Enterprise IT Security: The Ultimate Guide
Enterprise IT Security: The Ultimate Guide
Enterprise IT Security: The Ultimate Guide
It’s no longer a matter of “if” you will experience a breach, but “how
often” and “how severe.”
This guide outlines the steps you must take to protect your company from today’s ever-
evolving risks and threats.
With the right IT security strategy and partner, you can protect your company without
investing in data centers, equipment, and additional in-house staff.
Read on for best practices on how to minimize your security risks while freeing your
internal team to focus on innovation—not IT admin and help desk support.
2
Part 2
Failure to comply can result in penalties that have a significant impact on your business.
For example, GDPR fines can amount to €20 million or up to 4% of the annual worldwide
turnover of your preceding financial year, whichever is greater.2
?
What is the difference A risk is something you are not
between a risk and doing. A threat is something
threat? that can exploit that risk.
3
As you plan your cybersecurity initiatives for the coming year, here are things to consider:
Respondents to the survey cited many impacts from these breaches, including “a reduction
in safety, productivity, and revenue, the compromise of business-critical data, and damaged
brand reputation.” The primary driver for these attacks is a lack of visibility, as 78% of
respondents only have partial insight into the cybersecurity of their OT environments.
In fact, 30% of enterprises even reported that gaming consoles, such as Xbox or PlayStation,
connect to their networks.6 As IoT devices expand throughout organizations, IT teams are often
unaware of how many are accessing their networks and who is using them to do what.
All respondents found rogue IoT devices, and 90% saw previously undetected IoT wireless
networks that were separate from their enterprise infrastructure.7 Third-party IoT also poses a
risk, as IT teams often have little control over these devices.
A Ponemon Institute study found most organizations aren’t aware of every unsecured, third-
party IoT device or application on their network. The study revealed that 49% of enterprises
do not regularly scan for IoT devices in their workplace, while just 8% say that they scan in
real-time.8
With shadow IoT and limited visibility, it’s not surprising that 67% of enterprises have
experienced a security incident with managed IoT devices. In fact, 84% of IT leaders say that
their IoT devices are more vulnerable than their corporate-managed computers.
4
An attack against IoT devices can be far more hazardous than other types of data breaches.
Hackers target IoT devices at electricity generation stations, water processing plants, refineries,
and railroads. For this reason, IT World cites one of the biggest consequences of an IoT attack
as, “the financial costs to restore normal operations after a fire, explosion, or manufacturing
facility outage.”
5
4.4 ERP security threats
Did you know that 64% of SAP and Oracle
E-Business Suite (EBS) deployments experienced
breaches14 in the past 24 months? “93% of companies
that lost their data
The information compromised during these
breaches includes sales data, human resources center for 10 days or
data, customer personally identifiable more due to a disaster,
information, intellectual property, and financial filed for bankruptcy
data. The theft of your company’s most sensitive
data can lead to dire consequences—from
within one year of
compliance violations to financial loss to the disaster. 50% of
bankruptcy. businesses that found
themselves without
However, many companies are not prepared for
an ERP breach. For example, they may run their data management for
ERP systems on dated legacy technologies that this same time period
aren’t secure. In fact, 82% of executives said that filed for bankruptcy
legacy technology supports critical parts of their
business and integrates with their core systems,
immediately.
according to a recent survey.16
6
5.5 Cloud insecurity
Every year, more companies move their mission-critical workloads to the cloud and grapple
with the new security challenges that come with it.
19% of enterprises have experienced a cloud breach in the previous year—an increase of
7% since 2017, according to the SANS Institute.17
A Cloud Security Report18 found that enterprises’ top five cloud security threats include:
• Unauthorized access
• Insecure interfaces and application programming interfaces (APIs)
• Misconfiguration of the cloud platform
• The hijacking of accounts or servers
• External sharing of data
The consequences of a cloud data breach vary, depending on the type and amount of data
that hackers steal. However, it can include the publication of employee, customer, and
proprietary data on the dark web. Once your data escapes your control, you must react
quickly to limit your brand and financial damage.
Cloud services are often safer than legacy systems. However, you can’t rely on your provider
to handle every aspect of your security out-of-the-box. You also can’t trust your legacy
security tools to work in the cloud.
“Many legacy security tools are not designed for the dynamic,
distributed, virtual environments of the cloud.”
Two-thirds of respondents said that their traditional security solutions either don’t work at
all in cloud environments or have limited functionality.
7
6 Understand the cloud security shared responsibility
model
Many organizations that migrate their onsite data storage facilities to the cloud quickly fall
prey to the age-old adage “out of sight, out of mind.”
While cloud providers certainly bear the brunt of infrastructure security responsibility,
they’re not responsible for protecting data within the cloud. This may sound illogical to
the companies using cloud providers, but the cloud shared responsibility model clearly
delineates security obligations between both parties.
When maintained correctly, this model should keep companies more secure than ever.
A fundamental misunderstanding of
security responsibilities — and how
to manage them — leaves companies How will you address
vulnerable to cyber threats. these threats?
8
7.7 Shirking data responsibilities
Organizations think cloud service providers are the ones responsible for securing their data in
the cloud. This misunderstanding has critical repercussions.
The Equifax data breach19 exposed the personal information of around 150 million
Americans, or nearly half the nation’s population. In this case, Equifax ignored warnings from
the Department of Homeland Security that its database was vulnerable to attack. Poor data
governance practices, including an encryption certificate renewal lapse, password storage in
plain text and a failure to patch a known vulnerability, all contributed to the breach.
• Establish strong vendor relationships: Even though your data is ultimately your
responsibility, you don’t have to navigate the complexities of cybersecurity alone. Poor
communication is likely a major contributor to the misunderstandings surrounding the
cloud shared responsibility model. A good cloud partner should be open, communicative
and responsive. If you weren’t already aware of your data responsibilities, you likely don’t
have a strong relationship with your cloud provider.
• Prioritize compliance: Likewise, look for a trusted, industry-vetted cloud provider. Only
16% of cloud services have one or more third-party certifications20, like HIPAA, PCI, SOC2,
SOC3, PCI DSS or SSAE16. These certifications indicate how seriously cloud providers take
security and compliance on behalf of their customers.
• Staff up: Even though many C-suite information security leaders know data protection
is their responsibility, 30% of companies lack the staff21 needed to secure their SaaS
applications. Other organizations are entirely unaware of their security duties — and
the required staff and resources to manage them. Round out your IT department with
network and security managers to ensure your data is protected.
• Educate employees: One in five network security managers22 think cloud providers are
responsible for securing their organization’s data. And those are the employees whose
job description involves information management. Employees in other departments
frequently open up back doors for hackers by engaging in shadow IT practices, a massive
security risk for companies. Instead of banning the applications employees commonly use
to collaborate better and work more efficiently, work with IT staff to safely integrate them
into official processes.
• Offload more of the burden: In addition to taking on cloud infrastructure security, many
cloud providers offer other security services for greater protection. Look for partners with
data monitoring, management and recovery services to reallocate some of your enterprise
security responsibilities.
9
Part 3
10
Do these third-party audits truly provide insight into a company’s
ability to implement their cyber plan and perform incident response
when needed?
Unlike government implemented processes, the methods in which these third-party
organizations employ to perform their audits can see dramatically different results. For
auditors that rely on partial sampling of auditable materials from within each of the
various control families, gaps in security controls can go undetected and be masked by the
presentation of large volumes of verbose policies and procedures.
The risk is that they merely validate that, what is prescribed as a standard exists in the
company’s policies and procedures.
The pursuit of compliance is a noble cause. However, if your security team only focuses on
compliance, your organization will face increased risks. Compliance-focused requirements are
static while a security model today is usually dynamic. The speed at which technology and
cybercrime changes makes it very difficult for current regulations to drive best practices in
security.
One key area to address is your risk tolerance for each system or device, as they require
different levels of protection. For example, not patching the receptionist’s laptop isn’t as
important as not patching your ERP. Your team should review the criticality of each system
and decide which security measures to put into place.
Your team also must suggest aggressive measures to protect your data—even if their
recommendations provoke disagreements. The most successful IT security groups start
challenging conversations that cause conflicts amongst stakeholders.
11
To gain an accurate understanding of your security risks, you must get
comfortable with these uncomfortable conversations.
For example, many managers view patching as disruptive and don’t want to take the time
to do it. Your security team must show them why patching is important and the risks of not
keeping your company’s devices up to date.
Your security team should make leaders at your company uncomfortable for a short time
while they update your patches, as the business benefits outweigh any immediate, short-
term hassles.
Your security team must manage any conflicts that arise when they identify threats and
suggest measures to keep your data safe. These discussions won’t always be easy, but they
are critical to successful a security strategy.
12
Part 4
Leadership teams often have a false sense of security. They think: “it won’t
happen to us” or “only the most sophisticated hackers can breach our defenses.”
Don’t set it and forget it. That will result in big consequences.
13
How to Develop a Culture of IT Security
Here are three ways you can create a culture of IT security, starting in your boardroom:
14
2.2 Build a risk profile
In the past, corporate boards would rely on management to mitigate risks.
After the 2008 financial crisis, boards became more accountable for preserving
a company’s bottom line.
An IT security risk profile can help your leadership team stay informed and
accountable When you create a risk profile, be sure to address the following
areas:
When you look at each item, give it a security score that you based on industry
best practices and data.
Then, rank it in terms order of priority so that you know which items to
address first.
Then, as you take steps to improve your security posture, you can show the
board how your dashboards compare quarterly, at a minimum face to face,
and when you are initially rolling out your security program, it should be a
monthly communications with your board of directors.
15
3.3 Speak their language
Most business leaders don’t get excited “There’s not a ‘one
about the latest security technology and best and done’ solution
practices. If you focus your presentation on
for cybersecurity, no
the technical aspects of IT security, leadership
may tune out. silver bullet as we
like to call it. With
Instead, they want to know: cyber, there needs to
be continuous caring
• What the security problems are
and feeding of the
• How will those problems program. It’s a program
impact the company in financial that requires ongoing
terms improvement. And
that’s something very
• What types of actions are
important to explain to
needed to minimize risks from
the board.”
these problems
• The costs associated with fixing
the problems Zaki Abbas
VP and CISO at Brookfield
Asset Management27
Addressing these topics will give your
leadership team the information they need
to make informed decisions. After you share
this information, the board can decide if they
want to accept your current security risks or
take steps to mitigate them.
Business leaders are always looking for return on investment, which includes not just
tools but as best practices.
16
Part 5
Think of your security strategy like a colander. When you pour water into a
colander, it rushes through it.
However, if you stack several on top of each other, you will block the holes.
Eventually, just a few drops of water will escape through the bottom.
While you will never be 100% secure, you can fill most of your security
gaps and be more protected.
17
Endpoint protection
The average company experiences a malware infection rate of 1 to 3% per month. However,
26% of respondents to an IDG survey reported an infection rate higher than 3%.28
Enterprises often invest in rigid technology that fails to protect them from the latest threats.
For example, many enterprises think IDPS will block malicious content. But firewalls and IDPS
only secure the perimeter of your network.
To stop threats, you must cut them off at your endpoints. Look for an endpoint protection
solution that blocks threats in real-time across all areas of your network – including your ERP
infrastructure, the domain name system (DNS) level, and your mobile devices.
Here are five more ways to protect your endpoints from attacks:
Security solutions with intelligent sandboxing provide higher levels of protection. They do
this by carrying out static and dynamic analyses of files based on behavioral indicators.
They ask, “What type of behavior is typical for users, devices, and systems? And what
constitutes a deviation?” Using these solutions, companies have reported reducing false-
positive indications from 500 to just 2 or 3 actual threat indications.
18
4.4 Patch your mobile devices
Many devices, especially Androids, are released with operating systems that are already a year
old. Meanwhile, these devices are rarely patched, making them an easy target for hackers.
71% of all Android users on the five major U.S. carriers run security patches that are at least
two months old, according to a Symantec study.30
Meanwhile, Google revealed that half of the Android devices in use had not received a
platform security update in the previous year.31 With so little protection out-of-the-box, you
must find other ways to protect your enterprise’s mobile devices.
Here are five steps you can take to keep your mobile devices secure:
• Mandate patching.
• Your mobile device management platform should allow you to create consequences
for employees who don’t patch their phones. For example, if employees fail to install
the latest patches, you can lock them out of their email accounts on their insecure
devices.
19
5.5 Partner with a managed security
services provider (MSSP).
Companies that outsource their anti-malware and endpoint protection have lower malware
infec¬tion rates, according to a study by IDG.32 Among companies using MSSPs, 81% reported
infection rates of 3% or less, compared to 69% of companies using a coordinating response
team, 65% of companies using distributed incident response teams, and 63% using a Cyber
Incident Response Team (CIRT).
Moreover, only 19% of companies using MSPs experienced an infection rate over 3%,
compared to 32% of companies with a coordinating response team, 35% of those with
distributed incident response teams, and 30% of those with a CIRT.
Working with an MSSP also allows you to implement endpoint protection faster—while
minimizing your need to recruit, hire, and train qualified security staff.
20
How Hackers Access Your Network
Cybercriminals have moved beyond stealing credentials by email. They now target
data across numerous fronts, including via insecure applications. Here are just a few
of the techniques that hackers can use to gain access to your network:
• Spear phishing
• This is the most common type of phishing – accounting for 95%
of all attacks on enterprise networks.34 In a spear phishing attack,
hackers collect personal information about their targets to boost
their odds of success. For example, they might send you an email
that looks like it comes from a business partner.
• Whaling
• Cybercriminals use this technique to go after executives (the big
whales). Whaling emails often look like they come from a trusted
source and contain personalized information that motivates
executives to click malicious links.
• Clone phishing
• In this type of attack, a cybercriminal clones a legitimate email
and replaces the link or attachment with a malicious version.
Cloned emails are difficult to detect and can quickly spread –
giving hackers access to multiple people in your company.
21
Many enterprises still rely on anti-virus software to protect themselves from phishing
attempts. However, these tools only address known attacks. With almost 1.5 million phishing
sites created each month, your anti-virus software may not spot new, unknown attacks. In
addition to anti-virus protection, be sure to employ next-generation phishing defense. These
tools can include:
22
Intrusion detection and prevention systems (IDPS)
Intrusion detection and prevention systems (IDPS) include a combination of hardware
appliances and software that you install on a server or firewall. They monitor your network
and look for anomalous activity patterns that may indicate an attack.
Meanwhile, prevention systems automatically block potential threats. An IDPS can block
traffic based on content from a malicious internet protocol (IP) address and alert you of the
activity. For example, HTTPS traffic is allowed but the IDPS will see if a SQL injection attack is
embedded in the HTTPS request. Not only will an IDPS minimize your risk of a data breach,
but it also gives you greater visibility into your systems.
But installing IDPS technology doesn’t mean you are protected. Companies often invest
millions in an IDPS only to find out—months or even years later—that it’s not working.
Here are 10 questions that will help you determine if your IDPS is
functioning:
When was the last time you looked at your IDPS? How often do you test it to verify that it is
protecting your business?
2.2 How many intrusion events have you had in the past
30 days?
Check your IDPS to see how many events it has driven off your network in the past quarter. If
you have more than 300 employees, you should find at least one event per quarter.
3.3 How often is your IDPS updated, and how do you pull
your definitions?
Your IDPS may show that it is “up-to-date within 24 hours.” But this doesn’t mean anything if
it re-applies definitions that are years old.
23
4.4 Do you decrypt traffic for inspection?
You can inspect traffic through SSL encryption. The firewall decrypts using the SSL encryption
key and looks at the content. If the content is allowed, it opens the gate and allows the
encrypted packet to its destination.
Check your IDPS to ensure you have the proper licenses and that your system is performing
inspections.
Your security team should have a general idea of your throughput and how it has trended
over the past quarter.
For example, if you re-define a pre-filter object, it may bypass all of your existing policies.
Then, your devices won’t run.
Test every policy to make sure that they don’t overlap and prevent their functionality.
24
9.9 Who is accountable for your IDPS?
Many CIOs don’t have a dedicated security team, so they ask a network administrator or
junior engineer to set up their IDPS and then look after it.
However, if the person who configures your IDPS is the same person who monitors it,
you won’t have the checks and balances that are important for your ongoing security and
compliance. Companies have to show the segregation of duty between network and security,
as part of a Sarbanes Oxley (SOX) audit.
Meanwhile, your network administrator may not receive alerts from the IDPS. Since
everything is quiet, they may assume that your IDPS is running smoothly.
No news is not good news. If no one is receiving alerts, your IDPS isn’t working.
10
10. Do you have a dedicated team assigned to your IDPS?
Sophisticated security technology—such as an IDPS—requires an experienced and devoted
team. If your in-house staff lacks IDPS experience, it can take months to set up your
configurations and test your policies.
When you partner with an IDPS expert, they can configure your system in about 10 hours
and complete your testing in weeks—not months. Your IDPS partner will also ensure that
your critical system is monitored 24/7, continuously updated, and always functional.
25
Security information event management (SIEM)
Not all threats should be treated equally.
Most cybersecurity attacks come in the form of the deployment of malware such as
ransomware or unauthorized accessing (hacking) of a digital system or network.
However, the attack or threat vectors are the same. Threat vectors are pathways or methods
that are utilized to implement an attack.
A B
Type A Threat Vectors Type B Threat Vectors
Type A Type B
Type A threat vectors represent Type B threat vectors represent
methodologies of attack such as avenues by which an attacker could
flooding a transmission control deliver a payload, gain access to
protocol (TCP) or internet protocol a system, cypher information, or
(IP) network with so many make data unavailable. Regardless
requests that the system becomes of method or avenue, an attack
unresponsive, a DOS attack. Absent plays out virtually the same.
from this list are methods such as
phishing to gain access credentials
and ransomware attacks.
26
Prioritize your threats with SIEM
SIEM gives you a real-time analysis of the
security alerts generated by applications and
network hardware. It stores this data in a “For it is no longer a
single, central location—making it easy for you
to identify threats and analyze their severity.
question of ‘if ’, but
That way, you can prioritize your daily threats ‘when’ and ‘how often’.
and take immediate action to protect yourself I am convinced that
from the most critical ones.
there are only two
If it takes you too long to identify a breach, you types of companies:
won’t be able to recover. those that have been
hacked and those
Companies that don’t detect threats that will be. And even
within days have a higher risk of they are converging
going bankrupt. into one category:
companies that have
“More than 40% of businesses will been hacked and will
never reopen after a major natural be hacked again.”
disaster” – Gartner37
Robert S. Mueller, III
A SIEM system gives you immediate insights Former director of FBI
into threats so you can recover quickly. (RSA Cyber Security Conference,
January 2012)36
You can choose from three SIEM models,
depending on how many internal resources
you can devote to it:
27
ERP application security
Your ERP houses sensitive data from every area of your business—making it a prime target
for hackers.
89% of security professionals predict that attacks on SAP systems will increase, according to
an ERP Cybersecurity Survey.38 An SAP breach costs companies an average of $5 million, but
the impact can be far greater when you factor in a decrease in customer and stakeholder
confidence.
Working with a managed security provider can help you protect your company’s most
sensitive data. Look for a partner who offers a three-tiered security approach:
28
Look for a partner who offers the following security services:
• An endpoint protection solution that blocks threats in real-time. It should cover all areas
of your network—from your ERP infrastructure to the domain name system (DNS) level to
your mobile devices.
• Data quality
• End-user activity, including changes in user behavior that can put you at risk
• Logs such as access control (physical and logical), critical activities that result in
re-configuration, access to critical or sensitive data, and un-authorized/unusual
activities
• A security platform where you can definite custom monitoring to respond to emerging
threats to your ERP environment.
29
Security in the public cloud
Enterprises face significant challenges when they integrate cloud systems into their business
environments, specifically around security and compliance. If you fail to take the right security
measures, you will experience a breach.
To avoid breaches, you must assess the security of each cloud service, along with the hosted
application that it uses. Then, you must close any security gaps between your applications
and clouds. Here’s how:
• Ensure that your systems in the public cloud have at least the same
level of security and compliance as your private cloud and legacy
solutions.
• Since the public cloud is in a public space, you will quickly see if you haven’t fully
implemented your security requirements in the cloud. Mistakes made in the cloud
have greater exposure and opportunity for exploitation by hackers. For example, a
misconfigured IP address would not be internet routable on an internal network. In a
public cloud, however, it’s only two clicks away from open access and possible reportable
data disclosure to the public.
30
Data privacy
New information privacy and data protection laws
prohibit the disclosure or misuse of information
about individuals. More than 80 countries and
independent territories—including Canada and
many countries in Europe, Latin America, Asia,
and Africa—have adopted comprehensive data
protection laws.
31
There are some common-sense
approaches to handling sensitive data.
“A data breach is about
• Define the terms sensitive, private, both privacy and
or protected in easily understood security. And security
terms becomes very, very
important because
Employees, contractors, vendors, and customers
you can’t have privacy
need to understand what constitutes private data,
so they can handle with sensitivity, comply with unless you have
processes, and feel confident that information is good security. And if
protected. Some customers may have proprietary someone tries to say
or unique definitions for protected data, so be
sure to clarify.
otherwise, they are
crazy people!”
• Identify and communicate
proper methods of storage and
transmission Dr. Larry Ponemon
Founder and Chairman
Email, attachments to ticketing systems, and of Ponemon Institute41
internet facing sites should not be considered
secure for transmission and storage. Ensure that
the approved, secure methods of storage and
transmission are accessible to those who need
them. Schedule short trainings or create how to
information docs on accessing and using secure
tools.
32
Vulnerability assessment and management
Security is no longer something that businesses can consider as an option. What was
once regarded as a low-priority part of IT, information security is now a high priority.
When security is put aside, it can be devastating to a company – ask Ashley Madison,
the IRS, Target, Sony, eBay, and Evernote, to name a few.
All these companies have had millions of user records compromised in a data
breach, and they’re not alone. Other companies find themselves dealing with
Cryptowall or CryptoLocker, a Trojan virus that encrypts data and then holds the
decryption key for ransom.
The biggest misconception for any company is that vulnerability assessments and
security aren’t necessary. They think they aren’t (or won’t be) a target. The fact is that
any company can be a target, big or small.
Hackers want data. Your company is but a task on a hacker’s to-do list, to vacuum up
as much information as possible to then turn around and sell on the black market.
Nothing personal. It’s just business to them. Another misconception is that the
network is safe because a penetration test and audit have already been done.
Every day new threats are released. They may be new viruses or variants of the
same ones that hit companies in the past. This means what may have been safe last
year is not necessarily protected today. Penetration testing, vulnerability assessment
and audits are continual, regularly scheduled efforts. It can’t guarantee 100%
protection. However, it can stop attacks that would otherwise be successful.
The first benefit of a vulnerability assessment can identify resources at risk. You
should hire a professional to identify each vulnerable resource regardless of how
innocuous they may seem. Once vulnerable resources are assessed, each of them
can be prioritized and a value placed on the resource and the cost it would take to
defend the resource.
The most valuable part of a vulnerability assessment is the strategy to defend your
networks. Make sure you’re using a defense-in-depth strategy to protect your assets.
A vulnerability assessment helps to identify current risks to your infrastructure and
then proposes industry approved steps to remediate any issues to reduce your threat
footprint.
33
Even if defenses can’t be 100%
effective, they can minimize the
consequences. “60% of data
breaches are caused
Minimizing security risk is a complicated task
that requires consistent monitoring, patching, by a failure to patch.
and upgrading. Don’t wait for your data to be If you correct that,
compromised, hire a professional for a complete
vulnerability assessment of your networks. you’ve eliminated
60% of breaches.
For secure organizations, patching devices isn’t
optional. You can improve your devices’ security And I didn’t even
by mandating that employees install patches. have to say AI or
You can force employees to patch their desktops Blockchain! See
and mobile phones. For example, if they don’t how that works?”
patch their phones, they won’t be able to access
their email accounts.
Ricardo Lafosse
What layers are missing from your IT
CISO of Morningstar42
security strategy?
Taking a comprehensive, multi-layered approach
to IT security is key to protecting your enterprise
from threats.
Most companies don’t recognize the value in risk assessments and impact assessments
since they are long and tedious, but they are well worth it.
With the right strategy and plan—and the right people—you can prevent intrusions and
keep your enterprise secure.
34
Part 6
A Lack of Cybersecurity
Talent Puts You at Risk
Despite the increase in threats, many
enterprises don’t have the internal skills or
resources to defend themselves against attacks.
IT leaders don’t have enough staff or budget to defend adequately against the
threats mentioned on the previous pages, according to a Black Hat report.43
Black Hat’s findings are in line with other reports. For example, 68% of security
professionals said a cybersecurity skills shortage is impacting their ability to stay
on top of vulnerabilities.44
In fact, Black Hat found that 40% of security professionals consider themselves
burnt out. Meanwhile, 54% believe that the levels of anxiety, depression, and
addiction are higher among security pros than they are among the general U.S.
population.
35
How to overcome the cybersecurity skills gap
Unfortunately, the cybersecurity skills shortage will only get worse. Analysts predict
that 3.5 million global cybersecurity jobs will go unfilled by 2021, up from 1 million
vacant positions in 2014.45
Even if you find cybersecurity experts, there’s no guarantee that they will stay with
your company. ESG research46 revealed that 49% of cybersecurity professionals
receive job solicitations at least once per week. This news is excellent for people who
want a career in cybersecurity, but it’s a problem for CIOs that need to retain skilled
professionals at a reasonable salary.
36
Part 7
Choosing the right MSSP can be overwhelming. Many of them sound similar on paper,
which makes it hard to determine if they can meet your business and IT needs.
Here are 10 questions that will help you identify the right MSSP.
Choose an MSSP that is a certified SAP, Oracle, or JDE partner. Their team should also have
relevant technical certifications with your ERP provider.
In addition to technical expertise, look for an MSSP that offers the right tools. For example,
they should provide monitoring tools that were custom-built for your ERP. They should
proactively monitor your ERP environment and send you alerts of potential threats.
37
2. 2 How will they handle your data?
Get clear on your security goals and requirements before you speak with an MSSP. For
example, do you need to store any data on-premises? Does some of your data require
different levels of control and protection? Must you comply with GDRP?
Also, find out what will happen if your MSSP gets hacked. How will they respond? How
quickly will they notify you of the breach? What are their legal requirements?
Your MSSP should offer modern encryption tools that support field-specific encryption
and granular user access control. Look for an MSSP that provides:
• Column-level transparent data encryption for all platforms supported by your ERP
• Fine-grained control over who has access to decrypt which fields and columns
38
2. 5 What can the MSSP provide in terms
of credible, detailed references?
You may not be able to speak with a customer reference, as most enterprises won’t put
themselves at risk by discussing their security challenges or which MSSP they use.
But there are other ways to find out if your MSSP is credible. For example, they can
show you endorsements from leading IT vendors. They can also give you a list of their
certifications to prove that they keep their skills and technologies up to date.
Also, be sure to Google the name of your MSSP plus “breach” to find out if any of their
customers fell prey to a cyberattack or other form of data loss. A quick Google search can
pull up items that you don’t hear about in the news. After all, you don’t want to hire an
MSSP and later find out that they were involved with a major breach.
Make sure that your MSSP automates their ticket generation and logs all their work.
This increases your accountability and ensures that your MSSP will declare issues on a
technical basis, not a subjective basis. That way, your MSSP can’t ignore problems until
they turn into a security incident.
Ask your MSSP what tools they use for their customers and IT environment. Also, ask
how they keep current with the latest security best practices.
For example, beware of a vendor that relies heavily on anti-virus tools, as they offer
little protection from today’s sophisticated threats. Instead, choose an MSSP that offers
advanced endpoint protection to keep malware from getting onto your enterprise’s
computers and devices.
In addition to endpoint technology, your MSSP should draw from a broad security toolkit.
Find out what tools your MSSP will use to mitigate your risks and resolve threats.
39
2. 8 Do they have experienced staff in your time
zone(s)?
Your security risks increase during the hours that your employees work. Choose an MSSP
who keeps similar office hours. That way, they will be available when you are at your
most vulnerable.
Make sure that your MSSP assigns skilled technicians to your account. If you use
technologies such as SAP or Oracle, look for an MSSP who is a certified partner. That way,
you can rest assured that your MSSP has people on staff who know how to implement
and run your core systems.
Your MSSP’s team should also keep their skills sharp. The cybersecurity world changes
rapidly, so your MSSP must stay on top of the latest trends. Ask your MSSP how they
expand their knowledge. For example, do they attend security conferences to learn about
the latest threats and best practices?
40
Part 8
Syntax managed security services can be deployed from start to finish in just minutes/
hours. Get protection against billions of threats and bring control to your environment.
Our comprehensive security services include:
• Endpoint Security
Stop advanced attacks at your endpoints. Syntax offers 24/7/365 security coverage,
without the high costs of hiring full-time security professionals.
• ERP Security
Syntax offers a full suite of SAP, JD Edwards, and Oracle EBS migration, management,
and security services. We are an SAP Gold Certified Global Partner and an Oracle Platinum
Partner with more than 45 years of experience managing these complex systems.
Gain deeper insights into your network behavior so that you can fine-tune your security.
With Syntax, you can increase operational efficiency and reduce overhead by separating
actionable events from the noise, helping you better prioritize threats and improve your
security posture.
41
• Security Information and Event Management (SIEM)
Get real-time analysis of the security alerts generated by your applications and network
hardware. Syntax protects you from threats, improves your regulatory compliance, and
helps you avoid the capital expenses and operational complexity of an on-premise SIEM
solution.
Syntax’s Security Assessment Services identify your vulnerabilities and trains you
in preventative measures—helping you safeguard your critical systems and data.
Your assessment will check both your internal and public-facing vulnerabilities,
as well as train your employees on security awareness so that they don’t make a
mistake that will put your business at risk.
FraudID for JD Edwards EnterpriseOne, proactively detects and alerts for suspicious
transaction activity by closely monitoring production data in real-time.
Syntax’s High Availability and Disaster Recovery solutions protect your systems
and your users from unexpected delays and downtime by depending on the best-
of-breed in replication technology. More importantly, our cloud-based solution
also offers guaranteed business continuity in the event of a disaster. We offer
some of the industry’s most aggressive Recovery Point Objectives (RPOs) and
Recovery Time Objectives (RTOs).
42
Part 9
Next Steps
Want to learn more about how to protect and secure your company?
You can also find the latest security best practices on the Syntax blog.
Why Syntax?
• Providing comprehensive technology solutions since 1972
• 1,000+ customers
• Oracle Platinum Partner with 650+ Oracle ERP customers
• SAP Gold Certified Global Partner with 6,000+ SAP systems under management
• One of the first SAP customers globally (#7)
• One of the highest customer satisfaction rankings in the industry
• Recognized by Oracle as the #1 Cloud Provider for Oracle JD Edwards
• Winner of the Oracle JD Edwards Partner Excellence Award
• One of the first Oracle E-Business Suite Hosting Providers to provide managed services
• AWS Advanced Consulting Partner
• Microsoft Gold Partner
• A Cisco Select and Managed Security Services Partner
• IBM 2018 North America Excellence Award for Top Strategic Services Partner
• HPE 2019 North America Service Provider Award for Customer Excellence
Since 1972, Syntax has been providing comprehensive technology solutions to businesses of all
sizes with thousands of customers trusting Syntax with their IT services and ERP needs. Today,
Syntax is a leading Managed Cloud Provider for Mission Critical Enterprise Applications. Syntax has
undisputed strength to implement and manage ERP deployments (Oracle, SAP) in a secure and
resilient, private, public, or hybrid cloud. With strong technical and functional consulting services,
and world class monitoring and automation, Syntax serves corporations across a diverse range of
industries and markets. Syntax has offices worldwide, and partners with Oracle, SAP, AWS, Microsoft,
IBM, HPE, Cisco, and other global technology leaders. Learn more about Syntax at www.syntax.com.
References
1. Ponemon Institute: 2019 Cost of a Data Breach Study, 2019
2. Wikipedia: GDPR fines and notices
3. FireEye: Most organizations plan to increase their cybersecurity budgets in 2020, November 6, 2019
4. Fortinet: The State of Operational Technology and Cybersecurity Report, 2019
5. Operational Technology Cyber Security Alliance (OTCSA)
6. Infoblox: Infoblox research finds explosion of personal and IoT devices on enterprise networks introduces immense security risk, May 14, 2018
7. 802 Secure: 802 Secure Shares IoT Threat Research at Internet of Things World 2018, Santa Clara, May 16, 2018
8. The Santa Fe Group: Third Party IoT Risk: Companies Don’t Know What They Don’t Know, May 3, 2019
9. Forrester: The State of Enterprise IoT Security in North America, 2019
10. Malwarebytes Labs: Cybercrime Tactics and Techniques, 2019 State of Malware
11. McAfee: McAfee Labs 2020 Threats Predictions Report, December 4, 2019
12. Coveware: Ransomware Costs Double in Q4 as Ryuk, Sodinokibi Proliferate, January 22, 2020
13. SANS Analyst Program: Endpoint Protection and Response, a SANS Survey, June, 2018
14. BusinessWire: Independent Market Survey Reveals 64% of ERP Deployments Have Been Breached in the Last 24 Months, October 2, 2019
15. What Are the Consequences of Data Loss? By Mark Campbell https://www.unitrends.com/blog/what-are-the-consequences-of-data-loss
16. Accenture: From lead weight to launch pad: Realizing digital objectives while managing legacy optimization, 2016
17. CPO Magazine: 2019 Sans Institute Cloud Security Survey Reveals Top Threats, Which Surprisingly Are Not DDoS Attacks, May 28, 2019
18. Cybersecurity Insiders: 2019 Cloud Security Report, 2019
19. Wall Street Journal, Equifax Reaches $700 Million Settlement Over Data Beach https://www.wsj.com/articles/equifax-reaches-700-million-
settlement-over-data-breach-11563798429
20. McAfee RP Enterprise Supernova Data Dispersion https://www.mcafee.com/enterprise/en-us/assets/reports/restricted/rp-enterprise-
supernova-data-dispersion.pdf
21. McAfee RP Enterprise Supernova Data Dispersion https://www.mcafee.com/enterprise/en-us/assets/reports/restricted/rp-enterprise-
supernova-data-dispersion.pdf
22. McAfee RP Enterprise Supernova Data Dispersion https://www.mcafee.com/enterprise/en-us/assets/reports/restricted/rp-enterprise-
supernova-data-dispersion.pdf
23. Security Week: Compliance is Not Synonymous With Security, May 21, 2018
24. Iron Net: New Survey Finds Vast Majority of IT Security Pros Willing to Share Threat Intel to Improve Overall Collective Defense Efforts, May
15, 2019
25. Ponemon Institute: 2018 Study on Global Megatrends in Cybersecurity, 2018
26. Ponemon Institute: 2018 Study on Global Megatrends in Cybersecurity, 2018
27. 20 Top Cybersecurity Quotes for 2020 https://www.secureworldexpo.com/industry-news/20-top-cybersecurity-quotes-for-2020
28. IDG: Why and How to Block Security Breaches at the Endpoint
29. Cisco: Small and Mighty How Small and Midmarket Businesses Can Fortify Their Defenses Against Today’s Threats, 2018
30. Symantec: Mobile Threat Intelligence Report – 2016 in Review, March 23, 2017
31. Google: Diverse protections for a diverse ecosystem: Android Security 2016 Year in Review, March 22, 2017
32. IDG: Why and How to Block Security Breaches at the Endpoint https://info.syntax.com/whitepapers/2/block-security-breaches-at-the-
endpoint
33. CSO Magazine: https://www.csoonline.com/article/3153707/top-cybersecurity-facts-figures-and-statistics.html
34. IDG: How to Blunt Spear Phishing Attacks
35. FBI: Business E-Mail Compromise E-Mail Account Compromise The 5 Billion Dollar Scam, May 4, 2017
36. How Secure is Your Firm’s Cyber Security Health? https://www.withum.com/resources/secure-firms-cyber-health/
37. Stress-Test Your Business Continuity Management, February 12, 2020 Contributor: Jordan Bryan https://www.gartner.com/smarterwithgartner/
stress-test-your-business-continuity-management/
38. ERPScan.com: ERP Cybersecurity Survey, 2017
39. What is the Heartbleed bug, how does it work and how was it fixed? CSO Magazine, https://www.csoonline.com/article/3223203/what-is-
the-heartbleed-bug-how-does-it-work-and-how-was-it-fixed.html
40. University of Delaware Disaster Research Center Preliminary Paper #256, FUTURE DISASTER TRENDS: IMPLICATIONS FOR PROGRAMS
AND POLICIES, E. L. Quarantelli, 1997 http://udspace.udel.edu/bitstream/handle/19716/199/PP256-%20Future%20Disaster%20Trends.
pdf;jsessionid=2954239C39CE0C82B82698E4D50C5E12?sequence=1
41. 20 Top Cybersecurity Quotes for 2020 https://www.secureworldexpo.com/industry-news/20-top-cybersecurity-quotes-for-2020
42. 20 Top Cybersecurity Quotes for 2020 https://www.secureworldexpo.com/industry-news/20-top-cybersecurity-quotes-for-2020
43. Black Hat USA: New Black Hat USA Research: Your Private Information Is Already Available to Criminals; U.S. Elections, Critical Infrastructure
Also at Risk, July 1, 2019
44. Tripwire: Cybersecurity Skills Gap Survey 2019
45. The New York Times: The Mad Dash to Find a Cybersecurity Force, November 7, 2018
46. ESG: The Life and Times of Cybersecurity Professionals, 2017
47. Block Security Breaches at the Endpoint Whitepaper https://info.syntax.com/whitepapers/2/block-security-breaches-at-the-endpoint
48. Cybersecurity Ventures: Cybersecurity Talent Crunch To Create 3.5 Million Unfilled Jobs Globally By 2021, October 24, 2019