Posted on Oct 22, 2020
Cybersecurity threats come in many different forms. Organizations deal with unpatched vulnerabilities, websites that redirect to unsecured hosts, and so on, however, employees have the ability to make mistakes that even the most robust cybersecurity protocols have trouble preventing.
While employees are trusted with sensitive information and access to critical systems, attacks that require human manipulation are still listed as the most common forms of attacks, such as, phishing and social engineering.
Security and IT teams need people-centric solutions, as well as technology, to tackle this problem. Empowering employees to adopt cybersecurity best practices allows them to be part of the solution and reduce human error. One way to do this is by using security ratings to help identify vulnerabilities that are potentially related to human error and enable organizations to take the necessary steps towards remediation. Security ratings are an objective, data-driven, quantifiable measurement of an organization’s overall cybersecurity performance.
SecurityScorecard’s security ratings offer insights into 10 different risk factor groups, however, today we will focus on 3: Information Leak, Social Engineering, and Hacker Chatter.
Understand if your organization or those organizations that you work with have potentially had credentials from employee accounts leaked.
SecurityScorecard is able to identify account information circulating within the hacker or security research community. By providing this information on your company scorecard, it enables users to take the necessary precautions to mitigate potential threats.
One step is to ensure that all passwords have been changed since the indication of a breach. In the case of corporate passwords, check logs for repeated failed login attempts or repeated password reset attempts from suspicious IP addresses. Additionally, Security and IT teams should ensure that employees are not using these credentials for any corporate or third-party logins.
Understand if your organization or organizations you work with have had personal information exposed. This personal information could be used in social engineering attacks in order to potentially gain access to other critical systems.
This type of information, such as security questions to reset account passwords, make it much easier and more effective for bad actors to take advantage of or impersonate employees.
Since it’s almost impossible to remove information from the internet once it has been exposed, time would be much better spent on cybersecurity awareness training for employees. Empower employees with cybersecurity best practices to better understand indicators of a possible social engineering attack in the future. Send out occasional, unannounced tests to help you gauge an organization’s understanding of cybersecurity protocols.
While it’s mandatory to report a breach and notify those affected, sometimes an organization may not be aware that they’ve even been breached. Whether a bad actor utilized exposed personal information to gain access to systems, exploited an unpatched vulnerability, or one of the many other ways organizations have been breached, sometimes it takes a while before a breach has been identified. IBM’s The Cost of a Data Breach Report 2020, found that the average time to identify and contain a breach is 280 days. This makes it extremely important for organizations to be able to quickly identify and evaluate any activity around a potential breach, hack, or defacement.
SecurityScorecard enables users to understand if an organization has an alleged breach. SecurityScorecard collects data from social media and known hacker forums for any mention of malicious activity conducted against a domain that belongs to an organization. If identified, the description of the activity, its target, and the source of the allegation is provided and surfaced in the Hacker Chatter factor in the SecurityScorecard platform.
Most importantly, investigate the alleged activity to determine if it can be substantiated and remediate as necessary. If your own organization has an “Alleged Breach” issue on their Scorecard, with the appropriate members of your internal team to investigate. If one of your vendors, suppliers, or any third parties you work with has an Alleged Breach issue on their Scorecard, you can easily invite them into the platform to remediate for free.
Overall, it’s extremely important to incorporate cybersecurity awareness into a company’s culture and enable best practices in order to mitigate human error. However, it’s also crucial to be aware of employee information that may have already been exposed through solutions, like security ratings. This can be an indicator of alleged or future hacks. With this information, Security and IT teams are able to proactively take the necessary steps to protect their organization.
Check out our list of 3 top third party risk management (TPRM) challenges, and the actions you can take to bolster your program. Learn more.
Performing cybersecurity risk assessments is a key part of any organization’s information security management program. Read our guide.
Templates and vendor evaluations are needed to level that playing field, in a time efficient and fair way, so that the best vendors are chosen.
Co-founder and CEO, Alex Yampolskiy, speaks about the importance of measuring and acting on key indicators of cybersecurity risk.
You’ve invested in cybersecurity, but are you tracking your efforts? Check out our list of 20 cybersecurity KPIs you should track. Read more.
No waiting, 100% Free
Get your free scorecard and learn how you stack up across 10 risk categories. Answer a few simple questions and we'll instantly send your score to your business email.