Posted on Feb 22, 2021
Data breaches continue to plague businesses across all industries. According to a December 2020 Security Magazine article, 36 billion records were exposed in 2020’s first three fiscal quarters, from 2,935 breaches. In a hyper-connected business world, organizational leaders understand that data breaches are a fact of life. However, these 30 best practices for preventing a data breach can reduce the risk and respond to an attack more effectively.
Before you can prevent a data breach, you need to know the sensitive data you collect, store, transmit, or process. Cybercriminals target non-public personal information (NPI) and personally identifiable information (PII) because they can sell it on the Dark Web. They also target intellectual property, like patent documents or trade secrets.
Although often used interchangeably, NPI and PII overlap in some categories and refer to additional non-overlapping data types.
PII includes all of that data plus the following:
In short, much of the information that an organization collects needs to be protected or, at the very least, disaggregated.
Security professionals argue that you can’t secure what you don’t know you have. Any data breach prevention strategy needs to include learning where you store, transmit, collect, or process sensitive data. As part of the identification process, you might want to consider using an asset detection technology that can help you locate and catalog:
As your digital footprint grows, you add additional locations that store, transmit, process, and collect data. To effectively prevent or mitigate the risk of a data breach, you should be continually monitoring your assets.
Although identifying users may seem easy, many companies struggle because “users” can incorporate multiple types of identities. As you build out your data breach prevention practices, you should think about the following “users,”
Each of these human and machine identities acts as an access point within your ecosystem, making it a potential data breach risk.
One of the biggest problems organizations face is managing all the different devices that interact with sensitive information. As part of the asset detection process, you should make sure that you’re capturing all devices, including:
Each device connects to your network using a communication endpoint called a port. Cybercriminals look for risky ports so that they can gain access to your network so you need to know what ports your devices use so that you can secure them.
For every identified person, device, and location that stores, transmits, collects, and stores sensitive data, you need to assess the level of risk posed. While this may seem easy at first glance, many organizations struggle because as you add more locations, devices, and users to your ecosystem, you also create new risks.
For example, a standard user who only accesses one on-premise application that contains no sensitive data while in an office might be low risk. Meanwhile, a privileged user with elevated access to a cloud-based database storing PII who connects from home with a personal device is a high risk.
The more identities, devices, and locations that store, collect, transmit, or process sensitive information that your organization uses, the more difficult assessing risk becomes.
Although analyzing and assessing risk might appear to be the same thing at first, they are distinct processes that provide different information.
The risk analysis process means you’re looking at types of risks that exist within your organization. With a risk analysis, you take each risk assessment metric and incorporate a data breach’s potential impact.
Traditionally, organizations use a combination of qualitative and quantitative approaches. A qualitative approach might consider the productivity impact a data breach would have, while a quantitative approach would consider the money a data breach costs.
Often, organizations use a risk assessment equation that looks like this:
Risk = Criticality (probability of a data breach x vulnerability score) x Impact
Ultimately, the more important an asset is to your business operations and stability, the more significant impact a data breach has.
The whole purpose of the risk assessment and analysis process is to help you determine your risk tolerance. Risk tolerance is essentially a cost-benefit analysis that compares how important a technology is to your organization’s business goals when compared to the impact a data breach would have.
When determining risk tolerance, you can take one of four actions:
For any risks that you choose to mitigate, you need to establish a set of controls. These controls show that you understand how a potential cybercriminal might gain unauthorized access to the sensitive data, but you have ways to reduce the likelihood of that happening.
Some security controls include:
A cybersecurity policy is a written document that incorporates your risk analysis and risk tolerance. It documents the processes and procedures in place that mitigate data breach risks.
Every IT security policy should, at minimum, include:
Although security and privacy go hand-in-hand, they also have differences. Traditionally, a security policy looks to prevent external unauthorized access to sensitive data. Privacy policies include internal unauthorized access as well as external.
As organizations increasingly adopt cloud-based applications, they need to monitor external access to their systems and networks but also focus on the Identity perimeter. Since users don’t always sit behind corporate firewalls and other traditional security protections, creating Identity and Access Management (IAM) policies becomes more important than ever.
Some things that companies need to consider are:
A fundamental IAM control is to limit user access according to the principle of least privilege, which means ensuring that users can only access information necessary to do their jobs. In a lot of ways, the focus of least privilege follows the old spy movie adage of taking a “need to know basis.”
Many organizations struggle with this because complex, cloud-based ecosystems connect many different business-critical applications like enterprise resource planning (ERP) or electronic health record (EHR) platforms. Often, these applications use different definitions of user roles, which makes limiting access difficult.
Large enterprises face an extra problem. Often, employees change roles within the organization. While they still access certain enterprise resources, they may need access to new ones, depending on their business line. This creates an excess access risk that cybercriminals can use to gain unauthorized access to systems, networks, and applications. Then they move within the IT stack to steal data.
Multi-factor authentication helps mitigate the risks associated with excess user access. Authentication is the process of proving that you are who your login credential says you are. If a cybercriminal steals a password and tries to log into a cloud resource, multi-factor authentication requires them to use more than just the stolen password.
When users log into a web application, they should be using at least two of the following:
Malicious actors can’t easily fake a push notification code sent to a device or a biometric. Thus, when they try to log in and can’t meet this second layer of authentication, they fail.
Moving to a cloud-first or cloud-only IT stack means incorporating more web-based applications into business processes. To thwart attempted cybersecurity threats, like dictionary attacks, you need to create a password policy and define a strong passphrase.
When establishing your password policy, you should incorporate some of the following best practices:
You may also want to consider providing employees with a password management program account so that they are more likely to create unique passwords.
The riskiest identities in an organization are the ones that have privileged access. These can be human users, like system administrators, or machine identities, like software update agents. For example, system administrators have “superuser” access because they need to make critical changes to systems and networks. These activities can include creating new user accounts or updating RPA scripts. Meanwhile, software update agents might need to access critical resources such as operating systems, servers, and databases.
Often, malicious actors gain access to an IT stack by finding a weak login and password combination for either a standard or privileged user. If they get the standard user credentials, they work to gain more access within the system until that account has privileged access. If they gain access with a privileged user account, they automatically have all the access they need.
Monitoring for anomalous privileged access requests and use can help you more rapidly detect a compromised account and reduce your data breach risk.
Most devices, cloud resources, and software come with default passwords. These passwords are often posted on the manufacturer or service provider’s website so that an organization can make changes. For example, to update your computer’s software, the device often prompts for a user or administrator password. In some cases, such as routers or other enterprise devices, the login ID and password may be something as common as:
To update the firmware or set up the device, you may need an administrative password. Most default passwords are the same for all devices within a given product or software line. Companies do this to make it easier to set up the devices, but it also creates a security weakness. If you can look the default password up on the internet, so can a malicious actor. Since these default UserID and passwords often give you privileged access, this gives cybercriminals easy access to your most sensitive networks and systems.
Cybercriminals continue to engage in ransomware attacks. Research from 2020 showed a 715% year-over-year increase in detected and blocked ransomware attacks. Not all malware is ransomware. Often, cybercriminals will include malicious code in social engineering attacks as a way to steal login credentials. Once they steal the credentials, they gain access to systems, software, and networks where they continue to escalate privileges undetected.
One way to mitigate the risks that malware poses is to install an antivirus solution and keep it updated. Most anti-virus software providers regularly update the malware signatures or use advanced analytics to predict new signatures. If a user attempts to access a malicious website or download a risky file, the anti-virus detects the code and quarantines it to protect the device.
Data governance is an offshoot of IAM with distinct functions. Your data governance policy sets out processes and procedures for safe data handling and protection.
At a minimum, it should include processes and procedures for ensuring data:
You also need to think about assigning responsible parties who enforce these policies.
Today’s hyper-connected ecosystem means that third and fourth-party business partners are essential to business operations. While your vendors enable successful digital transformation strategies, they also create new risks because you lack visibility into their security posture.
To protect yourself from a data breach, you need a vendor risk management policy and program that addresses the following risks:
To measure your vendors’ compliance against your policy, you should incorporate clauses in your service level agreements that address:
Additionally, you should establish meaningful key performance indicators for your vendor risk management program.
While backup and recovery may not necessarily look like a preventative measure, it does mitigate many of the data loss and productivity risks associated with ransomware attacks.
Your backup and recovery program should be part of your disaster recovery and business continuity plans. You should make sure that you have three backups on two different media with at least one stored off-site.
Data breach prevention also means having the right teams in place to detect and rapidly respond to potential data incidents. Not every security incident turns into a full-blown breach. In the same way that all squares are rectangles while not all rectangles are squares, all data breaches are security incidents, but not all security incidents are data breaches.
A security incident can include:
Meanwhile, a data breach usually means that a data security incident led to exposing sensitive information. Having an incident detection and response program that you test regularly gives you a way to prevent a security incident from becoming a breach. The more rapidly your incident response team can detect and respond to a security alert, the less likely you are to suffer a breach.
Often, employees want to use their own devices to work remotely or otherwise connect to your corporate network. Unfortunately, you can’t always push the same protections to your employees’ personal devices that you can to your owned ones. Your BYOD policy sets out the rules they need to follow when connecting their devices to your systems and networks.
The BYOD policy should include:
All sensitive data is a risk, even when you dispose of it. Most regulatory and industry standards require organizations to maintain records for a period of time and then safely dispose of them. However, archived information becomes a data breach risk because people rarely access and monitor the location. Meanwhile, disposing of data creates additional risks. Simply deleting electronic data may not remove it from all places you stored it, while physical copies of information need to be shredded.
From a data security perspective, your retention and disposal policy should incorporate:
Depending on the regulations governing your organization, you may need to address how you document disposal and confirm successful data destruction or deletion.
When you encrypt data, you take a format that people can read and scramble it to make it unreadable. Think of it like the math homework assignments you did in elementary school where you had to solve a series of problems and each answer correlated to a letter. You then used those answers to decode a message. Encrypting data works similarly. Even if a malicious actor gains access to your IT stack, the encryption will leave it unintelligible.
When setting best encryption practices for preventing a data breach, you should use Advanced Encryption Standard (AES) cryptography in 128, 192, or 256 bits. Additionally, you need to make sure that you’re encrypting both data-at-rest (saved on a hard drive or disk) and data-in-transit (traveling from one device to another).
Encrypting data-in-transit protects you from cybercriminals who gain unauthorized access to your IT stack. Encrypting data-in-transit protects from attacks that focus on wireless networks, such as man-in-the-middle attacks.
Many cyber attacks start with malicious actors looking for common vulnerabilities and exposures (CVEs). The CVE list is a dictionary of known code vulnerabilities that attackers can exploit. After security analysts discover a vulnerability, they report it to the software or device manufacturer. The manufacturer then generates a software update that “patches” the hole in the code, removing the weakness. Since the list is publicly available, cybercriminals are well-versed in the different security weaknesses and actively look to exploit them.
Often, organizations fail to push security patch updates through to all devices that connect to their systems and networks, especially employee-owned devices. Even one device left unpatched can lead to a successful data breach.
As a best practice, organizations should apply security patch updates within 30 days of the release.
As companies move to the cloud, storage and processing locations become more abstract. For example, your on-premises server was often located in a building with security guards and physical locks. Today, cloud storage and processing locations consist of code. For example, according to one 2020 InfoSecurity Magazine article, 73% of surveyed cloud engineering and security teams said that they had more than ten cloud misconfiguration incidents per day, while one third experienced over 100 and another 10% over 500 incidents per day.
Some common misconfigurations include:
You might think it sounds hyperbolic to say that misconfigurations lasting only a few seconds or less can be a data breach issue. However, just as your company’s security team scans your cloud services continuously, so do malicious actors.
To reduce the risks associated with misconfigured cloud resources, you should make sure that you’re scanning all of the following:
Every cloud resource, endpoint, access point, and user generates event log data. This data gives you visibility into all activity across your IT stack, but it can often become overwhelming. However, each cloud resource, application, and endpoint submits event log data differently. They may use different formats or report different types of information which makes comparing them as part of your threat hunting and alert response process time-consuming.
Centralized log management solutions enable a more robust cybersecurity posture because they give you a way to collect, aggregate, and correlate log data efficiently. In doing so, they make it easier to locate and remediate weaknesses. The more rapidly you can remediate risks, the more likely you are to prevent a data breach.
Employee cybersecurity awareness training needs to be meaningful and useful to protect against social engineering attacks. As part of your data breach prevention practices, you need to provide training, assess user knowledge, and ensure minimum baselines.
Cybercriminals often engage in social engineering attacks to obtain otherwise-unauthorized access to systems, applications, and networks. Your training materials should include:
As part of your employee security awareness training program, you should document assessment outcomes and periodically provide additional training modules.
The only consistent thing in cybersecurity is the fact that it’s not consistent. Malicious actors continuously evolve their threat methodologies which means that the controls that protect today may not be adequate tomorrow.
Regulations and industry standards increasingly recognize that point-in-time control reviews no longer secure data. To prevent a data breach, you need continuous, real-time visibility into your controls’ effectiveness.
When establishing best practices, you want to set up alerts for several areas that cybercriminals target, including:
While these are only a few issues that impact enterprise systems, networks, and devices, they provide visibility that can mitigate some common attack vectors.
Nearly every organization must meet one or more compliance requirements. While compliance is not equal to security, it often gives visibility into how well your organization enforces security controls and practices.
Point-in-time audits are no longer effective measures of security robustness. However, the documentation that shows your ability to monitor your control environment continuously and mitigate new risks proves governance over your security posture. By documenting your activities, you gain insight into your cybersecurity program’s maturity and continuously improve your program.
Establishing best practices for preventing a data breach can be difficult but enforcing those best practices feels overwhelming in complex, interconnected IT ecosystems. SecurityScorecard’s security ratings platform continuously monitors security controls’ effectiveness across ten categories of risk and alerts you to new threats.
With our at-a-glance A-F security ratings, you can gain visibility into your IT stack security and monitor your third-party vendors for enhanced security. Customers have aligned their security programs and vendor risk management programs with our platform’s ten risk categories. This alignment gives them a way to establish meaningful, objective cybersecurity key performance indicators to create a quantitative approach to managing risk.
Enterprise security teams receive high volumes of alerts every day, making prioritization and remediation difficult. SecurityScorecard’s alerts incorporate a risk review and actionable remediation steps so that you can prioritize your daily activities.
Establishing best practices for preventing a data breach is the first step to security. Continuously monitoring controls and enforcing policies with SecurityScorecard’s platform allows you to mature your security posture.
Check out our list of 3 top third party risk management (TPRM) challenges, and the actions you can take to bolster your program. Learn more.
Performing cybersecurity risk assessments is a key part of any organization’s information security management program. Read our guide.
Templates and vendor evaluations are needed to level that playing field, in a time efficient and fair way, so that the best vendors are chosen.
Co-founder and CEO, Alex Yampolskiy, speaks about the importance of measuring and acting on key indicators of cybersecurity risk.
You’ve invested in cybersecurity, but are you tracking your efforts? Check out our list of 20 cybersecurity KPIs you should track. Read more.
No waiting, 100% Free
Get your free scorecard and learn how you stack up across 10 risk categories. Answer a few simple questions and we'll instantly send your score to your business email.