Integrated Risk Management
Through the application of technology and automation, we'll help you manage your risks efficiently and effectively across the entire enterprise.
Identity and Access Management
We'll help you ensure everybody within your organisation has access to the right systems and data, for the right reasons, and at the right time.
Cyber & Application Security
Our experts will uncover security weaknesses within your security design and business-critical applications. Helping you protect your organisation from both internal and external threats.
Bedrock Managed Service
Scalable support and on-demand expertise that seamlessly integrates with your existing operations.
About us
A group of passionate individuals with a shared purpose to help the world's leading companies embrace best practices for GRC and risk management.
Partners
Turnkey's strategic partner network consists of selected organisations that complement our capabilities.
Corporate Social ResponsibilityCSR
We are committed to being agents for change through our Climate Action Plan, championing diversity in our workplaces, and more.
Get in touch
We have operations in all corners of the globe, so see which office is nearest to you and connect with them.
Careers
We have operations in all corners of the globe, so see which office is nearest to you and connect with them.
Webinars & eBooks
All of Turnkey's webinars, guides and other insights available in one place.
Blogs
Read the latest insights from our experts on GRC and risk management, covering the latest industry topics.
Press Coverage
See all the publications where Turnkey, our experts and our successes have been noted.
Key events
See the key industry conferences on GRC, SAP security and risk management which we are attending.
Case Studies
Client satisfaction is of the utmost importance to us, and we strive to constantly deliver above expectations, going the extra mile at every opportunity.
28 January 2022

Attackers are gearing up, are you?

Are British businesses able to respond to a growing threat of cyberattacks?

Cyber-attacks against businesses have been on the rise for years and geo-political events can heavily influence and accelerate this trend. As this article from the BBC has highlighted, both state actors and criminals use cyber-attacks to disrupt and destabilize their targets and this includes businesses. Increasingly, business-critical systems are the target for these attacks.

So, knowing that the threat vector is increasing, what should you be doing to protect yourself and your business against the growing threat? It helps to think like the attacker, so you can better prepare your organization to respond…

 

Defend the perimeter

The first part of any attack pattern is discovery, the attacker must identify a target and identify weaknesses that can be exploited. This may be a technical vulnerability, such as we saw recently with the log4j exploit, or the attacker may choose to direct attacks against an organization’s people to distribute malware, commit fraud, exfiltrate data or gain access to systems.

Vulnerability management is key to defending against the first part of the problem. Many organizations still think vulnerability management is effectively patch management, making sure that anti-malware protections and endpoints are patched against known exploits. This is a great start but attention should be paid to multiple facets of this. First, do you know your estate – which endpoints or networks are most critical and which are most exposed? Is hardware and software up to date? Are you whitelisting appropriately? Do you manage access appropriately (including privileged access)? Are the users of key systems trained appropriately to defend the organization against an attack? Knowing yourself is the first part of the battle.

Once you know your estate, test your protection with dedicated penetration testing and vulnerability exploits for business-critical systems, or by testing the people and processes on those key systems. If you have them, make sure to involve your XDR and SIEM/SOAR capabilities and processes. This will provide both some assurance that the penetration is less likely and that your ability to detect attacks is where it should be. E.g. if your XDR and SIEM/SOAR teams spot your simulated attacks as suspicious, that is a very good sign as they’ll likely spot genuine ones too.

Combine this internal knowledge of your estate with an understanding of the techniques the attackers use, conduct threat intelligence to understand not only your weak-spot, but the people who are likely to target you and the mechanisms they employ to deploy their attacks


Enable your People as Defenders

In conjunction with managing the technical vulnerabilities, you must make sure your people are educated in the tools and techniques used to gain access to the organization. A strong security and awareness culture in the organization can reduce the most common method of exploitation and provide much greater protection for your critical systems.

Again, ensure you test this protection with internal simulations of phishing or attempts at fraud, and don’t ignore the social engineering factors at play. Your people must know how to protect themselves online. Don’t ignore your 3rd party suppliers – make sure they have similar protections in place and enroll them into your operational security.


Reduce the Attack Surface – protect yourself

Having identified a vulnerability, the next step for an attacker is to exploit it.

While network-level defences such as firewalling and whitelisting of key systems play an important part in protecting your critical business systems, privileged access is often overlooked. If a Super User account is compromised, you’ve handed over the keys to the safe. Make sure you understand who has privileged access to your systems and data, secure those privileged accounts and ensure that your users are authenticated and identified strongly.

Make sure you have MFA in place and have protections in place for suspicious behaviour. Limit what your users can do within your key systems, so credential misuse cannot be easily exploited and limit lateral movement around the networks to reduce the attack surface.


Detect and respond to the attack

Attacks will still occur and attackers use time within the penetrated networks and systems to see what the attack surface is. Detecting an attack may be as simple as seeing who’s bouncing off the network perimeter, or may be indicated by suspicious patterns of behaviour within applications themselves.

Ensure you have robust mechanisms in place to detect these attack patterns and, importantly, have the processes and technology in place to respond to them in a timely fashion. Use your incident management processes to ensure defenders can respond to attacks and enable them with SIEM/SOAR tooling to ensure they’re looking in the right place.


Ensure you can recover

Once they’re in, the attacker is looking to disrupt the business by several means, for example, committing ransomware attacks, convincing internal people to commit fraud, maybe they’re looking for your data, or trying to shut down key systems.

If the worst happens and the attacker does succeed in their objectives, you must have strong procedures in place to minimize the disruption this causes. Do you have DR plans in place and mitigation strategies to limit the damage which can be done?

 

This can feel like a very large problem to solve. There are many different tactics and techniques to balance into an effective defensive strategy, particularly when the urgency increases and the demand to demonstrate actions to the senior leadership.

Turnkey is very experienced in providing pragmatic yet robust responses to these types of challenges so please do get in touch and talk to us to understand how we might also be an extra option to improve your cyber defenses.