Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Ten Questions You Need to Ask Yourself as a Cybersecurity Professional

Businesses and technologies evolve. Sometimes one is faster than the other. Problems arise when business priorities focus on the next widget, production line or service offering, and new technology is put in place to address the gaps. As they say, ‘Necessity is the mother of all invention.’

Picture this: five new widgets are released. Business is booming! All the widgets are selling! Things are great! The board members and shareholders are over the moon and showering your team with praise.

Then the CIO does an audit. Uh oh!

It’s a typical scenario: there’s old equipment from widget number one that can’t be upgraded. The widget has major vulnerabilities, wasn’t connected until widget number four was made and there are shared resources between the two. To make matters worse, the infrastructure is such a unique design that even the vendor that helped build it is no longer supporting it with updates.

Firstly, we need to ask three questions:

  1. How many other business-critical pieces of infrastructure using outdated technology do we have?
  2. What happens if we do nothing?
  3. What can we do to protect our brand? Our Intellectual Property? Our widget?

Secondly, here are a few more issues for the business process owner to consider:

  1. What would a breach cost us?
  2. What east/west access is there from this device? Across the network? Across the company?
  3. What is the cost of downtime (scheduled or otherwise) for one hour? One day? One week?

Finally, a few additional questions around mitigating risk:

  1. Are there local compensating controls that can be put in place? Think out of the box here...be creative!
  2. What about upstream? (Especially with smarter routers and next-generation firewalls.)
  3. What real-time notification or audit processes could be created to notify us of changes and problems?
  4. Is any dynamic process or access required?

The answers to many of these questions are not going to come quickly or easily – that’s for sure!

How Would this Look in a Real-World Scenario?

WannaCry ransomware used vulnerabilities associated with SMBv1, a terribly outdated service protocol found on older Windows systems. Why was WannaCry so effective? These systems were still in use and had easy east/west access for propagation.

I don’t need to repeat the names of the companies that were impacted – we all know them. What is critical however is the number of impacted systems. In most of the $250m+ write-offs by those companies, the number of total locked systems was less than 30.

Once a critical system is compromised, other systems are at risk even if they don’t have the original vulnerability. WannaCry also ‘beaconed’ home... Best practice in these cases? Grab the original OEM disk and reload/rebuild.

You can’t always make the changes you want, but you can put things in place to protect your company – asking the right questions is the first step.

What’s Hot on Infosecurity Magazine?