Understanding your Firm’s Attack Surface – yes, you do have one!
ITS Recruitment | ITS Works
For 25 years ITS has supplied IT staff and technology solutions to over 100 law firms
?
Your “Attack Surface” - We use this term to describe the sum of all possible points, where cybercriminals can breach your systems and compromise your firm’s data.
An “Attack Vector” refers to the specific method used to gain access to your systems. Common attack vectors include:
Attack Surfaces - you have more than one!
?
1.?? Digital Attack Surface
This encompasses everything accessible through the internet, which has the potential to be compromised and provide unauthorised access to your data.
Remember that any device that is outside of your firm’s firewall and accessible via the internet is considered part of your digital attack surface.?
2.?? Physical Attack Surface
This means any assets and information that can be accessed physically, i.e., within a physical office or via mobile endpoints, PCs/laptops, IoT hardware etc.
The most common attack vector comes from malicious insiders; either disgruntled staff or simply careless employees. Employees with a grudge may misuse their access privileges to compromise or appropriate sensitive information. Careless employees may not actively compromise your systems, but they will create opportunities for others to do so.
3.?? Social Engineering Attack Surface
Social engineering?simply means the manipulation of individuals by email, text or even voice into sharing sensitive information, downloading malicious software, and transferring money to cybercriminals. Your social engineering attack surface is determined by the number of users with authorised systems access, who are vulnerable to psychological manipulation.?
Attack vectors can include:
?
领英推荐
Large Attack Surface = Increased Security Risk
It’s no surprise that the larger the attack surface, the harder it is to manage the various points of unauthorised access to sensitive information. Reducing your attack surface reduces the number of vulnerable points that can be exploited and at the same time makes it easier to manage your security, since there are less vulnerabilities to protect and secure by implementing best practises.
Reduce your firm’s vulnerable attack surface:
Implement the Principle of Least Privilege
Users should only have the minimum amount of access to systems and data required to carry out their work. Remember that unnecessary privileges may enable attackers to move laterally through your firm’s network.?
Adopt a Zero Trust policy
All users and devices should be continuously validated and access to systems and critical data strictly managed. Multi factor authentication is a minimum requirement.
Ensure all software is updated with current versions
Software, operating systems, and applications must all be updated with the latest versions or patched to address known and potential vulnerabilities. Enable automatic updates wherever possible.
Use an enterprise level Password Manager
Ensure you have visibility of your employee’s password practises, provide safe password storage, and allow teams and groups to securely share passwords.
Last, but certainly not least -
Train employees on Cybersecurity
Your employees are the primary attack vector for cybercriminals, making it crucial to train them on what?cyber-attacks?are, and how to spot them, as well as making them aware of cybersecurity best practices. Provide security awareness training, online, in-person or whatever format suits your firm training. Raising employee awareness will reduce the likelihood of a successful attack.
Reducing your attack surface can seem complicated but it needn’t be. Get in touch to discuss how we can help you to reduce the risk of cyberattacks on your firm.
?