https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-new-logo.png
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • MSP 501 Rankings
    • NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Channel Futures 20: Top Tech Providers
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2023 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Technology Advisor 101 (TA 101)
    • Channel Leaders Lists
  • Events
    • Back
    • 2023 Call for Speakers
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • MSP 501 Rankings
    • NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Channel Futures 20: Top Tech Providers
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2023 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Technology Advisor 101 (TA 101)
    • Channel Leaders Lists
  • Events
    • Back
    • 2023 Call for Speakers
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Agents
  • Cloud Service Providers
  • Channel Partners Events
 Channel Futures

MSSP Insider


Cybersecurity policy

Top Security Policy Tweaks and Tips for 2019

  • Written by Pam Baker
  • December 5, 2018
Security isn’t just about technology — it’s about policies too.

Companies turn to MSSPs to manage more than just the technology. They look for consultants to help improve their security policies too.

The demand for such help is on the rise as companies struggle to keep up with an ever-growing and changing attack surface. To help you make a checklist of security policy improvements, here are tips and tweaks that experts have discovered in their own quests for tighter and surer security procedures.

Revisit role change and reconcile access procedures. Denying access once an employee leaves a company should be standard security protocol, but alas, it rarely actually happens. Ditto for employees who take temporary assignments, fill in positions until someone is hired, or simply transfer to a new job in the same company.

“Role-based access issues are sorely overlooked in many organizations,” says Tom Garrubba, senior director and CISO with The Santa Fe Group, a consultancy for financial institutions. “This is a growing problem; as people take on additional roles and responsibilities within their organization, there often appears to be very little thought given as to whether the newly assigned roles create ‘segregation of duties’ issues — even if it’s just a temporary assignment. In most cases like this, removal of such access upon completion of the task or duties rarely occurs and can cause complications in compliance with various regulations or industry standards.”

The Santa Fe Group's Tom Garrubba

The Santa Fe Group’s Tom Garrubba

It’s past time to revisit those policies and tighten procedures so that these problems are resolved routinely before they become costly security and compliance issues. Be sure to include policies surrounding the use of automation for these tasks, and also for alerts and audits to be triggered when automation tools are changed, deployed, or discarded.

Roles based access may be defined differently in various automation or machine learning-based technologies and brands. Make sure there is a policy in place to handle shutting those accesses down when a product is no longer in use, and to reconcile roles accesses when databases and/or security automation products are integrated.

Add “Question the Boss” procedures. Phishing is mass emailing in hopes of a few bites. Spear-phishing is aimed at only specific targets. Whaling targets or spoofs the top executives in the organization.

“As people get better at recognizing and ignoring regular phishing attacks, threat actors have upped their game to try to be more convincing, making spear-phishing and whaling more commonplace,” says Avi Solomon, Director of Information Technology at law firm Rumberger, Kirk & Caldwell.

To effectively counter these increasingly sophisticated and convincing attacks, employees will need to feel free to question a command from their boss, or even the company CEO. That comfort level doesn’t exist without a firm policy in place.

“Employees should be more diligent in following up with executives whose correspondence asks them to do uncustomary transactions or engage with persons or organizations they’re not familiar with,” recommends Garrubba.

However, it may be annoying or counterproductive to have all confused employees directly question their boss on the validity of the request or command. If you suspect that may be the case, particularly considering the increasing volume of phishing, MSSPs should consider suggesting a policy requiring a single-step action, such as “forward it over to the IT department for further review and analysis,” advises Garrubba.

Build on mobile data protection and document disposal policies. As more business is done on smartphones and tablets, it becomes imperative to write stronger policies on how data and documents on these devices are to be managed and safeguarded.

A strong security policy should address “good practices when reviewing confidential or sensitive information in public, destruction of paper documents and electronic media and restricting the exportation of data to personal email accounts, personal file share services and USB devices,” advises Mark McCreary, chief privacy officer and partner at the law firm Fox Rothschild LLP.

Use policy to create a security culture. Individual employees might feel overwhelmed, confused or simply too busy to practice good security behaviors. Building a security culture alleviates some of the stress and worry while also improving compliance and standards. Start by writing a policy designed to create a culture of crowdsourced security.

“Have an email address or other channel where employees can forward or report phishing emails they receive, so that everyone across the organization can thwart active phishing campaigns,” advises Stephen Cox, VP and chief security architect at SecureAuth, a provider of identity security automation.

“Share examples of phishing attacks that affected other organizations with employees and discuss how to avoid them. As new methods are identified, or new data breaches become known, foster discussion of their tactics. Encourage others to share news items that they find.”

Dump the legalese in favor of understandable language. Ignorance of the law may be not be an excuse in the eyes of a judge, but a hard-to-understand security policy will be ignored without a second thought. MSSPs need to find ways to address legal issues and attorneys’ concerns in security policies without using legal terms; indeed, doing so looks to be the evolving trend next year.

Tines' Eoin Hinchy

Tines’ Eoin Hinchy

In 2019, “information security policies that are difficult to find, read and understand will be replaced by simpler, shorter, legalese-free policies that are more accessible,” predicts Eoin Hinchy, founder of Tines, a security automation start-up.

Rework policies to fit automated distribution patterns. Automation is making it possible to deliver training and assistance at exactly the time it’s needed.

“The continuing adoption of security automation and orchestration technologies will allow enterprises to move away from annual, compliance-based training, to a more contextually-relevant, event-driven model,” says Hinchy.

Look to build policies to do the same, rather than continue to deliver lengthy sessions or documents. Indeed, modernizing security policies is a potential new revenue stream for MSSPs with an eye toward fitting automated, augmented, self-service and IoT delivery models.

Tags: MSPs Endpoint MSSP Insider Security Training and Policies

Most Recent


  • Making Waves
    7 Channel People Making Waves This Week at AWS, Cisco, Snyk, CrowdStrike, More
    Earlier this year, ServiceNow made a $25 million strategic investment in Snyk. This followed Snyk closing a $196.5 million funding round.
  • AppDirect-TBI, latest channel M&A
    Latest Channel M&A: ReliaQuest, IBM, Broadcom, Amplix, More
    Absolute Software, Procure IT and Qlik were among other companies wheeling and dealing in May.
  • CwCJ with Palo Alto Networks
    Coffee with Craig and James Episode 124: Palo Alto Networks
    Cybersecurity is on the agenda, as we talk threats, channel program and more.
  • Choice of direction for Cisco partners
    Opportunities, Challenges Facing Cisco Partners
    Cisco Live was this week's event headliner. Reps from Computacenter, Molaprise, NTT and WWT weigh in on their experiences.

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • White House
    White House to Private Sector SMEs: Get Serious About Cybersecurity
  • zero trust security
    Leveraging Partner Expertise to Build a Zero-Trust Strategy
  • Security Vulnerability
    Older Fortinet Vulnerabilities Lead to Attack on Local Government Office
  • Threats
    Cybersecurity and Threat Protection: MSSPs, Get Your Advice Here

Upcoming Events

View all

Channel Partners Europe

June 13, 2023 - June 14, 2023

Channel Futures Leadership Summit

October 30, 2023 - November 2, 2023

Channel Partners Conference & Expo

March 11, 2024 - March 14, 2024

Galleries

View all

7 Channel People Making Waves This Week at AWS, Cisco, Snyk, CrowdStrike, More

June 9, 2023

Latest Channel M&A: ReliaQuest, IBM, Broadcom, Amplix, More

June 9, 2023

Images: Channel Partners Conference & Expo Best in Show Awards

June 9, 2023

Industry Perspectives

View all

Identity Is Increasingly Valuable – and Targeted

May 18, 2023

Gaining a Competitive Advantage through AV Managed Services

May 10, 2023

How to Build an Organization That Attracts and Retains Talent

May 1, 2023

Webinars

View all

From Problem to Profit: Mastering the Science of Selling Using Business Outcomes

May 9, 2023

Meet the 2023 Channel Futures Channel Influencers

April 13, 2023

DE&I Dialogue: How the Right DE&I Initiatives Can Propel Your Business

April 5, 2023

White Papers

View all

6 UCaaS Reseller Challenges and How Real World Businesses Solved Them

February 1, 2023

Frost Radar: North American UCaaS Market, 2022

February 1, 2023

The Complete Guide to White-Label UCaaS for Reseller Success

February 1, 2023

Channel Futures TV

View all

Coffee with Craig and James Episode 124: Palo Alto Networks

Motus: Partners Grasping Mobile Workforce Management Opportunity

June 9, 2023

Coffee with Craig and James Episode No. 123: MartinWolf M&A Advisors, CP Expo Preview

April 24, 2023

UScellular Takes On Rivals with Partner Program Simplicity

April 21, 2023

Twitter

ChannelFutures

Channel people making waves include @mnair1, @George_Kurtz, @mike_at_vulcan, @jzoblin, @jpatel41 and more.… twitter.com/i/web/status/1…

June 9, 2023
ChannelFutures

.@motusdotcom wraps its #CPExpo experience, talks mobile workforce management opportunity in the channel.… twitter.com/i/web/status/1…

June 9, 2023
ChannelFutures

Find out why #companyculture is significant when planning a merger or #acquisition. dlvr.it/SqR4ks https://t.co/gAUxiEW4yE

June 9, 2023
ChannelFutures

Great conversation with @Tom_D_Evans of @PaloAltoNtwks talking #cybersecurity, channel, more.… twitter.com/i/web/status/1…

June 9, 2023
ChannelFutures

The latest channel M&A includes @ReliaQuest, @IBM, @Broadcom, @AmpliXIT and more. dlvr.it/SqQntD https://t.co/DektC1Xmz9

June 9, 2023
ChannelFutures

Find out why everyone is talking about generative AI and cloud in this exciting new article >>… twitter.com/i/web/status/1…

June 9, 2023
ChannelFutures

In just 4 days, #ChannelPartners will come together in #London for #ChannelEurope. Professionals from the IT & Tele… twitter.com/i/web/status/1…

June 9, 2023
ChannelFutures

Kicking off a multi-part series, get the inside scoop on what changes are taking pace in the channel. In this galle… twitter.com/i/web/status/1…

June 8, 2023

MSP 501

The industry's largest and most comprehensive partner awards program.

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Galleries

Educational slide shows and images from live events.

Media Kit And Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Events
  • Telecoms.com
  • MSP 501
  • Black Hat
  • IoT World Today
  • Omdia

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X