Popular, Tip Sheet

Top Cybersecurity Controls of 2023

At LMG, security experts constantly monitor the latest threats, track data breach trends, analyze cyber regulations and legal cases, and evaluate the effectiveness of controls and solutions.

Based on this extensive and continuous research, our experts have identified the top cybersecurity controls for today’s risks. These controls have been selected because they are specifically relevant due to today’s changes in the threat landscape, cybersecurity solutions space, and/or regulatory environment. This timely and prioritized list is designed to augment a comprehensive list of controls such as the NIST Cybersecurity Framework or ISO 27001.

When selecting the top controls, LMG’s analysts consider:

  • The effectiveness of each control against current threats and vulnerabilities.
  • The relative financial investment and resources required in order to implement the control.
  • The importance of the control for demonstrating compliance or meeting third-party expectations.

And now, without further ado…

The Top Cybersecurity Controls of 2023

These controls have been selected because they are specifically relevant due to today’s changes in the threat landscape, cybersecurity solutions space, and/or regulatory environment.

  1. Advanced Multifactor Authentication (MFA)

Multifactor Authentication (MFA) is a must for all Internet-facing systems, and it is increasingly deployed throughout internal infrastructures as well. Use strong authentication technologies, such as hardware tokens or smartphone apps, and move away from weaker MFA tools such as SMS (text messages), phone calls, emailed codes, and more. The U.S. government recommends using “phishing-resistant” MFA technologies to foil social engineering tactics.

Configuration matters – with the rash of “MFA Fatigue” attacks, defenders need to limit the number of MFA attempts and leverage more advanced options like Microsoft’s number matching. Consider deploying adaptive MFA technologies that use context such as location, device type and time to automatically provide appropriate MFA challenges. Read this MFA Tip Sheet for more information and best practices.

  1. Endpoint Protection

Endpoint protection, such as EDR technology, quickly detects and neutralizes threats and facilitates effective response. Simple EDR is not enough these days: Managed Detection and Response (MDR) includes outsourced 24/7 monitoring and response, while Extended Detection and Response (XDR) centralizes and streamlines techniques holistically across the network, cloud, and endpoints of all kinds. XDR reduces risk, simplifies operations and decreases the total average cost of a data breach by $190,622, according to IBM.

  1. Employee Cybersecurity Training & Awareness

Humans are a critical part of your security arsenal. Every organization needs to keep security top-of-mind with a robust training program. Gone are the days when an annual webinar would suffice. Today, cybersecurity training needs to be provided monthly or more frequently to effectively address the latest threats. Consider on-demand cybersecurity awareness training with short videos and quizzes to train and test your team. Curate the content appropriately to ensure it addresses your organization’s risks.

These controls have been selected because they are specifically relevant due to today’s changes in the threat landscape, cybersecurity solutions space, and/or regulatory environment.

  1. Identity and Access Management

Hackers have perfected the art of account takeover, leveraging user, administrator, and system accounts at every stage of the attack. What’s more, cybercriminals offer insiders lucrative payments to help hack their employers. Modern Identity and Access Management (IAM) systems centralize identity management throughout an enterprise, facilitating quick onboarding and offboarding, effective role-based access and restrictions, detection of suspicious activity, and more. Every organization should have an IAM system and regularly maintain it to minimize the risk of account takeovers and insider attacks.

  1. Vulnerability Management

Software exploitation was the top initial infection vector in 2021, according to Mandiant. Today’s hackers can easily shop for exploits on the dark web and develop new exploits using stolen source code and bug reports. All organizations need effective vulnerability management tools and processes, including operating systems and third-party applications. This includes automated patch deployment whenever possible, as well as strong verification systems and alerts when errors occur. With the rise of zero-day software vulnerabilities, defenders need to plan their response and be ready to deploy critical patches after hours and on weekends when needed.

  1. Cloud Configuration Management

As data moves to the cloud, security responsibility moves with it. Make sure to conduct a cloud application security review upon migration, and plan for ongoing configuration maintenance. This includes common platforms such as Microsoft 365, AWS, and others. Ensure that your configuration review is conducted by trained and experienced personnel or outsource as needed. Unfortunately, many organizations overlook cloud application security and suffer needless data breaches as a result of minor configuration errors.

  1. Attack Surface Monitoring

Attackers are relentless—and defenders need to continuously monitor their attack surface to prevent security breaches. Typically, this requires continuous vulnerability scanning, configuration checks, and automated asset discovery. In today’s threat landscape, monthly vulnerability scans are no longer sufficient. Defenders must employ automated tools to scan daily or even hourly and alert a ready response team when weaknesses are detected.

  1. Penetration Testing

Hackers often leverage weaknesses that can’t be detected by automated tools. Conduct routine penetration tests to uncover real-world issues such as misconfigurations, sensitive data exposure, unpatched vulnerabilities, authentication bypass and more. Penetration tests enable you to proactively identify security risks that real hackers could actually exploit, and effectively prioritize your cybersecurity investments. Make sure to conduct tests of your key assets, such as your network, web sites and any custom applications. To watch penetration testers in action, see LMG’s video, “How Hackers Go from Zero to Takeover.”

  1. Incident Response Testing and Training

Organizations that formally establish their incident response (IR) team and regularly test their IR plans save $2.66 million on the average cost of a data breach, according to IBM. Assign incident response roles, document policies and procedures, and conduct tabletop exercises to train your staff and identify gaps in your response. Make sure to test your after-hours processes: Attackers frequently launch attacks at night, or on holidays and weekends, when organizations have fewer staff to monitor and respond to alerts.

  1. Next-Gen Backups

Attackers deploy sophisticated tools to extract passwords and valuable data from backup files, and routinely work to destroy backups. All organizations should configure immutable backups, which block even administrators from modifying or deleting data. Prevent attackers from accessing backup files and the backup environment using multilayer security. To accomplish this, invest in modern backup tools that support immutability, as well as trained and experienced professionals to configure and test your systems.

  1. Data & Asset Inventory

In order to secure your data and technology infrastructure, you have to know what it is—but most organizations do not maintain a comprehensive inventory of data or technology assets, and therefore cannot properly address risk and align security investments. All too often, inventories are conducted in an emergency, post-breach, resulting in exorbitant bills. Every organization should proactively conduct data mapping and asset inventory, using automated tools with robust reporting features.

12. Qualified Security Leadership

Every organization needs an experienced CISO or security leader to provide effective guidance and meet compliance requirements. Regulators such as the FTC and NYDFS now require that certain organizations hire a “qualified individual” to oversee their cybersecurity programs. IBM found that having a skilled CISO decreased the average cost of a breach by $144,914. But skilled security leaders are hard to find and expensive to hire. Small to midsized organizations can save money and gain access to skilled leadership with a fractional CISO.

For more information or help implementing the 2023 Top Cybersecurity Controls, contact LMG’s team of experts. Also, stay tuned for our quarterly featured control for a deeper dive into the industry trends that prompted our quarterly selection.

Download the Top Cybersecurity Controls of 2023 here.

For more information or help implementing the Top Cybersecurity Controls, contact LMG’s team of experts.

Also, stay tuned for our quarterly featured control for a deeper dive into the industry trends that prompted our quarterly selection.

CONTACT US