This month was the “Cyber Security Month” and I had the idea to post a security tip on Twitter for the first day. Don’t ask me why. Then, I wrote a second one and decided to tweet something every day. We are now at the end of the day and I’m publishing a recap of all tweets…
- Cybersecurity should not be taken into account only during the Cyber Security Month…
- Wielding the Gartner #MagicQuadrant as a shield will not make you bullet-proof!
- To have a backup procedure in place is nice, but do you have a “restore” procedure?
- The efficiency of your #SIEM is not directly proportional to the number of indexed events!
- Restoring your last backup is not efficient when you faced a data leak
- Afraid of seeing well-trained people resign? What about those who don’t get training and stay on board?
- In meetings, do not always trust the person wearing a tie, the bearded man with a black t-shirt has for sure an interesting point of view!
- Choosing a #MSSP is not only subscribing to a bronze, silver or gold plan. Do they know your business and your crown jewels?
- A backdoor in your security device is not an OOB access solution.
- If you care about being port-scanned, you are focusing on wrong threats!
- Today, many software updates are still delivered over HTTP. Do NOT upgrade while connected to wild networks like #BruCON^Wsecurity conference!
- Thinking that you aren’t a juicy target for bad guys is wrong. You could be (ab)used to reach their final target!
- The goal of a pentest scope is not to prevent known-vulnerable servers or apps to be tested!
- If your organization faced the same incident multiple times, you probably have to optimize your incident management process.
- Many security incidents occur due to the lack of proper solutions for users to work efficiently.
- You don’t include #IPv6 in your security controls because you don’t use it? Wrong, you DO already!
- ML, AI, Agile, … Nice buzzwords but stick to basic security controls first!
- How can you protect yourself if you don’t know your infrastructure?
- Don’t hide behind your ISO certification!
- The best security solution is the one that fulfills all your requirements (features, $$, knowledge, integration). Don’t keep security $VENDORS promises as is, challenge them!
- No incident reported by your SOC for a while… Sounds good or bad? Improve your use cases constantly.
- Send your team members to infosec conferences, they will learn a lot and come back with plenty of ideas.
- Computers aren’t anymore a box with a screen, keyboard and mouse. Today most devices are connected computers with an OS, I/O, memory, storage and… vulnerabilities!
- Today, Infosec plays at layer 8. We have all tools and controls but most of the time we need to compose with political/business/legal aspects to deploy them.
- The Supply Chain does not stop once devices have been received. Decommissioning is also an important step to prevent information leak.
- Most of your security tools have plenty of unused/hidden features, learn them to improve their efficiency! #RTFM
- Docker containers’ purpose is not vulnerabilities containment.
- Assigning less budget to security in the hope to detect fewer incidents is a bad idea!
- Keep an eye on your Internet footprint. OSINT is used by attackers too.
- Don’t be afraid to look like the boring guy to your colleagues. One day, they’ll thank you!
- Take a deep breath and re-read all tips on this blog.