2021 saw an increase in the number and complexity of cyber attacks, making protection methods once thought optional now critical of any Cyber Security strategy Online PR News – 09-February-2022 – 2021 saw an increase in the number of high profile security breaches, many involving devastating ransomware attacks. Attackers preyed on traditionally softer targets like hospitals, software companies, schools, and local governments in addition to the continued focus on the supply chain. Although the root cause for many of these cyber attacks varies, all took advantage of single factor authentication, weak multi-factor authentication (e.g. OTP), and exposed secrets (e.g. SAML signing keys). The impact these attacks has had on critical infrastructure has spurred the White House into action with an executive order mandating adoption of robust security practices including the use of MFA by Federal agencies. In 2022, Ricardo Resnik, CEO of the MultiPoint Group, expects the trend of extorting victims with ransomware due to enlarge part to the success that ransomware groups had in 2021. Additionally, its expected that there will be additional emphasis on regulations to help accelerate maturing information security practices and principles within vulnerable industries. Here are the MultiPoint Group top information security recommendations of 2022: 1. Zero Trust architecture needs to be a primary initiative for companies Zero Trust security models further the conversation but with the fundamental change in how we approach information security. Instead of assuming the internal environment can be trusted, Zero Trust starts with the presumption that the environment is hostile. Trust is established through inspection and strong authentication but is ephemeral in that trust must be re-establish periodically. In theory, this should limit the impact of a successful breach due to a limited window of opportunity and increased isolation. The Zero Trust Maturity Model that the US government released in September outlines seven tenets of Zero Trust and leaves no doubt that companies will have to act to comply with those pillars in order to stay secure from increasingly sophisticated and widespread cyberattacks in 2022. 2. Companies must adopt phishing-resistant MFA Tools that support multiple authentication protocols can provide a bridge for companies interested in an incremental transition from single factor authentication and legacy MFA like OTP to modern FIDO-based protocols that are resilient to common attacks like phishing. 3. Companies need to get over the fear of the cloud Wholesale cloud adoption is not required in order to gain the benefits of federated identity and strong multi-factor authentication. Most modern identity provider offerings support the FIDO protocols, SAML, and OpenID Connect to assist with integration on and off-premise applications. A comprehensive list of identity providers that support FIDO2/WebAuthn can be found at the MultiPoints site for the different regions. 4. Plan for ransomware Once a plan is in place, it should be tested, especially any backups. 5. Supply chain security requires more care Companies involved in a supply chain will have to establish mutual trust, established by implementing good information security practices throughout their development process and have the ability to demonstrate them externally. Ideally, the entire development process from code commit to release would be secured with strong authentication, robust integrity controls, and least privilege authorization models. Companies implementing that technology must follow industry accepted practices (e.g. Zero Trust) to ensure that technology stays secure with isolation, patching, and resilient access control models. The log4j vulnerability potentially highlighted the importance of securing commonly used and critical open source software. When the software is freely available, who is responsible for its security? 6. User privacy will continue to be a focus for regulators Companies must be protecting regulated information throughout its lifecycle and not just at the point of entry. While CCPA and GDPR do not impose requirements for authentication, we expect to see more and more prescriptive requirements as other jurisdictions develop their own set of requirements. 7. Talk with our MultiPoint experts regarding the discussed topics. |
Ricardo Resnik |
http://multipoint-group.com/ |
74-702-7017 |