Vulnerabilities

What Are Vulnerabilities?

Being part of an information security field means that you always have to be aware of known and newly discovered vulnerabilities, especially if they pertain to the technologies you work with. Vulnerabilities are weaknesses or bugs which become security problems of any application or operating system that can be used to the advantage of a hacker.

Once vulnerability is discovered, bad guys will try to exploit it and infect your system. The time between the exploit is in the wild and availability of a patch (an update for the system) is known as Zero Day vulnerability. The name says it all; it is a vulnerability that doesn’t have a fix yet.

To discover existing vulnerabilities on your system, you can run a vulnerability scan (external or authenticated). There are many different software available, both proprietary and freeware. Some well known tools are Qualys, Nessus, Metasploit. If you are hosted in public cloud (GCP, Azure, AWS), you can use cloud native services.

Common Vulnerabilities and Exposures (CVE) are:

  • Backdoors

  • Denial-of-service attack

  • Buffer overflow

  • Direct-access attacks

  • Eavesdropping

  • Spoofing

  • Tampering

  • Privilege escalation

  • Phishing

  • Clickjacking = UI redress attack

  • Social engineering and Trojans

There are more vulnerability types out there and hackers become more and more creative. It is paramount to the security posture of your organization to stay current and apply security patches as soon as they become available.

Cyber Security Posture Defined

unsplash-image-kh9XApwKtm0.jpg

Like in any industry, cyber security and cybercrime is constantly evolving. So, to stay up-to-date, you’ll need to take the time and effort to remain familiar with upcoming trends and lingo.

One such term to the cyber-lexicon is the concept of “cyber security posture.”

What is Cyber Security posture?

Cyber security posture, or security posture, refers to the overall strength of an organization’s policies, safeguards, and effectiveness towards mitigating cyber-attacks. This “posture” focuses on the relative security of an organization’s IT assets, particularly in reference to the Internet and any weaknesses to outside threats.

For organizations that rely on the internet for their business, cybersecurity posture is especially important.

Let’s take a closer look.

Organizations that use hardware, software, digital technologies (e.g. cloud computing and other online services) are vulnerable to current and emerging risks and threats. The policies, procedures, and safeguards to prevent these risks are referred to as cyber security, however, it’s the holistic approach developed to mitigate the likelihood of cyber-related incidents that establishes a cyber security posture. This includes not only the state of an organization’s IT infrastructure, but also any practices, processes, and human behaviours.

Essentially, a strong cyber security posture embodies the complex relationship between people, processes and technology that make up the overall structure of an organization.

To better understand the cyber security posture at your organization, consider the following questions:

  1. What are biggest security concerns (i.e. loss of company’s IP) and weaknesses (i.e. password management) of your organization?

  2. What resources, strategies, and/or measures are already established to mitigate security risks (i.e. malware, un-managed admin credentials) and which ones still require implementation?

  3. Are your policies, procedures, and controls/safeguards up-to-date and capable of preventing security incidents against current and emerging threats?

  4. Do you have security tools that can measure, analyze, and monitor your organization’s cyber security level of exposure?

  5. Are your staff, employees, and senior management educated on your organization’s cyber security policies, procedures, and controls/safeguards?

Without a clear understanding of your current posture, potential threats, risks, weaknesses and strengths, the result can be unwanted issues, wasted security expenses, misalignment of security initiatives and company objectives, and a culture that jeopardizes the overall integrity of your organization.

If you’re not sure what your organization’s cyber security posture is, but want to take a proactive stance to develop, harden, or improve it, here’s what you can do:

  1. Evaluate your organization’s current position on cyber security and determine where you need to go, and what you need to do in order to get there.

  2. Understand gaps in your cyber security;

  3. Invest in appropriate and effective measures to protect confidentiality, integrity, and availability of your critical assets;

  4. Establish an action plan which all levels of your organization can follow to strengthen your cyber security defence;

Ultimately, cyber security posture isn’t just a term you should know, but something you should actively do. Establishing a strong cyber security posture should be the top-most important goal at your organization.

Remember, cyber security is everyone’s job. The success of your organization’s security will be dependent on the compliance of policies, procedures, and controls at every level.