcoin network activity

    • Bitcoin
    • Altcoins
    • Market Overview & Trends
    • Technical Analysis & Charting
    • On-Chain Data & Metrics
    • Adoption & Use Cases
    • Security & Scams
    • Opinion & Predictions
  • Blockchain Technology
    • Enterprise Adoption & Applications
    • Supply Chain & Logistics Solutions
    • Healthcare & Medical Innovations
    • Energy & Sustainability Initiatives
    • Gaming & Metaverse Infrastructure
    • Web3 Development & Decentralization
    • DAO & Governance Protocols
    • Scalability & Interoperability Solutions
    • Privacy & Security Enhancements
  • Trading & Investing
    • Strategies & Techniques
    • Risk Management & Portfolio Allocation
    • Technical Analysis Tools & Indicators
    • Fundamental Analysis & Research
    • Market Psychology & Sentiment
    • Crypto Tax Implications
    • Institutional Investment Landscape
  • DeFi & NFTs
    • Decentralized Finance (DeFi)
    • Non-Fungible Tokens (NFTs)
  • Regulation & Policy
    • Global Regulatory Landscape
    • SEC, CFTC, and Government Actions
    • Tax Implications & Reporting
    • KYC/AML Compliance & Standards
    • Institutional Investment Guidelines
    • Central Bank Digital Currencies (CBDCs)
    • Stablecoin Regulation & Oversight
    • Self-Regulatory Organizations (SROs)
  • Security & Scams
    • Exchange Hacks & Security Breaches
    • Wallet Hacking & Phishing Attacks
    • Rug Pulls & Exit Scams
    • Malware & Ransomware Threats:
    • User Education & Best Practices
    • Regulatory Frameworks & Protections
    • Insurance & Recovery Options
  • Community & Culture
    • Crypto Influencers & Thought Leaders
    • Social Media & Online Communities
    • Memes & Internet Culture
    • Crypto Art & Music
    • Events & Conferences
    • Adoption in Developing Countries
  • Opinion & Education
    • Expert Commentaries & Predictions
    • Beginner Guides & Tutorials
    • Glossary of Crypto Terms
    • Research Papers & Whitepapers
    • Podcasts & Video Interviews
    • Book Reviews & Recommendations
No Result
View All Result
UnCirculars
No Result
View All Result
Home Crypto News & Analysis Security & Scams

7 Best Practices for Enterprise Attack Surface Management

by Emily Green
May 12, 2024
in Security & Scams
0
7 Best Practices for Enterprise Attack Surface Management
491
SHARES
1.4k
VIEWS
Share on FacebookShare on Twitter


More cloud computing solutions, remote and work-from-home systems, and Internet-connected devices increase the risk of an expanded attack surface. As surveys predict that the enterprise attack surface will continue to increase, the best way to reduce the number of vulnerabilities is to establish a proper enterprise attack surface management program.

Several IT assets that access corporate network services lack critical security measures, according to a report by Sevco that analyzed data aggregated from visibility into more than 500,000 IT assets. The report found 11% of all IT assets lacked endpoint protection, 15% of IT assets were not covered by enterprise patch management solutions, while 31% of IT assets were not covered by enterprise vulnerability management systems. It gets worse when the report looks at small to medium-sized businesses (SMBs) that are working on their own to secure their attack surface. The report found 21% of IT assets lack endpoint protection for SMBs that do not use a managed security service provider.

Proper management of the attack surface requires analysis of operations to discover potential vulnerabilities and understand the landscape. That information should help develop a plan, but success depends on executing that plan across the organization’s network, systems, channels and touchpoints.

Consider these best practices when building an enterprise attack surface management program:

1. Map the attack surface

To set up a proper defense, you need to understand what digital assets are exposed, where attackers are most likely to target a network, and what protections are needed. According to Sevco, data aggregated from visibility into nearly half a million IT assets shows that 11% of all IT assets lack endpoint protection. It is therefore critical to increase the visibility of the attack surface and build a strong representation of attack vulnerabilities. The types of vulnerabilities to look for include older and less secure computers or servers, unpatched systems, outdated applications, and exposed IoT devices.

Predictive modeling can help create a realistic depiction of possible events and their risks, further strengthening defenses and proactive measures. Once you understand the risks, you can model what will happen before, during and after an event or breach. What kind of financial loss can you expect? What will be the reputational damage from the event? Will you lose business intelligence, trade secrets or more?

“The successful [attack surface mapping] strategies are quite simple: Know what you are protecting (accurate asset inventory); monitor for vulnerabilities in those assets; and use threat intelligence to know how attackers are getting behind those assets with those vulnerabilities,” said John Pescatore, SANS director of emerging security trends. “…each of those three phases requires skilled personnel with security technology to keep up with the pace of change in all three areas.”

2. Minimize vulnerabilities

Once organizations have mapped their attack surface, they can then take steps to reduce the risk posed by the most important vulnerabilities and potential attack vectors before moving on to lower-priority tasks. Bringing assets offline where possible and strengthening internal and outward-facing networks are two key areas to focus on.

Most network platform vendors now offer tools to reduce the attack surface. For example, Microsoft’s Attack Surface Reduction (ASR) rules allow you to block processes and executables that attackers commonly use. There are other attack surface discovery and management tools designed to quantify, minimize, and harden the attack surface.

Most breaches are caused by human error. So, building awareness and training employees is another critical aspect of reducing vulnerabilities. What policies do you have to help them stay on top of personal and workplace security? Do they understand what is required? What are the security practices they should be using, and how might a failure affect them and the business in general?

Not all vulnerabilities need to be addressed and some will persist regardless. A sound cyber security strategy includes methods to identify the most pertinent sources, picking out which are more likely to be exploited. These are the vulnerabilities that need to be mitigated and monitored.

Most businesses allow more access than necessary for employees and contractors. Sufficiently scoped permissions can ensure that there are no outages or major damage, even when an account is compromised. Start your analysis of access rights with critical systems and then limit each person and device’s access to only those assets they absolutely need.

3. Establish strong security practices and policies

Following tried and true security practices will go a long way in reducing your attack surface. This includes implementing intrusion detection solutions, conducting regular risk assessments and establishing clear and effective policies. Here are some practices to consider:

4. Establish security monitoring and testing protocols

A strong cybersecurity program requires constant adaptation as IT infrastructure changes and threat actors evolve. This requires continuous monitoring and regular testing, the latter often through third-party penetration testing services.

Monitoring is typically done through an automated system such as security information and event management (SIEM) software. It collects log data generated from host systems and applications to network and security devices such as firewalls and antivirus filters. The SIEM software then identifies, categorizes and analyzes incidents and events.

Penetration testing provides unbiased third-party feedback to help you better understand vulnerabilities. Pen testers perform simulated attacks designed to reveal critical vulnerabilities. Testing should touch core elements of the enterprise network and BYOD and third-party devices used by vendors. Mobile devices account for approximately 60% of interactions with corporate data.

5. Harden your email system

Phishing is a common way attackers can compromise your network. Yet some organizations have not fully deployed email protocols designed to limit the number of malicious emails employees receive. The protocols are:

Sender Policy Framework (SPF) prevents the spoofing of legitimate email return addresses. Domain Keys Identified Mail (DKIM) prevents spoofing of the “displayed from” email address, which is what the recipient sees when they preview or open a message. Domain-Based Message Authentication, Reporting and Conformance (DMARC) allows you to set rules on how to treat failed or fraudulent emails identified by SPF or DKIM.

Pescatore recalls working with Jim Routh when he was CISO at Aetna. “He was able to get the organization to move towards secure software development and to implement strong email authentication by ensuring that the business benefit would exceed the security costs if management supported him in making the necessary changes.”

Not all initiatives land, but Routh delivered. His changes resulted in fewer software vulnerabilities and shortened time to market. “Moving to DMARC and strong email authentication increased email marketing campaign click-through rates and essentially more than paid for itself.”

6. Understand compliance

All organizations should have policies and procedures in place to research, identify and understand both internal and government standards. The goal is to ensure that all security policies are consistent and that there is a proper response plan for the various types of attacks and breaches.

This requires the establishment of a task force and strategy for reviewing new policies and regulations as they arise. As critical as compliance with modern cybersecurity strategies is, that doesn’t necessarily mean it should be the priority. “Too often compliance comes first, but nearly 100% of companies that had breaches where credit card information was exposed were PCI compliant. However, they were not safe,” Pescatore said. He believes cyber security strategies must first assess risk and deploy processes or controls to protect the company and its customers. “Then, [enterprises should] provide the documentation required by various compliance systems (such as HIPAA or PCI) showing how your strategy is compliant.

7. Hire auditors

Even the best security teams sometimes need fresh eyes when evaluating the enterprise attack surface. Hiring security auditors and analysts can help you discover attack vectors and vulnerabilities that might otherwise go unnoticed. They can also assist in creating incident management plans for dealing with potential breaches and attacks. Too many organizations are unprepared for cybersecurity attacks because they lacked checks and balances to measure their policies.

“When trying to objectively assess security risk, an external, unbiased perspective can be extremely beneficial,” said Jason Mitchell, CTO at Smart Billions. “Use an independent monitoring process to help recognize risk behaviors and threats before they become a problem on your endpoints, especially new digital assets, new onboarding providers and remote employees.”

Disclaimer for Uncirculars, with a Touch of Personality:

While we love diving into the exciting world of crypto here at Uncirculars, remember that this post, and all our content, is purely for your information and exploration. Think of it as your crypto compass, pointing you in the right direction to do your own research and make informed decisions.

No legal, tax, investment, or financial advice should be inferred from these pixels. We’re not fortune tellers or stockbrokers, just passionate crypto enthusiasts sharing our knowledge.

And just like that rollercoaster ride in your favorite DeFi protocol, past performance isn’t a guarantee of future thrills. The value of crypto assets can be as unpredictable as a moon landing, so buckle up and do your due diligence before taking the plunge.

Ultimately, any crypto adventure you embark on is yours alone. We’re just happy to be your crypto companion, cheering you on from the sidelines (and maybe sharing some snacks along the way). So research, explore, and remember, with a little knowledge and a lot of curiosity, you can navigate the crypto cosmos like a pro!

UnCirculars – Cutting through the noise, delivering unbiased crypto news

Share196Tweet123
Emily Green

Emily Green

Protecting your crypto journey is Emily's mission. Her knowledge of cybersecurity threats and common scams empowers you with safe practices and secure storage solutions.

UnCirculars

Copyright © 2024 UnCirculars

Navigate Site

  • About Us
  • Advertise
  • Terms of Use
  • Disclaimer
  • Privacy Policy
  • Contact Us

Follow Us

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Trading & Investing
    • Risk Management & Portfolio Allocation
    • Strategies & Techniques
    • Fundamental Analysis & Research
    • Technical Analysis Tools & Indicators
  • Crypto News & Analysis
    • Bitcoin
    • Market Overview & Trends
    • Altcoins
    • Technical Analysis & Charting
  • DeFi & NFTs
    • Decentralized Finance (DeFi)
    • Non-Fungible Tokens (NFTs)
    • Exchange Hacks & Security Breaches
    • Wallet Hacking & Phishing Attacks
  • Blockchain Technology
    • Supply Chain & Logistics Solutions
    • Enterprise Adoption & Applications
    • Healthcare & Medical Innovations
    • Energy & Sustainability Initiatives

Copyright © 2024 UnCirculars