NZCyberResearchCenter

Basic Tools and Controls to Secure and Monitor Assets

saw blade, circular saw, sharp-1801186.jpg

How SMBs can protect their digital assets; below are some tools and features that will give better visibility of your assets and the threat landscape  

System security checklist:  

1.      Apply the patches regularly for OS and applications.

2.      Remove unused software that will enable better security and increase the system performance

3.      Install and configure the security application. (Antivirus)

4. Fine-tune the data access that is necessary for doing the user role       

5.      Enable available hardware security features. (TPM and HSM)

6.      Remove the device that is not used anymore Example: Modem, USB devices and storage, wifi card, and similar devices

7.      Assess tbeforer security controls prior to providing the network connectivity.

8.      Asses and remove dormant accounts — f possible automate

9.    Awareness Training: Human firewalls are the best to protect assets that avoid more than 50% security issues.

Windows tools for securing and monitoring resources:

SysInternals utilities are downloadable from Microsoft for free and only a few tools are discussed below

1.      Performance Monitor:

Using the performance monitor to view performance data in real-time. It may help to understand the hardware resource usage and malicious activity.

2.      Resource Monitor:

a)      It allows us to view real-time information about the hardware resources such as CPU, Disk, Network, and Memory.

b)     Also, able to stop and start the services.

3.      Sysmon: System Monitor (Security utilities):

Sysmon is a Windows system service, Once installs into a system it remains resident across the system to monitor and log systems activity to the event log. Logs provide details about network connection, process creation, and file creation/change time. Analyzing them, you can identify malicious activity and take further action.

Passwords:

All of us are tightly connected with systems and services in our regular activities. Example: Social media to finance system, we do prefer easy simple passwords- Same passwords across multiple platforms, that will put us the higher risk of exposing the multiple accounts.

Some simple methods provide us valuable benefits such as:

·        Use a lengthy password, the lengthy password is safer.

·        Use MFA (Multi-Factor Authentication)

·        Password managers, that may help to create and store strong passwords. Example: DashLane, LastPass, and more.

Router / Wireless Router security:

Main Door for everything and better control required.

·        Changes the default logins. These days routers are not coming with default logins, mostly supplied with unique passwords though it is highly recommended to change. If you can change routers every year or two that may give you more controls.

·        Separate the SSID (Wi-Fi Network) for a different purpose. New routers are capable to handle multiple SSID and guest networks.

·        Update routers (Firmware)

·        Use the Router firewall settings as required.

·        Use MAC filters for best protection

·        Disable WPS

·        Disable remote management features

Recommendations:

·        BitLocker – Windows built-in feature that provides drive full volume encryption.

·        SED drives (Self-Encrypting Drive – SED) SSD and hard drives come with a built-in encryption feature that Encrypts data continuously and automatically.

·        Do not connect or access any IoT devices with accounts or sensitive data systems due to IoT vulnerabilities. Example: Security cameras may have hard-coded logins that are easily accessible.

Below links will provide cyber threat Intelligence and a framework to protect digital assets for SMBs