800-214-0957 info@blackbottleit.com
Make it Harder for Hackers to Intrude

Make it Harder for Hackers to Intrude

Implementing strong password policies is crucial for protecting business systems. If you think this best practice does not apply to your business, what would you say and do if your employees’ and customers’ personal information were stolen?

Here’s a more detailed breakdown on the best practices to fight modern-day intrusions.

Require complex passwords:

  • Set minimum length requirements (e.g., at least 12 characters)
  • Mandate a mix of uppercase and lowercase letters, numbers, and special characters
  • Prohibit common words, phrases, or easily guessable information (like birthdates)
  • Consider using passphrases instead of single words

Implement multi-factor authentication (MFA):

Require a second form of verification beyond passwords

Options include:

  • SMS codes (though less secure than other methods)
  • Authenticator apps (like Google Authenticator or Authy)
  • Hardware tokens (such as YubiKeys)
  • Biometric verification (fingerprints, facial recognition)

Apply MFA to all critical systems and accounts, especially those with administrative access

Use password managers:

  • Encourage or require employees to use reputable password management tools
  • These tools generate and store strong, unique passwords for each account
  • Reduces the risk of password reuse across multiple accounts
  • Some options include LastPass, 1Password, or Bitwarden

Implement password rotation policies:

  • Require password changes at regular intervals (e.g., every 90 days)
  • Prevent reuse of recent passwords
  • Monitor for compromised credentials:
  • Use services that check if employee email addresses or passwords have been exposed in known data breaches
  • Require immediate password changes if compromised credentials are detected

Implement account lockout policies:

  • Lock accounts after a certain number of failed login attempts
  • This helps prevent brute-force attacks

Use single sign-on (SSO) for multiple applications:

  • Reduces the number of passwords employees need to remember
  • Allows for centralized control and monitoring of access

By implementing these robust password policies, businesses can significantly reduce the risk of unauthorized access to their systems, making it much harder for hackers to intrude when you are at work and away!

Black Bottle IT would love to learn more about your work environment and provide an assessment for a modern-day cybersecurity solution. Contact us today!

The 3 Why, What and When of SOC 2

Implementing strong password policies is crucial for protecting business systems. Here’s a more detailed breakdown:

  1. Require complex passwords:
    • Set minimum length requirements (e.g., at least 12 characters)
    • Mandate a mix of uppercase and lowercase letters, numbers, and special characters
    • Prohibit common words, phrases, or easily guessable information (like birthdates)
    • Consider using passphrases instead of single words
  2. Implement multi-factor authentication (MFA):
    • Require a second form of verification beyond passwords
    • Options include:
      • SMS codes (though less secure than other methods)
      • Authenticator apps (like Google Authenticator or Authy)
      • Hardware tokens (such as YubiKeys)
      • Biometric verification (fingerprints, facial recognition)
    • Apply MFA to all critical systems and accounts, especially those with administrative access
  3. Use password managers:
    • Encourage or require employees to use reputable password management tools
    • These tools generate and store strong, unique passwords for each account
    • Reduces the risk of password reuse across multiple accounts
    • Some options include LastPass, 1Password, or Bitwarden
  4. Implement password rotation policies:
    • Require password changes at regular intervals (e.g., every 90 days)
    • Prevent the reuse of recent passwords
  5. Monitor for compromised credentials:
    • Use services that check if employee email addresses or passwords have been exposed in known data breaches
    • Require immediate password changes if compromised credentials are detected
  6. Implement account lockout policies:
    • Lock accounts after a certain number of failed login attempts
    • This helps prevent brute-force attacks
  7. Use single sign-on (SSO) for multiple applications:
    • Reduces the number of passwords employees need to remember
    • Allows for centralized control and monitoring of access

By implementing these robust password policies, businesses can significantly reduce the risk of unauthorized access to their systems, making it much harder for hackers to intrude.

Going Beyond Boundaries. The Need to Define Access Controls   

Going Beyond Boundaries. The Need to Define Access Controls   

It is about that time of year when employees submit for their vacation. Will you allow them to take their work computer on vacation? There are two obvious reasons not to allow their workbag to travel with them. Vacations are a time for rest, relaxation, and spending time with friends and families. Second, a work computer undoubtedly contains sensitive information. A leak of any sensitive information in or out could be catastrophic to your organization.   

What are Access Controls?  

Access controls are security measures or ‘boundaries’ that regulate who can access specific resources, such as data, systems, or physical locations, what actions they can perform when they have access, and where they can access.  “Good access control rules around your tenant” specifically means that your organization must limit “who can access the account, from where, and from what device.”  

As in the illustration, access controls can limit where systems can be accessed by specific machines and even by allowed business hours. So, if a bad actor is trying to access critical systems from outside the normal geography of business (e.g., outside the U.S.), during odd times of the day (e.g., 2:00 a.m.), access would be blocked. This type of control protects sensitive data if credentials are compromised.  

 
It is important to define where company employees access systems, from what machines, and during what times of the day. If employees are doing work outside of these controls, develop a process for requesting temporary access, for example, working from the beach, and set the beginning and ending timeframes to remove access from these temporary situations.

  

Why Access Controls?  

Reducing the attack surface: Limiting access to systems and data reduces the potential attack surface for cybercriminals. Even if a malicious actor gains access to login credentials,  part of access controls can prevent them from compromising systems.

There is a lot at stake in addition to protecting sensitive data. Access controls ensure that only authorized users have access to sensitive information. While the experts at Black Bottle IT are focused on cybersecurity and limiting the potential for a cyber incident, when you limit geography, machine, and time systems can be accessed, you also reduce the risk of human errors that cause lost data.   

  

Three Reasons Why Access Controls Are Fundamental 

Compliance requirements: Many industries have strict regulations governing the protection of sensitive data, such as HIPAA in healthcare or GDPR in the European Union. Implementing access controls helps organizations comply with these regulations by demonstrating that they have measures to safeguard data.

Detecting and responding to security incidents: Access controls can also help detect and respond to security incidents. Organizations can identify suspicious activity and respond promptly to potential threats by logging access attempts and monitoring user behavior.  

Maintaining business continuity: Cybersecurity incidents can disrupt business operations and lead to significant financial losses. Access controls help maintain business continuity by minimizing the impact of security breaches and ensuring that critical systems and data remain protected. 

  

What Your Organization Must Do to Protect Company Data  

  • Heighten Cybersecurity Awareness & Phishing Training    
  • Enforce Access Controls around all cloud-based tools, i.e., AWS, Google Workspace, QuickBooks Online, Microsoft Office 365   
  • Lock down the Administrative Account to a specific IP address  
  • Monitor Tenants 24×7 — multiple organizations or individuals, referred to as “tenants,” share the same computing infrastructure, resources, and services  
  • Continuous monitoring is crucial for promptly detecting and responding to security threats and incidents as they occur, minimizing the potential impact on tenants’ data and systems.  

 

Remember: Heightening cybersecurity controls, like access controls, does not indefinitely prevent a cybercriminal from gaining access but makes it more difficult.   

Everyone deserves a vacation. We have you covered.  Contact us today for more information and how to get started with access controls. blackbottleit.com/contact-us.

The More Cybersecurity Changes The More it Remains the Same

The More Cybersecurity Changes The More it Remains the Same

“The more things change, the more they stay the same” means that despite apparent changes or advancements, certain fundamental aspects or patterns remain unchanged over time. One could relate this to cybersecurity.

  • Cyberattacks cost impacted organizations thousands, if not millions, of dollars.
  • Cybersecurity is a critical element of homeland security after 9-11.
  • Ransomware and phishing have always been pervasive.
  • Since on-premise storage still exists for some businesses, despite the rise of cloud computing, monitoring and protecting data will remain an important part of any security execution plan.

Gartner reports that 85% of organizations will embrace a cloud-first principle by 2025 and will not be able to fully execute their digital strategies without the use of cloud-native architectures and technologies. (May 2023)

Three Key Cybersecurity Focal Points that Will Remain the Same for Foreseeable Future

Rise in Cybersecurity Regulations:

Governments and regulatory bodies were expected to enhance and introduce new cybersecurity regulations to address the evolving threat landscape and protect sensitive data.

Focus on Cloud Security:

With the increasing adoption of cloud services, there was a growing emphasis on securing cloud environments. This includes implementing robust identity and access management, encryption, and monitoring.

Enhanced Endpoint Security:

As remote work became more prevalent, securing endpoints (devices used by employees) gained importance. Endpoint detection and response (EDR) solutions were expected to evolve.

 

This year, we will learn more about AI and machine learning techniques to improve response efficiency.

Black Bottle IT is focused on keeping data secure, which, in turn, will keep your business operational and competitive.  Please reach out if you want to outsource your organization’s cybersecurity function!  Contact us today. 

The Difference Between Passwords, Fingerprint, MFA

The Difference Between Passwords, Fingerprint, MFA

How Likely will Your Business be Compromised without MFA?

 

MFA: strengthens your security posture and protects you from phishing attempts and compromised passwords.

According to Microsoft, your business is 99% less likely to get hacked with MFA implemented.

October is Cybersecurity Awareness Month, and the ideal time to implement MFA.

When we hear that MFA is annoying, expensive or not secure, our answer is, “Is a breach not more annoying as it will most likely shut down your business for a period of time, costing your business thousands of dollars  And, how’s about your reputation with customers?”

Black Bottle IT offers MFA as part of our comprehensive solution to make implementing it fast, easy, and cost-effective for organizations of all sizes. We aim to make MFA easy and affordable so that it becomes pervasive and every organization can benefit from the added protection.

Talk with an Expert!

 

Where do Cyberattacks Start

Where do Cyber Attacks Start? 

Cyberattacks can happen on any device at any given time, so how do you know which devices to protect your clients on? Well, to understand this, it will help to understand where these attacks come from.

In the past, all attacks came from outside sources, or, in other words, the internet. Cybersecurity companies combatted these attacks by setting up firewalls, IDS, and IPS systems to block any incoming attacks. Anti-virus software also became a reliable program to trust; however, these methods are outdated. Now, attacks can take place just about anywhere.

The malware that hackers now use is encrypted to the point that they are essentially invisible to firewalls and IDS systems. Historically, these edge devices acted as the first line of defense, protecting the network from outside threats, but this is no longer the case. The line of devices that attackers needed to penetrate before they could make a serious breach is no longer a concern to hackers.

 

4 Most Common Cyberthreats!

Black Bottle IT - 4 Most Common Cyberthreats

Just as military tactics and weapons continue to advance, so do the methods of cyber threats. With these advancements, cyber attackers have devised multiple ways to bypass edge protection and gain direct access from inside the network. This is made possible through email phishing, accidentally entering an incorrect site, allowing your kids to play games on unsecured websites, and more. 

Your Network is Vulnerable 

While networks are still organized from edge devices to wireless access points, and then to servers and personal devices, these advanced malware attacks ignore the line of defense that once proved competent. Companies do not realize that attacks can take place from within their network. In fact, many companies still rely on firewalls and anti-virus software. This is not enough. Rather than simple edge protection, companies need cybersecurity solutions that give them full coverage. 
 
With solutions from a reliable cybersecurity company, when an attack is made — no matter where it is coming from — the company is notified immediately, and the attack can be isolated before it spreads. This combination gives companies a centralized security system with all the necessary assistance. 
 

Let’s Get Started

If your clients have any problems with their cybersecurity products, contact us to learn more about how we can help you.