Site icon Inc42 Media

How Startups Can Build A Robust & Resilient Cybersecurity System

How Startups Can Build A Robust & Resilient Cybersecurity System

In a data science business, everything puts customer data at the heart, the majority of which is provided to a company by its clients. Loss of confidentiality, integrity, or availability (CIA) of that data could have a significant impact on the ability to operate the business. 

Failure to sell new business, loss of current customers or a refusal to be custodians of customer data are all realistic possibilities in such circumstances. The massive loss of reputation as a result of a major breach is also a significant loss. 

The risk is compounded by a general increase in cyber-attacks across the industry. The Federal Bureau of Investigation (FBI) continues to warn of exponential rises in ransomware affecting company operations. Furthermore, the Information Security Forum (ISF) warns that cyber criminals are evolving their attacks to target ‘trust’ between organisations, using a combination of techniques including ‘poisoning’ a company’s data.

Any customer data science or customer data-centric organisation should have a systematic step-by-step approach to tackle the ever-growing IT security challenges. 

Step 1: Assessment Of Current State & Target Security Maturity State

A good starting point would be to assess our security against a maturity model like NIST (National Institute of Standards and Technology). The following is an example of a Current vs. Target state at the end of an assessment:

This assessment, in conjunction with a progressive transformation programme, could help improve the overall maturity of the security system in order to better support the business.

Step 2: Understanding The Threats Landscape

There are six generic threat categories an organisation should be up against. These comprehensively cover the main areas that must be mitigated to reduce the risk of data and data-science-centric business. 

Step 3: Current & Future Threat Profiling

Two levels of detailed threat profiling should be considered while preparing an organisation for a specific defence.

Step 4: Creating Defences Through A Layered Defence Model

Once we’ve identified threat profiles, we can consider implementing IT controls defined within a layered defence model against each high-level threat. The following is a prioritised control list for a typical data science organisation (where we should be concentrating our efforts first). 

Step 5: Addressing IT Security Challenges

Implementing Access Filtering 

Key risks addressed in this category to limit internet access are as follows: 

Implementing Email Security

Email is a primary weapon for spreading ransomware, an advanced threat that can affect multiple endpoints and steal sensitive data. Therefore, an email protection plan needs to include the following best practices to protect email traffic in real-time.

Implementing Vulnerability Management

An external vulnerability scan ensures that your external firewalls are impenetrable while an internal scan searches the interior network to ensure that the computers within your network are secured properly.

Implementing Data Governance

Implementing Multi-Factor Authentication (MFA)

The goal of MFA is to create a layered defence that makes it more difficult for an unauthorised person to access a target, such as a physical location, computing device, network, or database. If one factor is compromised or broken, the attacker still faces at least one or more barriers to breach.

MFA works by combining two or more factors from these categories:

 

Exit mobile version