Congratulations! You’ve reached the end of yet another proactive engagement with a security services provider. Now that the engagement is over, what does that mean for you and your business? It usually means that you now
have a list of recommendations to improve the security posture of your organization. This is important information for you and your team that will
help you identify the security
gaps that, if exploited, could
contribute to significant financial costs and reputational losses. The question now is, what should you do next? Perhaps you start working on each and every recommendation the same day you receive the list. More likely, you may wrap these recommendations into another project or initiative, schedule them for completion in the next 6-12 months, or simply throw them by the wayside. I would venture to guess that most vendors believe their recommendations to be your highest priority. So how do you, as a company’s security decision-maker, determine how to allocate your finite funding to maximize your return? In this article, I argue why cybersecurity demands a place at the top of your list. Horseshoes, Hand Grenades, and Cybersecurity? They say that close only counts in horseshoes and hand grenades. But could cybersecurity be another area where “close” is equivalent to “good enough”? Let’s consider this for a minute. If CrowdStrike provides you with a recommendation to disable local administrator rights for all of your employees and you respond by removing this access for all but 5% of your employee base, that’s pretty close right? In this situation, close simply isn’t good enough. More on that later. Let’s look at it another way though. Let’s assume CrowdStrike provides you with a list of recommendations with associated criticality ratings, including eight that are “critical”, four that are “high”, and two that are “medium”. In this instance, if you implement all of the critical and high recommendations, but skip the remaining two, again you have achieved “close” to completion. This time, however, we would praise you for your ability to accomplish the 12 more critical tasks. So when is “close” good enough within the view of cybersecurity? Let’s examine this more closely. Same Bat Issues, Same Bat Recommendations Our goal at CrowdStrike is to help you secure your business against the latest cybersecurity and advanced adversary threats. Our team of cybersecurity consultants and incident responders work with companies who find themselves in many different situations:
- Companies who have experienced data loss of high value assets in the past
- Companies who are currently suffering from an attack where adversaries are stealing data
- Companies who are concerned they have or will be in one of the first two categories.