Select Page

Jun 19, 2024

The Starting Point for Cybersecurity 5 Fundamental Principles

by

The need for strong cybersecurity measures is an inescapable part of modern business. Here at Hillstone Networks, we understand how complicated cybersecurity can be. But we also know that far too many organizations have not even mastered basic concepts. There is no point in getting into things like edge protection and extended detection and response before an organization has addressed the basics.

Is your organization struggling with cybersecurity? If so, we want to offer you a starting point. Consider the five fundamental principles described below and how your organization addresses them. Master these five things and you will be on your way to a more secure network environment.

1. Establishing Cybersecurity Policies

One of the easiest mistakes to make in the cybersecurity realm is to employ strategies in a haphazard way. Yet this is exactly what happens when organizations try to implement network security without clear policies in place. Establishing and documenting cybersecurity policies is the first step toward ensuring a secure network.

Cybersecurity policies cover things like usernames and passwords, multi-factor authentication, access control, how sensitive data is protected, and how incidents are reported. A lack of published policies can leave decision makers in a position of having to guess.

2. Passwords and Password Management

The weakest link in any organization’s cybersecurity are the people on the network. This is not meant to be a criticism of an organization’s employees. Rather, it is a simple acknowledgement of the fact that people are often not as secure as machines and software. Therefore, the second fundamental principle of cybersecurity is insisting on proper password selection and management.

It goes without saying that network users should all have a unique, complex password for each system they access. A good password manager with built-in encryption can help secure and manage passwords to minimize the risk of a user relying on the same password for every system.

3. Multi-Factor Authentication

Multi-factor authentication (MFA) is considered standard practice these days. At Hillstone Networks, we encourage clients to implement MFA wherever it is possible. MFA adds an extra layer of security protection by forcing users to verify their identities before logging on to a network.

We like to tie MFA to zero trust network access (ZTNA). ZTNA is an control method that essentially dictates that no one be trusted at face value. Network users need to verify identity and access privileges before they can get into a system.

4. Roles-Based Access

Hand-in-hand with MFA and ZTNA is something known as roles-based access control (RBAC). With RBAC in place, network users only have access to the data and applications they need to do what is expected of them. If a user’s role does not call for access to certain areas of the network, such access is not granted.

RBAC is fundamental to preventing lateral movement by bad actors. Even if a bad actor gets in through a stolen username and password, their movement is limited by that individual’s role.

5. Hardware and Software

Rounding out the five fundamental principles is utilizing the right hardware while keeping all software up to date. Cybersecurity hardware, like firewalls, can help keep attackers at bay. Meanwhile, software is continually being pushed to its limits by creative hackers looking for every possible vulnerability. The only way to stay abreast of their attempts is to keep software updated with the latest security patches.

If all these principles seem pretty basic to you, it is because they are. Yet here at Hillstone Networks, we know that there are plenty of organizations that have not yet mastered them. We aim to change that.