Scorpiones Group
Loading

Protecting the important assets of your business

You’ve invested in security solutions to protect your business from cyber attacks.
But you also know that no solution is 100% bulletproof – the attackers are going to find their way in somehow.
With that in mind, are you sure that you’re adequately protecting the right assets from intruders?
According to Scorpiones principal security consultant Nimrod Levy, who works with companies on improving their security posture, for too many organizations, the answer turns out to be no.
“Most companies don’t really know what they should be protecting, and what it is that is worth protecting,” Levy said on a recent interview.
According to Levy, this is one of the reasons breaches are so common. “So that means that if you don’t really know who you’re up against,
you’re not going to be successful in trying and detecting ways of people trying to get to the things that are the most important to your business.”

Obviously you need to protect your entire network. But not everything in your network is equally sensitive.
So how do you know which assets justify additional controls? Here are three ways to find out.

Security Screen
Identify your so-called “crown jewels” These are the mission-critical assets that are integral to the success of your business.
Figuring out what those are, where they are located, and then making sure you protect them with an enhanced level of security, is critical.
This might include employee information, intellectual property, business plans, or customer PII (personally identifiable information). Identify other sensitive data that doesn’t necessarily fall under the category of “crown jewels.”
For example, customer lists or yet-to-be-released press releases and company results.
These are items which the leak of wouldn’t necessarily put an end to your organization, but could do harm to your business or reputation.
Figure out your threat model. Which kinds of attackers are most likely to target your business, and what assets are these attackers after?
Could your organization be of interest to a motivated, skilled attacker with a specific purpose in mind?
Or is your most likely attacker an opportunistic criminal just looking for the quickest way to monetize data?
This relates in large part to the industry you are in.

Tags: Red Team Penetration Testing Information Security Network Penetration Testing

Contact Us

SEND A MESSAGE