The Threat is Coming from Inside Your House!
Photo by cottonbro studio

The Threat is Coming from Inside Your House!

Happy Cyber Entropy Month!? You can read other posts on Cyber Entropy here and here.? And be sure to join our webinar ‘Bringing Order to the Chaos of Cyber Entropy’ on September 5th at noon.

For those of you who read the first post, you’ll remember that there are nine million apps available in the Google store.? You’ll also remember that 97% of them are ‘free’.? The truth is, though, that none of them are free.? If you are not paying with currency, you’re paying with data.? So that means, just with handheld apps, you have nine million ways to lose your data.

Like we said, Happy Cyber Entropy Month!

Data Entropy

More and more and more your data is slipping through your fingers.? It was hard enough when your data was migrating and duplicating from server to server, or from server to workstation.? Or when multiple copies were stored in email as attachments or duplicated ineffectively in your CRM, your ERP, and your HRIS.

Those things are still problems, of course, but it’s getting worse.? There are all those free sites offering what appear to be (and often are) useful tools for your staff to use.? Of course, to use them, to even test them, your staff often use your data.? Once it is in those free systems, it is often very difficult to get out without buying their premium licenses for which you didn’t plan and didn’t budget.?

Now the big challenge is AI.? Often your data is used as part of the input so that staff can get the right answer as output.? But where does that data go?? The nightmare is it is ingested into the LLM to be regurgitated to the next questioner who may or may not be your competitor.? And what if the data used was client data?? What are the repercussions of that?

To combat this, you need to improve your data governance.? Start by building a data inventory.? The best way to do this is by working with each department in the company.? They know what data they use and what is the most valuable to them.? That’s what we care about:? the most important data.? We can get to the other stuff later but we want to protect the good stuff now.

Next, classify that data.? Again, this doesn’t have to be arduous.? Start with internal and public, for example.? Anything internal can’t be stored in unapproved systems.? Then build from there.?

Your third step is creating data flow diagrams to understand how internal data flows between systems.? You might have access controls in place in your CRM, for instance, but when that data flows to your billing system the controls are different and the data gets exposed.? Finally, when you have data labeled, document a cradle-to-grave Information Lifecycle that identifies owners, classifications, labels, and, importantly, retention and destruction plans.?

Access Entropy

Though we didn’t specifically state it above, a big part of what combats data entropy is Access Control.? Following the principles of ‘need to know’ and ‘least privilege’ can ensure that only those who are trained to properly handle your data have access to that data.? The problem is that every single system has multiple layers of permissions and privileges and keeping them consistent is a big challenge.? Further, remember those nine million apps mentioned earlier?? They all have permissions and privileges, too, or they don’t which is even worse.

Privilege Access Management platforms can help with this chaos because they add a documented and time limited layer to privileged access.? That helps limit the number of accounts that have elevated privileges.?

For those specific accounts granted elevated privileges make sure you have a document access lifecycle that follows those principles of ‘need to know’ and ‘least privilege.’? One of the big gaps we see is not in the initial setup of privileges but the maintenance of those privileges.? Companies are usually pretty good at shutting down access when an employee leaves the company but not so good at modifying access for current employees.? When jobs change or roles change, access should, too.?

As we saw in other posts, often the key to controlling cyber entropy is discipline.? Tools, procedures, monitoring, and auditing will only help control the entropy if you follow them religiously.

Good luck!?

I’m always available to help.? I can be reached at [email protected].? Check out our website for more information.? And be sure to catch our webinar on September 5th at 12:00 PM.? Look forward to seeing you there.

Godwin Josh

Co-Founder of Altrosyn and DIrector at CDTECH | Inventor | Manufacturer

6 个月

Cyber entropy refers to the unpredictable and chaotic nature of data within an organization's systems, often stemming from human error, evolving technologies, and inadequate security measures. This can lead to vulnerabilities that malicious actors exploit, making it crucial to implement robust data governance policies and advanced threat detection mechanisms. Given the increasing sophistication of adversarial techniques, how would you leverage behavioral analytics and machine learning algorithms to identify anomalous user activity indicative of insider threats within a dynamic cloud environment?

回复

要查看或添加评论,请登录

Mark Dunning的更多文章

  • Talk About It a Little, a Lot.

    Talk About It a Little, a Lot.

    This is a business post. My daughter has a disease called Usher syndrome.

    9 条评论
  • The Power of Networking

    The Power of Networking

    This is a business post. My daughter was eight years old when she was diagnosed with Usher syndrome.

    4 条评论
  • Happy Usher Syndrome Awareness Day

    Happy Usher Syndrome Awareness Day

    Happy Usher Syndrome Awareness Day! Usher syndrome is the leading genetic cause of deafblindness in the world. It…

    1 条评论
  • How to Be a Good Executive Sponsor

    How to Be a Good Executive Sponsor

    My experience with Executive Sponsors is that they are usually not very good at the role. This is in large part because…

  • The Empathetic Leader: Fifteen Minutes of Happiness

    The Empathetic Leader: Fifteen Minutes of Happiness

    As a leader, you are only as successful as your staff allows you to be. In other words, if they are not performing…

    2 条评论
  • The Empathetic Leader: Who Do You Want to Be?

    The Empathetic Leader: Who Do You Want to Be?

    This is a business blog post. A good friend of mine passed away a week ago.

  • Cyber Entropy Equals Vulnerability Entropy

    Cyber Entropy Equals Vulnerability Entropy

    We’ve reached the end of Cyber Entropy Month. As a capstone, please join our webinar Bringing Order the Chaos of Cyber…

  • A Big World Filled with Opportunity and Obligations

    A Big World Filled with Opportunity and Obligations

    Happy Cyber Entropy Month! You can find our other posts on cyber entropy here, here, and here. Also, remember to join…

  • Your Attack Surface is Bigger than You Think, Part II

    Your Attack Surface is Bigger than You Think, Part II

    Happy Cyber Entropy Month to those that celebrate! If you are not familiar with the terms Cyber Entropy or attack…

  • Your Attack Surface is Bigger than You Think, Part I

    Your Attack Surface is Bigger than You Think, Part I

    It’s Cyber Entropy Month! As my colleague, Scott Foote, wrote “cyber entropy refers to the uncontrolled growth of all…

社区洞察

其他会员也浏览了