It’s a New Year and a Good Time for a Cybersecurity Checkup

Clark Hill PLC
Contact

2023 was another active year in cybersecurity, with high profile vulnerabilities and data breaches, and government and private sector responses to them. Examples include pervasive ransomware attacks targeting the healthcare, government, and education sectors, and other targets, the MOVEit, GoAnywhere, and casino operator attacks, and new regulatory requirements, including the Securities Exchange Commission, the Federal Trade Commission, the Federal Communications Commission, and new state security and privacy laws and regulations. Attacks against unpatched legacy vulnerabilities, like Log4j and Microsoft Exchange, have continued.

As we move into 2024, it is a good time for businesses and organizations of all sizes to review their cybersecurity postures in light of these events and developments, the resulting lessons learned, and any new cybersecurity requirements that may apply. For those that have established cybersecurity programs, it is a good time to review and update them. For those that do not, it is a good time to start the process and follow through to implement a comprehensive cybersecurity program.

Cybersecurity is a process to protect the confidentiality, integrity, and availability of information. Comprehensive security should address people, policies and procedures, and technology. While technology is a critical component of effective security, the other aspects are critical and should also be addressed.

Cybersecurity is best viewed as a part of the information governance process, which manages documents and data from creation or receipt to final disposition. Managing and minimizing data is an essential part of information governance, including security, privacy, and records and information management.

Security starts with an inventory of information assets and data to determine what needs to be protected and then a risk assessment to identify anticipated threats to the assets and data. The next steps are the development, implementation, and maintenance of a comprehensive cybersecurity program to employ reasonable physical, administrative, and technical safeguards to protect against identified risks. Programs covering these safeguards are frequently required by laws, regulations, and contracts for covered industries, protected information, or both.

Comprehensive cybersecurity programs are often based on standards and frameworks like the National Institute for Standards and Technology (NIST) Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1, (April 2018), more comprehensive standards, including NIST Special Publication 800-53, Revision 5, Security and Privacy Controls for Federal Information Systems and Organizations (September 2020) and standards referenced in it, the Center for Internet Security’s CIS Critical Security Controls, V8. (a prioritized set of security actions to protect from cyber-attack vectors), and the International Organization for Standardization’s (ISO), ISO/IEC 27000 family of standards, (consensus international standards for comprehensive Information Security Management Systems (ISMS)). The update should include understanding and applying any changes in applicable standards.

For example, the NIST Cybersecurity Framework is being updated to Version 2 which will add a new core function of Govern to the current Identify, Protect, Detect, Respond, and Recover, recognizing that cybersecurity is best viewed as a part of the information governance process. A cybersecurity program should cover all of these core security functions. In addition, ISO/IEC 27035 (Parts 1-3), information security incident management, has been updated.

These standards can be a challenge for small and mid-size businesses. For them, the Cybersecurity and Infrastructure Security Agency (CISA) maintains a website with Resources for Small and Midsize Businesses and NIST maintains a Small Business Cybersecurity Corner website.

Businesses and organizations with cybersecurity programs should periodically review, evaluate, and update their programs. The review and evaluation should address areas like new or changed hardware, software and business processes, changes in personnel or job functions, supply chain changes, lessons from any security incidents, and updated threat information. They should address emerging technology like artificial intelligence and developing defenses like passkeys, extended detection and response, and zero trust architecture. The review and update should also address new guidance like the Joint Ransomware Task Force’s updated #StopRensomware Guide (October 2023) and the interagency Phishing Guidance, Stopping the Attack Cycle at Phase One (October 2023), published by CISA, the National Security Agency (NSA), Federal Bureau of Investigation (FBI) and Multi-State Information Sharing and Analysis Center (MS-ISAC).

Those without programs should assign responsibility and adopt a plan and schedule for developing and implementing one.

Training is a critical part of a cybersecurity program. The goal should be to promote constant security awareness, by every user, every day, every time technology is utilized.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations. Attorney Advertising.

© Clark Hill PLC

Written by:

Clark Hill PLC
Contact
more
less

PUBLISH YOUR CONTENT ON JD SUPRA NOW

  • Increased visibility
  • Actionable analytics
  • Ongoing guidance

Clark Hill PLC on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide