What is a Cyber Security Posture Assessment

What is a Cyber Security Posture Assessment? Understanding Your Risks

Everything You Need To Know To Benchmark Your Cyber Security Posture

A cyber security posture assessment is a structured review of how well an organisation prevents, detects and responds to cyber threats.

It benchmarks current controls and processes against recognised good practice, highlights gaps, and prioritises improvements so that effort and investment go where they deliver the greatest reduction in risk.

Understanding an organisation’s specific cyber risks is essential to building proportionate countermeasures. Without a clear view of risk, it is easy to overspend in some areas, underinvest in others, and leave critical weaknesses unaddressed.


“We cannot treat everything the same way we did in the past. Major disruption may be only one crisis away. We cannot control it, but we can evolve our thinking, philosophy, programme and architecture.”

– Gartner


Why Posture Matters

Threats and attack paths continue to expand

Adversaries exploit people, processes, technology and supply chains.

Regulatory and customer expectations are rising

Organisations are expected to safeguard data, demonstrate due diligence, and recover quickly from incidents.

Resources are finite

A posture assessment helps align budget and effort to the areas that reduce risk most effectively.


The NCSC 10 Steps to Cyber Security

The UK National Cyber Security Centre’s 10 Steps to Cyber Security provide a strong foundation that organisations can adopt and tailor:

  1. Risk Management
    Establish governance, define risk appetite and make informed decisions about priorities.
  2. Engagement and Training
    Build security awareness, culture and capability across staff and leadership.
  3. Asset Management
    Know what you have, where it is, who owns it and how it is supported.
  4. Architecture and Configuration
    Secure by design, harden configurations and reduce attack surface.
  5. Vulnerability Management
    Identify, prioritise and remediate vulnerabilities on a continuous basis.
  6. Identity and Access Management
    Enforce least privilege, strong authentication and robust lifecycle controls.
  7. Data Security
    Classify, protect, back up and securely dispose of data.
  8. Logging and Monitoring
    Collect relevant logs, detect anomalies and respond quickly.
  9. Incident Management
    Prepare playbooks, test response and improve after every exercise or incident.
  10. Supply Chain Security
    Assess and manage risks introduced by suppliers and partners.

These steps represent best practice, although not every control applies equally to every organisation. Tailoring is key.

Learn More

The CyberLab Guide to Cyber Security Posture Assessment

CyberLab translates the 10 Steps into an accessible, outcome‑focused approach that meets each customer where they are. Drawing on practical experience, the guide helps organisations:

  • Clarify what cyber security means for their context and risk profile
  • Focus attention on the areas that matter most
  • Build a realistic strategy and roadmap that balances protection, detection and response

The aim is to create a robust, proportionate and achievable plan that strengthens posture today and adapts to tomorrow’s threats.


How it Works

  1. Online assessment
    The posture assessment is completed online, ideally with a CyberLab representative to capture the richest context. It typically takes 45 to 60 minutes.
  2. Immediate scorecard
    On submission, an automated scorecard is emailed that indicates relative strengths and weaknesses across key domains.
  3. Expert review and bespoke report
    Where CyberLab is engaged, a cyber security specialist reviews the results and produces a tailored report that explains findings, prioritises risks and recommends pragmatic improvements.
  4. Roadmap and next steps
    CyberLab then walks through the report with stakeholders to agree a right‑sized roadmap, sequencing initiatives for maximum risk reduction and value.

Alongside cyber security expertise, CyberLab also supports modern IT and service provisioning. For organisations using platforms such as Microsoft 365, the assessment can highlight opportunities to harden configurations and realise more value from existing investments.

Get Started

Six Benefits of a Cyber Security Posture Assessment

  1. Validate your current approach
    Confirm whether controls are configured effectively and proportionately. If there are gaps or misconfigurations, identify them early with guidance from specialists.
  2. Target improvements where they matter
    See where you are strong and where improvement is needed. In some cases, consolidating tools or replacing one control can free budget to strengthen multiple weaker areas, producing a better overall posture.
  3. Visualise your future state
    Translate findings into a clear get‑well plan and roadmap. Define milestones, owners and measures of success so progress is visible and sustainable.
  4. Gain peace of mind
    No environment can be 100 percent secure. The assessment helps ensure the critical 99 percent is addressed, reducing uncertainty and improving resilience.
  5. Mitigate risks from known weaknesses
    Not every issue can be fixed immediately. Interim mitigations, compensating controls and monitoring can reduce exposure until full remediation is in place.
  6. Justify investment with evidence
    A tailored report provides the business rationale for change, helping stakeholders understand risk, cost and benefit so funding decisions are informed and timely.


Getting Started

  1. If your organisation would like support to assess and strengthen its cyber security posture, CyberLab can help. Contact the team to schedule an assessment and begin shaping a roadmap that fits your environment, budget and risk appetite.We are here to help protect organisations from cyber attacks and to make security practical, proportionate and effective.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Securing Healthcare Organisations

Securing Healthcare Organisations with Modern Cyber Defence Strategies

Navigating Cyber Security Challenges

Healthcare organisations often face challenges in safeguarding sensitive patient data and critical infrastructure.

With 67% of healthcare organisations hit by ransomware last year, the threat level is high. In this blog, we explore the complexities of securing healthcare organisations amidst the evolving threat landscape and discuss strategies to mitigate risks effectively.


Understanding the Threat Landscape

Healthcare organisations are prime targets for cyber attacks due to the valuable information they possess, including medical records, financial data, and intellectual property. Threat actors, ranging from cyber criminals to nation-state actors, constantly probe for vulnerabilities to exploit.

Some of the most common threats to healthcare include:

  1. Phishing Attacks: Cyber criminals use deceptive emails or messages to trick employees into revealing sensitive information or installing malware.
  2. Ransomware: Malicious software encrypts critical data, rendering it inaccessible until a ransom is paid, disrupting healthcare operations and patient care.
  3. IoT Vulnerabilities: The abundance of Internet of Things (IoT) devices in healthcare introduces new attack vectors, posing risks to patient safety and data integrity.

Cyber Diagnosis: Navigating Cyber Security Challenges in Healthcare

In this exclusive webinar hosted by CyberLab, in collaboration with industry-leading partners Sophos, Logpoint, Forescout, and SecurEnvoy, we explore how to safeguard healthcare organisations against cyber threats.


“We have Microsoft E5 licences, are the included protections enough?”

Many healthcare organisations leverage Microsoft E5 licenses for cyber security capabilities. While these subscriptions offer robust security controls, they may not address all security requirements.

  1. Comprehensive Coverage: Assess whether E5 subscriptions adequately cover endpoints, servers, and other critical assets, including unmanaged IoT devices.
  2. Third-Party Integration: Evaluate the interoperability of Microsoft tools with third-party solutions to ensure comprehensive threat detection and response capabilities. For example, Sophos offer MDR for Microsoft Defender.
  3. Continuous Improvement: Cyber security is an ongoing process and organisations need to invest in regular assessments, updates, and training to stay ahead of emerging threats.


Balancing Budget Constraints and Cyber Security

Securing healthcare organisations requires striking a balance between budget constraints and cyber security needs. Key strategies include:

  1. Risk-Based Approach: Prioritise investments based on the organisation’s risk profile, focusing on critical assets and vulnerabilities.
  2. Baseline Security Practices: Implement foundational security measures, such as patch management, access controls, and employee training, to establish a strong security posture.
  3. Vendor Collaboration: Partner with trusted vendors and technology providers to leverage expertise, identify gaps, and implement cost-effective security solutions tailored to the organisation’s needs.


Next Steps

Securing healthcare organisations is a multifaceted challenge that demands a proactive and strategic approach. By understanding the evolving threat landscape, evaluating security controls, and balancing budget constraints with cyber security priorities, healthcare institutions can mitigate risks effectively and safeguard patient data, ensuring continuity of care.

CyberLab look after over 150 public and private healthcare providers, working together to develop solutions that secure their sensitive data, meet compliance requirements, and ensure online threats don’t compromise their operation.

Our range of security services and solutions have been developed to meet the requirements of the NHS Data Security and Protection Toolkit (DPST) and future-proofs against the NCSC’s Cyber Assessment Framework (CAF).

Want to know more about how to secure your healthcare organisation? CyberLab will be at the Healthcare Excellence Through Technology (HETT) Conference in London, so come and talk to us!

Find out more about our healthcare solutions or book a consultation to speak to one of our experts.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Synchronised Security

Five Significant Savings with Synchronised Security for All Teams

How Sophos Central Cuts Costs While Strengthening Cyber Defence

With Sophos continuing to phase out legacy on-premise platforms in favour of next-generation cloud-managed solutions, now is the perfect time to revisit the benefits of Synchronised Security – and how it can deliver measurable savings across your organisation.


What is Synchronised Security?

Synchronised Security is Sophos’ integrated cyber security ecosystem. It connects endpoint, firewall, mobile, email, Wi-Fi, and encryption products through Sophos Central, a cloud-native platform that enables real-time data sharing and automated incident response. [sophos.com]

This system:

  • Automatically isolates compromised endpoints
  • Shares telemetry across products to detect lateral movement
  • Restricts access for non-compliant devices
  • Provides unified visibility and control from a single dashboard


Top 5 Savings in 2025

1. Reduced IT Security Headcount

Sophos Central’s automation and AI-native threat response mean that 95% of incidents are resolved without human intervention. This allows teams to focus on strategic remediation, reducing the need for large security teams.

2. Time Saved on Admin Tasks

Sophos Central consolidates data across all security products, reducing the time spent on manual updates and investigations. Sophos reports a 50% reduction in time and effort spent by IT teams on day-to-day security operations.

3. Faster Incident Identification

Thanks to synchronised telemetry and automated scanning, the time to identify threats has dropped by 90%, enabling faster containment and reduced exposure.

4. Fewer Security Incidents

Sophos customers report an 85% reduction in the number of incidents requiring investigation, thanks to proactive threat detection and cross-product intelligence.

5. Minimised Downtime

Devices under investigation remain online and protected, thanks to endpoint isolation and continuous updates – even during containment. This avoids the productivity loss associated with manual quarantining.


2025 Enhancements Worth Noting

  • Sophos MDR Bundles for MSPs now include extended data retention, network detection, and Microsoft 365 response actions.
  • Firewall + Endpoint Integration Offers provide free trials and discounts for new customers.
  • Command-line controls allow fine-tuning of synchronised security behaviour for advanced users.

Don’t Compromise on Security

Whether you’re migrating from legacy Sophos products or looking to reduce IT costs without sacrificing protection, Synchronised Security offers a future-proof solution. Flexible licensing options – including monthly billing – help preserve cash flow while scaling your defences.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Mobile Security Threats

Mobile Security Threats & How To Protect Yourself from Common Risks

Your 2025 Guide to Mobile Threats and Defences

Adam Myers, Sales Director at CyberLab, outlines the evolving mobile threat landscape and offers actionable advice to help organisations and individuals secure their mobile devices.

Mobile devices are now central to business operations. According to Microsoft, over 80% of daily work is conducted on mobile platforms. These devices operate outside traditional corporate firewalls and are often in the hands of users who may not prioritise security – making them prime targets for cyber criminals.


Why Mobile Security Matters More Than Ever

Employees routinely access emails, documents, customer data, and applications via mobile devices. While this boosts productivity, it also increases exposure to threats such as malware, phishing, and data breaches.

The rise of Bring Your Own Device (BYOD) policies and remote work has further complicated mobile security management.


Top Mobile Security Threats in 2025

1. Outdated Operating Systems and Security Patches

Devices typically stop receiving updates within 3–4 years of release. Unpatched vulnerabilities are a leading cause of mobile breaches. Microsoft’s Secure Future Initiative urges organisations to retire outdated systems before they become liabilities.

2. Unsecured Third-Party Apps

Apps downloaded outside official stores (e.g. sideloaded APKs on Android) can introduce malware. These apps may access sensitive data, including passwords and banking details, without user awareness.

3. Weak Passcodes

Simple passcodes like “1234” or birthdates are easily guessed. Best practice now recommends 8-digit passcodes with no repeating patterns. Biometric authentication and phishing-resistant MFA are also strongly advised.

4. Unsecured Wi-Fi Networks

Public Wi-Fi remains a major risk. Attackers can intercept unencrypted traffic or hijack sessions. Microsoft recommends avoiding public networks unless using a trusted VPN.

5. BYOD Risks

Personal devices used for work can introduce threats if not properly managed. Risks include data theft, unauthorised app downloads, and lack of visibility into device security posture.

6. Lack of Endpoint Protection

Endpoint protection is no longer optional. Sophos and Microsoft now offer AI-powered threat detection and response for mobile endpoints, including behavioural analysis and automated containment. [microsoft.com]

7. Device Loss or Theft

EE reports that 10 million work devices are lost annually. Mobile Device Management (MDM) solutions allow remote wiping, location tracking, and access revocation to mitigate this risk.

8. Human Error

Employees remain a top vulnerability. Regular training and phishing simulations are essential. CyberLab’s layered security approach includes education, monitoring, and proactive threat hunting.


Mobile Device Management (MDM): Your First Line of Defence

An MDM solution helps organisations:

  • Remotely wipe or lock lost devices
  • Enforce strong passcode policies
  • Ensure OS updates are applied
  • Restrict access to risky apps
  • Manage BYOD securely

MDM is cost-effective, easy to deploy, and scalable. CyberLab offers tailored MDM solutions—from entry-level setups to enterprise-grade deployments—based on your business needs.

Tales from the CyberLab: Cyber Security for Websites & Applications Explained


CyberLab Can Help

Speak with a CyberLab expert to review your mobile security posture and explore solutions tailored to your organisation. Book your free 30-minute consultation today.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Access and ID Management

Identity and Access Management: Controlling Access in a Digital World

Controlling Access in a Digital World: Why IAM Matters More Than Ever

Identity and Access Management, often shortened to just IAM, is the practise of ensuring that identity of who and what is accessing your environment is under control – that is, you have systems and, by association, data that can only be accessed by users and devices that you have authorised.

But it’s a lot more than just that, in any organisation people come and go, it is also about making sure that when users (or devices) should no longer be authorised to access your systems that they are not still able to do so.

It sounds simple, but in a busy organisation it is easy for simply disabling a user account to be forgotten. Removing access for users or devices is a vitally important step in any cyber security strategy, especially under unfortunate circumstances when people leave a business on bad terms.

Identity and Access Management is a crucial aspect of cyber security. It involves controlling who and what can access your systems and data. Access to data, systems, and services need to be protected. Understanding who or what needs access, and under what conditions, is just as important as knowing who needs to be kept out.


Why do we need Identity and Access Management?

Data is the lifeblood of any business; in any digital organisation today it is a critical component in maintaining business as usual operation, theft, access denial or destruction of data is not only disruptive, but without good backups it can be devastating at scale.

The next step is controlling access to the data. Any organisation will have sensitive data, and that data is sensitive for a reason, it would likely be detrimental to the business if lost or released publicly. Ensuring the data is only accessible to parties that are trusted and need to access the sensitive data is another essential part of Identity and Access Management.

Implementing Identity and Access Management

Which brings us to the how. In modern IT the term identity encompasses much more than just the user account in active directory, there can be multiple associated devices the instantaneous status of which can be leveraged to provide additional security. For example, you could consider whether a device is managed by the organisation? What is the patch status of a laptop? Is the mobile device jail-broken or rooted?

The steps below are suggestions on things that can be done, they are by no means exhaustive and not every step is applicable or appropriate for every organisation; but by implementing these elements you can have confidence that you are doing IAM right:

Identity and Access Management Policies

Organisations should look to develop appropriate IAM policies and processes.

  • Control who and what can access your systems and data. A good IAM policy that covers who should have access to which systems, data or functionality, why, and under what circumstances.
  • Consider all potential types of user including full and part-time staff, contractors, volunteers, students, and visitors.
  • Ensure the policy covers what and how audit records are acquired, and how they are safeguarded against tampering, and an identification of which actions or processes, if any, should require more than one person to perform or authorise them.
  • Policies should not just cover systems you control, but also wherever your organisational identities can be used – for example, consider the websites or online services that staff can create an account by using their work email address.

Login Methods

Establish and prove the identity of users, devices, or systems, with enough confidence to make access control decisions. Single sign-on (SSO) may be available using your organisational identity for some online services to help you control access to those services (and revoke access along with someone’s work account when they leave your organisation).

New Starters, Movers and Leavers

Ensure your account management processes include a ‘joiners, movers and leavers’ policy, so access can be revoked when no longer needed, or changed for movers. Temporary accounts should also be removed or suspended when no longer required.


In Conclusion

By following these steps, you can ensure that only individuals and systems that are authorised to have access to data or services are allowed to do so. This will result in less impact on staff’s workday by getting IAM right across an organisation, smoother collaboration with customers, suppliers, and partners.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Secure Architecture & Configuration for Cyber Security

Secure Architecture & Configuration for Cyber Security

Design, Build, Maintain and Manage Systems Securely

Our host on the “10 Steps to Cyber Security” series outlines how organisations should use architecture and configuration to optimise cyber security.
They cover:
  • Understanding what you are building and why
  • Making systems that are easy to maintain and update
  • Making compromise and disruption difficult
  • Reducing the impact of compromise
  • Making it easy to detect and investigate compromises
  • Safely developing and managing systems

Adopting a secure architecture is an ideal most organisations aspire to. However, most companies have an existing environment that was architected years ago when the cyber security threat landscape didn’t vaguely resemble the threat landscape we have today. Tearing it all down and starting again is usually not an option, so what do you do?

Designing a systems architecture in line with the MITRE ATT&CK framework is a nice to have, but disrupting a business while you build, migrate and then UAT such an environment simply isn’t practical. Therefore, this blog post will touch upon the theoretical principles you would use to build such an environment if you were starting from scratch as well as include recommendations on how you can do your best to ensure that you are doing the basics right in your existing environment.


Understand What You Are Building and Why

Having a clear vision of the purpose that your environment will serve is key:

  • Will there be lots of externally facing or customer accessible elements for example?
  • Will the environment primarily be used to host DevOps people who will constantly be needing new VM’s spun up and down?
  • Will huge databases be hosted that support applications or interact with cloud resources?

Understand the level of risk that your organisation is willing to accept. Ensure there is an understanding that zero risk is possible, but the cost will be significant – work with your business to understand where the trade-off between acceptable risk and acceptable cost lies.

Ensure you have a concept of how long the system you are designing now is likely to be around for? Legacy systems can be a huge cyber risk. If OS versions will go end of life in 5 years – how will that be accommodated? This will be essential in ensuring that you are building system that is fit for purpose now and in the years to come.

Make Systems Easy to Maintain and Update

Maintenance and support is going to be necessary. Many organisations get stuck with systems that are out of date because they simply cannot take them down for any length of time. This means they are forced to implement other complex, costly solutions to protect the vulnerable areas.

Making it as easy as possible to get updates out and having the confidence that they have been successfully applied is key. You should only use supported OS versions. For anything that doesn’t have reliable automated updates, either use something else or find a methodology that works. For example, you may have to segment that device from everything else and patch it manually.

Patching – Hardware, Firmware, OS & Applications

Patching software vulnerabilities is one of the best ways to ensure your systems are secure. Not only does it remove software flaws, but it means that your organisation is more difficult to compromise. It may not be a deterrent to someone intent on gaining access, but it certainly will be for the opportunistic cyber criminals that are running automated botnets scanning for open ports or phishing email campaigns. If they can’t find an easy foothold, many will simply look elsewhere.

Change Management

Change management should be used to ensure stability of systems, verification of changes prior to implementation as well as providing a record of changes made should an incident occur.


Make Compromise & Disruption Difficult

Having a layered network architecture is a great idea but can be very complex to manage not to mention difficult and/or time-consuming to work with. But as we’re starting again then look at the MITRE ATT&CK framework, familiarise yourself with the tenets it conceptualises and adapt your design approach accordingly.  Ensuring that your network is compartmentalised. Then a compromise of a single area does not compromise the entire environment – the same approach to damage limitation/control the military uses. From a risk perspective it’s brilliant and it means you can segment the sensitive data away from any avenue of direct or indirect attack. 

Use anti-spoofing controls such as DMAC, SPF and DKIM to make it difficult to spoof your email domains, again, this will deter many threat actors or force them to use domains that are obviously fake and easier to spot. 

Web Content Filtering

Actively blocking access to types of unregulated websites protects your environment from the risks posed by embedded or hidden malware as well as users from potentially offensive, malicious or distressing content

Firewalls

Using firewalls has been a staple of IT environments for a very long time, there are still a lot of legacy-type firewalls in use that are not really suitable to combat todays cyber threats, use of next-gen firewalls is recommended if not already in use.

Reduce the Impact of Compromise

Organisations should make it difficult to laterally move from one area of the network to another. Compartmentalisation is arguably worthless of an attacker can still traverse the rest of the environment compromising as they go.

Using next-gen anti-malware to provide the highest levels of protection on your end-points such that should malware get to the end-point, it is detected and removed promptly before it can do damage.

Ensure you have good backup discipline, having a secure local backup repository can mean the difference between a restore operation taking days versus weeks to restore from cloud or off-site repositories. Virtual backup servers are a risk that organisations should avoid. If you lose the virtual environment, you lose your backup server as well. This means you will have to manually rebuild the hypervisor and the backup server to restore everything else.

Monitor for Indicators of Compromise

There are an increasing number of analysis tools available that will user heuristics, ML and AI to automatically monitor network traffic and correlate individually benign indicators of compromise to provide a clear picture of malicious activity and act before damage is done.

Use True Next-Gen Anti-Malware – Must Include AI-Based Detection

Using next-gen anti-malware to provide the highest levels of protection on your end-points such that should malware get to the end-point, it is detected and removed promptly before it can do damage.


Make It Easy to Detect and Investigate Compromises

Communication flows between different components can be particularly vulnerable to exploitation methods such as MITM attacks. Organisations should use tools such as encryption and network access control lists to protect against this and make any subversion attempts easier to spot.

Build a Methodology to Triage and Respond When There Is a Problem

The likelihood of a cyber incident occurring in any business is only going to increase as new threats emerge and the pace at which we work continues to increase. Mistakes will happen. Your incident response speed is vital to maintain high customer confidence.

The cost of cyber incidents is also largely underestimated by most organisations until they are faced with them. Hidden costs from regulatory fines, loss of reputation, legal fee’s from customers whose data has been compromised can all be very real problems.

Safely Develop and Manage Systems

Ensure clear demarcation between production and development systems. Have clearly defined software release processes to prevent untested development software being loaded onto production systems.

The number of remote workers is increasing and with that the variety of devices being connected to business systems. You need to have a clear understanding and control of the connected devices as well as how and where they are being connected. This is important to ensure the devices are legitimate and to protect against data exfiltration.

Control Applications in Use in the Environment

Application control ensures that users do not have the ability to use or install unauthorised software. Having rigorous application control in place with regular software audits can help identify software that should not be there and may be an indicator of compromise.


How CyberLab Can Help

CyberLab can provide consultancy and support on your key technology projects, help deliver business solutions, support your users in adopting them and provide managed or reactive support when your solution is up and running.

If you haven’t done so already, our Posture Assessment tool is a quick-and-easy way to identify your strengths and weaknesses, and get a better picture of your overall security posture.

We have put together a page of recommendations for improving your Architecture and Configuration, and which tools can help, which you can read here.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

How To Prevent Cyber Attacks with Logging & Monitoring

How to Prevent Cyber Attacks with Effective Logging and Monitoring

Detecting and Preventing Cyber Incidents

Our host at explores how logging and monitoring can help your organisation detect cyber threats and secure your digital landscape.
They cover:
  • Why Do We Need Logging and Monitoring?
  • How Do We Do Logging and Monitoring?
  • Identifying the Right Solution
  • Our Recommendations

Cyber security is a big concern for businesses today. Over the past year alone, nearly half a million businesses reported cyber incidents. As our workplaces and digital systems grow, so does the chance of cyberattacks. These attacks are getting smarter, and as a result, the risk of being targeted is increasing.


Why Do We Need Logging & Monitoring?

With the advancements in technology and the move to hybrid working, our environments and workforces have moved more online. A consequence of this is that our organisations have a much larger attack surface for cyber criminals to try and exploit. Necessary interfaces between different on-premise and cloud or SaaS platforms mean environments are more complex to manage. Cyber attacks themselves are becoming more advanced and as a result, the likelihood of being attacked increases as well.

The dark web has been hugely commoditised and it is now very likely that multiple cyber criminals will gain awareness that you are vulnerable. This happens when one attacker, called an access broker, gains access to your environment and then sells that access to multiple other attackers. Their goal? Making money, causing chaos, stealing secrets, and holding your data hostage.

The risk and cost for organisations that are victim to cyber attacks are also increasing. The result of cyber attacks are often downtime, disruption and data loss. There are also other consequences many organisations face such damage to reputation, hefty fines for compromised data, losing trust from valued customers, and even the loss of hard-earned certifications.

While it might seem like a digital doomsday out there, here’s the secret: cyber attacks leave footprints. The art of prevention lies in spotting these traces before the attack compromises your systems and data. It’s like catching a thief in the act before they can make off with the loot. If you can detect unauthorised activity before damage is done, you can stop or prevent the attack being successful and limit the damage. That’s where logging and monitoring solutions come in.

They have a secondary function as well, anyone who has suffered a cyber attack will tell you that despite having the initial detection of something untoward going on, it can be really difficult to actually feel confidence that you can see the whole picture and you are aware of everything that’s going on – logging and monitoring helps with that as well.

How Do You Do Logging & Monitoring?

In even relatively small IT environments, the scale of log information that will be generated is overwhelming. Especially if it’s scattered across multiple environments like public/private cloud/SaaS etc.

The first challenge? Gathering all these pieces into a single, meaningful picture. Endpoint Detection & Response and eXtended Detection and Response (EDR/XDR) and Security Information and Event Management (SIEM) solutions provide this central location to collate and view the log information from multiple sources.

So, you’ve got all your puzzle pieces in one place, but they’re still just random bits until you put them together. That’s where the real magic happens: processing. EDR/XDR and SIEM solutions typically sift through the sea of data to block out the ‘noise’.

Solutions such as LogPoint leverage some form of AI or ML intelligence to give an indication of how likely a particular event is going to be related to malicious activity. LogPoint’s version is called UEBA, which stands for User Entity Behaviour Analytics. UEBA uses AI and ML to correlate multiple events and link related ones together to give a fuller picture than looking at individual events in isolation.

EDR/XDR solutions usually do something similar but typically the events they are correlating are limited to information coming from endpoint security or proprietary network devices. LogPoint and other SIEM tend to have a much broader scope of interoperability and call pull event information from pretty much anywhere that it’s being generated.


How Do I Know Which Solution Is Right?

It can be difficult to know which solution is right for your organisation, and its often a case of selecting which fulfils your need the best. If you don’t need to monitor extensive hardware devices, web sites, databases, etc, then an EDR/XDR solution might be for you. If you have multiple databases or databases that hold sensitive information, it’s probably a good idea to be watching them closely via a SIEM solution as they will be a prime target for an attacker.

With both types of solution the information still needs to be monitored by a human. LogPoint mitigate this through the use of their Security Orchestration and Response (SOAR) technology that aims to take automated action based on certain triggers when particular activity is detected. EDR/XDR solutions often have similar functionality but it’s probably fair to say they are not quite as extensive or complex as a SIEM solutions.

These automated response solutions are great, but they can also be incredibly disruptive if allowed free reign over systems. Very quickly users will be complaining they cannot carry out their duties because things are being blocked. This brings me to the final challenge with logging and monitoring, it invariably means a security specialist with “eyes-on-glass” (i.e., watching the screen) is necessary to manage both types of solutions effectively.

Again, the approach to take to manage this final challenge depends on any number of factors – the size of business, the driving forces behind the adoption of logging and monitoring, the desire for Opex over Capex, or the constant problem of getting skilled Cyber security staff, to name just a few.

What Would CyberLab Recommend?

If an organisation lacks in-house expertise but recognises the value and importance of logging and monitoring, it is increasingly common to adopt a managed service approach.

This involves partnering with third-party suppliers who have dedicated security specialist teams to handle the heavy lifting. One of the key benefits of this approach is peace of mind – knowing that systems are being actively protected around the clock.

To support this, the Posture Assessment tool offers a quick and easy way to identify strengths and weaknesses, providing a clearer picture of overall security posture.

A dedicated page of recommendations for improving logging and monitoring is available, including guidance on which tools can help.

For organisations looking to strengthen their security and protect their data, a consultation with one of our experts is available to explore tailored solutions.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

What is Incident Management in Cyber Security

What Is Incident Management in Cyber Security and Why It Matters

Secure Your Organisation. Protect Your Data.

Our host outlines importance of incident management for effective cyber incident response and minimising the impact on an organisation.

He covers:

  • Understanding Incident Management
  • What Does Incident Management Mean
  • How to do Incident Management


What Does ‘Cyber Incident’ Mean?

The NCSC’s definition is…

“A breach of a system’s security policy in order to affect its integrity or availability and/or the unauthorised access or attempted access to a system or systems; in line with the Computer Misuse Act (1990).”

This definition covers number of potential scenarios – e.g. intentional or accidental data breaches, disruption of services due to DDoS, web application exploitation – it’s no longer just about how you fix a malware outbreak in the environment.


Understanding Incident Management

Incident management has historically been an aspect of Cyber Security that wasn’t considered until it’s too late primarily since it meant a malware outbreak. Today, with the instances of cyber incidents becoming increasingly frequent many organisations are developing Incident Management processes either because they have suffered an attack and understand the value in being more organised, or they realise the likelihood of one occurring and want to be prepared.

Cyber incidents can range in severity from a minor inconvenience to complete loss of the ability to conduct normal business, they are invariably stressful, frequently involving big decisions being made without necessarily having the full picture and may require a co-ordinated response from multiple areas of a business – it’s not just the IT department problem anymore.

The crux of why Incident Management is an essential component in a modern business is in a word control:

  • Control of understanding what has happened when an incident occurs, i.e. the scope and severity of the incident.
  • Control of the response to manage the situation and ensure the response doesn’t ultimately cause more harm than the incident.
  • Control of the recovery to restore normal operation as efficiently and quickly as possible.

What does Incident Management mean?

Before we get into this, there are two terms we need to be aware of – Cyber Incident Management, and Cyber Incident Response.

The Incident Management element is the overarching banner that manages the 6 different stages of the Incident response:

  1. Triage
  2. Analyse
  3. Contain/Mitigate
  4. Remediate/Eradicate
  5. Recover
  6. Review

We’ll talk more about these in the next section. But for now, lets just say that incident management is more of an oversight aspect that might be managed by a dedicated cyber response management team made up of stakeholders from across the business.

A cyber incident response therefore is a pre-existing methodology of steps to be taken during and after a cyber incident occurs with the cyber incident management being the management ‘plane’ co-ordinating and sometimes controlling the stages of the response.

As a whole the term incident management is a collection of pre-defined processes that direct who, how and when a business responds to the occurrence of cyber incidents.

It’s worth noting that the model in the graphic is a guide, individual cyber incident response plans may differ from business to business depending on requirements.


How do you do Incident Management?

First – you are going to need to develop a process to follow.

I’ve already mentioned that Incident management is more of an overarching term or function that acts as command and control to the actual incident response; this would typically be a team of stakeholders from across the business that provide oversight and guide the response to ensure it is proportionate.

Again, there are no hard and fast rules as such since no two businesses are identical, but broadly speaking there should be a tiered approach to incident management – e.g. having a minor, intermediate and major response plan could be a starting point since it would be impossible to develop a response plan specific to every potential scenario. Each tier would then dictate a different level of response and perhaps even a different approach to the incident.

Triage

When there are indications that an incident has or is occurring, the incident management team need to convene and begin understanding the scope of the incident they are looking at, its nature and decide which level of response is most appropriate – this could be determined by one or several factors such as the number of customers affected, the number of users affected, have mission critical services been affected – the criteria will likely depend on what is most important to your business’ operation.

Often the Triage phase will dictate which of the incident management plans will be invoked, part of the process would then be to set the response team off conducting the analysis phase, whilst the incident management team brief the business on the initial situation, provide notification of outages or disseminate preventative action they wish users to take.

Analyse

The purpose of the analyse phase is to understand exactly what is going on as quickly as possible, this phase is to help plan for the next phase but it’s also an opportunity to verify any assumptions were correct with regard to the scope of the incident – e.g. what looked like a minor incident may prove to be more serious once investigation is underway and the incident management team need to be briefed and take action accordingly.

Contain/Mitigate

Once analysis has been concluded there should be a good understanding of what is happening in the environment and steps can be initiated to stop the problem getting worse. The specific response is going to depend entirely on the nature of the incident but the intent of this phase to prevent the incident escalating further and to limit the damage to services and infrastructure. This phase may also extend to damage control to the business from a reputation perspective through the use of press releases to demonstrate honesty.

Remediate/Eradicate

Once the incident is controlled and is not worsening, the task of rectifying the issue or removing the threat that caused the incident begins, again the structure and processes of this phase depend on the nature of the incident as different cyber incidents will have different responses.

Recover

With the Cyber Incident now dealt with the focus needs to be on restoring business-as-usual operation and this is the recovery phase, i.e. getting the environment/business from the post incident state back to the point where normal operations can be resumed. This phase is made immeasurably easier if you had robust backup processes in place as restoring system services and data becomes a question of how long instead of how do we do it!

Read blog post: Recover from a cyber attack | CyberLab®

Review

The review phase is exactly what it sounds like, an after action debrief of what has happened, what did we do well, what could have been done better, did any part of the process not work, why didn’t it work and how to we make sure it works next time.

Review is almost as vital as any other area of the response plans as it means you will be better equipped next time to deal with the problem.

Training

One last section that isn’t part of the NCSC plan, but is recommended, is security training. Running desktop exercises should be conducted quarterly to ensure there is familiarity with the processes but it can also contribute to the Review section to help improve processes and increase the efficiency and speed of the response.

Want to test your incident response plan? The NCSC provide a great tool: Exercise in a Box – NCSC.GOV.UK


In Conclusion

Incident management processes deliver several benefits to your business:

  • Effective incident management lessens the impact of a cyber incident.
  • A practised plan will help you make good decisions under the pressure of a real incident.
  • A well-managed response, with clear communication throughout, builds trust with shareholders and customers.
  • Learning from incidents identifies gaps and issues with your response capability.

If you haven’t done so already, our Posture Assessment tool is a quick-and-easy way to identify your strengths and weaknesses, and get a better picture of your overall security posture.

We have put together a page of recommendations for improving your Incident Management, and which tools can help, which you can read here.

If you’d like to learn more about how to secure your organisation and keep your data secure, book a consultation with one of our experts.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Vulnerability Management Cyber Security

Vulnerability Management for Stronger Cyber Security Resilience

Protect Your Data. Secure Your Organisation.

Our host discusses the key elements of vulnerability management and shares how to protect your organisation through robust practices and monitoring.

He covers:

  • What is vulnerability management?
  • Why do we need vulnerability management?
  • Key steps to vulnerability management


What is Vulnerability Management?

Vulnerability management is the process of identifying and addressing weaknesses in computer systems, networks, and software that could be exploited by hackers or cause security breaches.

It involves regularly scanning and assessing these systems to discover any vulnerabilities or potential entry points for attacks.

Once identified, these vulnerabilities are prioritised based on their severity, and appropriate measures are taken to fix or mitigate them.

Why Do We Need Vulnerability Management?

By actively managing vulnerabilities, organisations can reduce the risk of cyber attacks and safeguard their sensitive information from unauthorised access or damage.

Software Updates

Software might be fine at the time it is released, but as time and requirements move on, the code of the software does too. This could be to add cool new features or to add a flashy new interface, but it’s becoming more important to fix security issues or vulnerabilities. These issues can be found either by security testers known as ‘Bug bounty’ hunters or the software vendor themselves.

Fixing these vulnerabilities prevents cyber-attacks from exploiting them. According to a recent report by the Ponemon Institute, more than half (57%) of reported data breaches could have been avoided if known vulnerabilities had been patched correctly.

What are the Risks of Not Updating?

Keeping outdated software can be a big risk for an organisation – it’s like leaving your door unlocked. A study by the Centre for Strategic and International Studies revealed that cybercrime costs the global economy more than $1 trillion each year, with a significant portion resulting from data breaches.

The rising cost of cyber insurance is another risk that organisations need to consider. Companies that neglect proper vulnerability management practices often face higher cyber insurance premiums, Cyberpolicy estimates that companies without basic patch management measures in place may face cyber insurance premiums up to 25% higher.


Key Steps to Vulnerability Management

Gain Visibility

Scanning internally and externally with vulnerability assessment tools can highlight network layer “low hanging fruit” vulnerabilities that hackers will be looking to find the quickest and or least detectable entry point into an organisation’s network. According to a study by Spiceworks, 72% of IT professionals use vulnerability scanning tools to identify and remediate security risks.

Identify Risk

To effectively manage vulnerabilities, you need to identify and eliminate areas of risk, such as unsupported operating systems, hardware, and applications. Essentially, anything connected to your internal infrastructure and external interfaces adds to this risk. According to a report by Tripwire, 76% of respondents identified legacy systems as the main challenge to their security.

Secure Your Websites

Knowing which web applications are accessible to the public via web browsers is crucial for your cybersecurity strategy. Protecting externally facing web applications that hold sensitive data (such as PII, PHI, PCI data, or commercially sensitive/customer data) is vital.

Performing regular vulnerability scans and at least one manual penetration test per year helps organisations address new vulnerabilities. It also helps to prevent unauthorised access to sensitive data, compromised user accounts, or external threats with increased privileges that could cause further harm.

Protect Your Data

In today’s world, attackers primarily target your data. They aim to either steal it, deny you access to it, or both, with the goal of extorting money from your organisation.

When you consider how your data can be accessed, you can identify potential sources of risk and develop a strategy to minimise those risks. This involves considering vulnerabilities and controls, such as limiting access to authorised individuals, to protect your data effectively.

Addressing Your Vulnerabilities

It may seem obvious, but patch management is often overlooked or delayed, leading to future problems. Investing in reliable and effective automated patch management solutions is the best approach. While they may cost more, they require less constant tweaking and management, giving you confidence in their effective patching.

Identifying problems is often straightforward, but finding solutions can be challenging, especially when dealing with legacy or unsupported mission-critical operating systems or applications that cannot be shut down.

Scheduled downtime is crucial to apply security fixes to these systems. If they are attacked without fixes in place, you’ll face unscheduled downtime, which is worse. If downtime or security fixes are not feasible, alternative solutions like Forescout can be used to implement effective network access controls and restrict access to vulnerable areas only to authorised entities.

Utilise Reporting

Managing vulnerabilities at a large scale is impractical as it would require constant effort to find and fix issues. Automation is the key to making it feasible. Reporting can be used to identify existing issues before applying patches and to verify the effectiveness of the patching process. Most solutions offer automated reports that range from high-level summaries to detailed breakdowns of vulnerabilities.


How CyberLab Can Help

CyberLab can provide consultancy and support on your key technology projects, help deliver business solutions, support your users in adopting them and provide managed or reactive support when your solution is up and running.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Asset Management in Cyber Security

Asset Management in Cyber Security: Protecting Your Data & Systems

Protecting Your Data

Our host discusses the importance of Asset Management for organisations to bolster their cyber security.

He covers:

  • What is Asset Management?
  • Why do organisations need Asset Management?
  • What do with asset information

In today’s world, where cybercrime is on the rise and data breaches are a common occurrence, protecting your data can be a complex task.

It’s critical for organisations to understand how data is being accessed, whether the access is through secure mechanisms, and how to control that access. You can’t control or protect what you can’t see. Which is where asset management comes in.


What is Asset Management?

Asset management is one of the most crucial elements of protecting data, as it helps identify all devices connected to an environment, manage their level of access, and establish business processes to record new devices.

The main goal of asset management is to ensure that an organisation’s assets are being used effectively and efficiently while minimizing security risks and ensuring regulatory compliance.

Why Do We Need Asset Management?

Our business data is now the primary target of most cyber criminals, they know our businesses need that data to operate, transact business and ultimately to do what we do. Protecting data should be a priority for any organisation and one of the most important elements to protecting our data is understanding how it is being accessed. Every mechanism that can be used to access that data is a potential risk.

Device Discovery 

In larger environments or environments where the non-Enterprise Mobility Management capable device change or move around a lot, it may be necessary to utilise a product such as Forescout suite to identify all devices connected to your environment, the results of this can then be taken even further to manage the level of access they have using Network Access Control and Network Segmentation to restrict access of devices you have not authorised pending identification and authorisation.

Integrate Asset Management Into Your Organisation 

Implementing an Enterprise Mobility Management (EMM) solution for your organisation can provide several benefits. Firstly, it enables you to adopt efficient deployment practices whereby new devices are automatically enrolled into your EMM solution. This ensures that policies, restrictions, and software are automatically deployed onto the devices, resulting in a streamlined process. Furthermore, the devices will automatically report their status, allowing you to apply any new policies as needed.

To ensure that new devices are introduced to the environment in a controlled manner, it’s crucial to establish proper business processes. This includes recording new devices in your asset register, which ensures that the register accurately represents the devices in use. Whether you decide to include devices managed by your EMM in your asset register is a business decision. However, it’s worth noting that EMM solutions may facilitate integration, allowing details of the devices in the EMM or device discovery/control software to be replicated into your asset register.

So, we need to make sure that we have a clear understanding of what is or can access the data, is it a secure mechanism, and how we can control it?

It’s important to note that asset management is not just about device management as we’ll come onto later, but device management is a key part of it and can do most of the leg work needed for effective asset management so let’s start there.


What To Do With Your Asset Information

Identify who is responsible for what

In many cases environments can sprawl over time and who is responsible which system can become clouded. This can mean making changes or troubleshooting is much more time consuming than it needs to be. With a detailed view of the assets in the environment to use, it is clear where responsibility lies and this can help improve efficiency.

Identify business critical areas

Once you have a realistic picture of all the devices that make up your estate, identify those which are delivering or associated with critical business services, consider any dependencies they have, and then use that as to build a picture of the areas in your infrastructure that are most important to your business.

Bear in mind that data is also an asset; one that may not all reside on-premise or may be stored on removable media. Having a robust backup strategy in place that adheres to industry best practices and is tested regularly will ensure that your data will reliably be there when you need it.

Identify areas of vulnerability 

The asset information that you have will also help you to categorise areas that may represent more significant concerns from a security perspective – unsupported operating systems have become a problem for many organisations in recent years, servers hosting business critical applications or services that cannot be migrated to newer versions is one of the most common problems.

An area of common vulnerability in most environments is the ability for unmanaged endpoints, laptops in particular, to be physically connected to a network port in the office and granted access to production systems. Hackers can easily breach account credentials or find ways around them, preventing them from being able to access anything needs to be a priority in any business.

Users can be one of your strongest lines of defence against cyber threats, or they can be your greatest weakness. Cyber criminals research their targets and they use the intelligence gathered to fabricate extremely convincing social engineering campaigns. Don’t make it easy for them to do that. A robust cyber security training and engagement strategy is essential for any organisation.

Remove what you don’t need 

Sounds obvious, but sometimes as environments sprawl out of control and increase in complexity there can be uncertainty about exactly what a particular server does, and rather than risk an outage these devices can linger well beyond the end of their life unnecessarily.

Using the asset register and the allocation of responsibility for each device should enable extant devices to be identified and decommissioned.

Maintain and improve your asset management 

After putting lots of time and effort into building your asset management system, it is easy to let it atrophy and become out of date, always look at automated ways to ensure the information held is being actively updated so you have a high degree of confidence that what you are looking at is representative of what you have today.


In Conclusion

Protecting data should be a priority for any organisation, and asset management is one of the most critical elements of safeguarding against cybercrime and data breaches.

With a clear understanding of what devices can access the data, businesses can identify areas of vulnerability and business-critical areas, allocate responsibility for each device, and remove what is no longer needed.

Maintaining and improving asset management is an ongoing process, and businesses must continually monitor their environment to ensure their assets are being used effectively and efficiently, with minimized security risks.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation