• About
    • About Us
    • Our Expertise
    • Meet The Team
    • Careers
  • Managed Services
    • Overview
    • Monitoring & Detection
    • Protection
    • Response
    • Training
  • Cyber Assessments
  • Consultancy
    • Consulting Services
    • Cyber Executives
  • News & Resources
    • In the News
    • Blog
    • Resources
  • Contact
Can We Help?
  • About
    • About Us
    • Our Expertise
    • Meet The Team
    • Careers
  • Managed Services
    • Overview
    • Monitoring & Detection
    • Protection
    • Response
    • Training
  • Cyber Assessments
  • Consultancy
    • Consultancy Service
    • Cyber Executives
  • News & Resources
    • In the News
    • Blogs
    • Resources
  • Contact
  • Can We Help?

Why You Should Consider A Cyber Assessment

Most systems evolve over time, especially when it comes to subscriptions to services such as Microsoft 365 and Azure Active Directory. These often release new updates and features which are rolled out to customers, and can be easily integrated with your systems. Their ease of use makes them more accessible to small-to-medium enterprises, but over time, if left unchecked, they could result in vulnerabilities in your system, which are waiting to be exploited by cyber criminals. It’s important to make sure any gaps in your defences are dealt with, and if you don’t know what to look for, a Cyber Assessment could help you address any risks. In short: a Cyber Assessment could be what prevents a data breach happening within your organisation.

Why is a cyber assessment necessary?

The Cybersecurity and Infrastructure Security Agency (CISA) recently issued a warning regarding the current risks to critical infrastructure from state-sponsored malicious actors, particularly from Russian cyber criminals. Ransomware attacks are also on the rise in every sector, with almost any organisation proving to be a ripe target, no matter the size of the business. In recent months there have been announcements of attacks on the tire manufacturer Bridgestone, the workforce management firm Kronos and Strix Group, a manufacturer of temperature controllers for small appliances such as kettles based on the Isle of Man.

What does an assessment entail?

During an assessment, a Cyber Security Consultant will introduce themselves, via a video call with all of the stakeholders in the assessment. Depending on the type of assessment, there may be a requirement to record interviews with individuals. Next, they will ask that a document be completed with an outline of your business’ current network configuration and user accounts.

Whilst best practice is to ensure that documentation like this is continually updated to reflect configuration changes, many IT departments, where a small team may hold the responsibility for all IT operations, find this difficult to maintain in practice. The consultant will then perform an audit. Not only will they attempt to confirm that the provided configuration outline is accurate, but any configuration issues will also be noted (especially when systems interact, or settings are left in the default position - security risks can and do emerge).

What to be on the lookout for

A common entry point for malicious actors is via user accounts. For example, a phishing email containing a credential harvester or an attack such as password spraying. Once initial access is established, this could potentially be used to pivot, with the criminal either taking over or creating an account with high privileges to achieve persistence. Many ransomware attacks start this way, with the malicious actor maintaining an undetected presence for weeks or months before taking any action, making this step particularly important given the current cybersecurity threat landscape.

Any accounts that are not strictly needed should be disabled and deleted by a dedicated administrator as soon as possible. For example, when a member of staff leaves, their account should be terminated during the exit interview. A dedicated administrator account should be in place to perform critical tasks such as account creation and deletion, and this account should be used solely for this purpose -  this makes tracking the activity of privileged accounts much more efficient.  

Privileged accounts and permissions should be audited regularly in order to prevent privilege creep (this happens when a user previously required access to a system, but doesn’t any longer – their access should be revoked as soon as it’s no longer necessary), and organisations should also ensure that role-based access control is implemented.

The steps to take after an assessment

Commissioning a Cyber Assessment has a monetary cost. However, it offers an excellent return on investment, as the cost is far cheaper than the price you’d have to pay following a successful attack. It is rare for the resulting report to contain no recommendations – even if this does happen, though, an assessment is still worthwhile to do for peace of mind. Effectively, it would show that your organisation’s systems are already optimally configured and secured, a fact you will have confirmed by a cyber security analyst.

The post-assessment report is a comprehensive document, outlining the consultant’s findings with an executive summary, followed by a detailed technical breakdown for IT administrators. Cyber security recommendations are then presented, on a scale from ‘Critica’ to ‘Low Risk.’ This allows the organisation to prioritise the recommended actions required to strengthen their cyber defences against the risks found during the assessment. If needed, a cyber security consultant can undertake the recommended mitigations for you.

At Cyber Security Associates, we offer a range of assessments to help you mitigate against security risks, including: Microsoft 365, IT infrastructure, Maturity and Gap Analysis of Data Security against frameworks such as NIST, and ISO 27001 policies. We’re also a Cyber Essentials Certified Provider, and can help you and your business show your commitment to cyber security by obtaining the certification. Don’t hesitate to get in touch with us today to find out how we can help.

Related articles

Posted on December 16, 2021

CSA Awards of the Year 2021

As we near the end of year, an incredibly busy year for our teams in terms of growth and innovation, we wanted to take a moment to…

Posted on December 14, 2021

Cyber Essentials Changes: Here's Everything You Need To Know

Rapid digital transformation, mass adoption of cloud-based services and migration to home-working were necessary changes for businesses…

Posted on December 8, 2021

CSA 12 Days of Cyber Christmas

As the end of the year fast approaches, we wanted to share a little refresher on ways to ensure your technology and data remains…

Posted on December 1, 2021

Planning To Shop Online This Holiday Season? Here Are The Cybercrimes You Need To Be Aware Of

Black Friday and Christmas are considered a blessing and a curse within the retail industry. It’s a time where retailers…

Posted on October 20, 2021

This Apple “AirTag” Vulnerability could be harvesting your credentials

During late September, the headlines were hit with the news of a vulnerability within Apple’s AirTag…

Posted on October 13, 2021

September Security Roundup

Currently, the world faces not one pandemic but two: Coronavirus and the rise of ransomware attacks…

Posted on October 10, 2021

Is Data More Valuable Than Jewels? The A-List Cyber Heist That’s Putting Ransomware Attacks On The Map

Cybercriminals don’t discriminate. It doesn’t matter how famous you are, if your information is vulnerable…

Posted on October 6, 2021

CSA adds Lookout Mobile Endpoint Security to growing solutions portfolio

Following the global pandemic, the mass migration to remote working was a necessary move…

Posted on September 15, 2021

​​The Rising Popularity of NFTs and The Rising Security Threat

The art world is known for being ahead of the curve, adopting new and interesting technologies to…

Posted on September 7, 2021

TG1021 (Praying Mantis): The new threat actor group that could be targeting your IIS servers!

Recently, an infamous threat actor group going by the name of TG1021 or Praying Mantis…

Posted on August 19, 2021

Is Cyber Training and Education working?

The report from the ICO on the ‘surprising’ decline in personal data breaches…

Posted on August 13, 2021

How did an unknown hacker steal over $600M in cryptocurrencies in the biggest ever crypto based cyber-attack?

On 10th August 2021, Poly Network announced in a tweet that it had been attacked…

Posted on May 12, 2021

How to Prevent a Ransomware Attack

According to a 2020 survey by Sophos, 51% of organisations were hit by Ransomware in the last year…

Posted on March 23, 2021

Is your Microsoft M365 service secure from attackers? Are you sure?

The mass migration to remote working as a result of the coronavirus pandemic has…

Posted on January 10, 2021

Covid-19: How to prepare your staff
for remote working

Since the initial Covid-19 outbreak, the nation’s workforce had to learn to quickly…

Posted on December 13, 2020

Covid-19: Cyber Criminals Launch
Their Own ‘Virus’

Whilst the world is currently preoccupied with public health, cyber attackers have taken…

Posted on November 20, 2020

The rise of Covid-19 phishing scams

Whilst the rollout of the Covid-19 vaccine across the UK brings with it the good news…

About

  • About Us
  • Our Expertise
  • Meet The Team
  • Careers

Managed Services

  • Overview
  • Monitoring & Detection
  • Protection
  • Response
  • Training

Consultancy

  • Consulting Services
  • Cyber Executives

News & Resources

  • In the News
  • Blog
  • Resources

Cyber Assessments

Can We Help?

Partner Portal

Contact

Head Office Unit 11, Wheatstone Court, Waterwells Business Park, GL2 2AQ
©2022 Cyber Security Associates. All Rights Reserved.
Terms of Use Privacy Policy
Powered by P1C
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media. To find out more about the cookies we use, see our Privacy Policy.
Cookie settingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT

Can We Help?