www.reliaquest.com Open in urlscan Pro
141.193.213.20  Public Scan

Submitted URL: https://email.reliaquest.com/NDM4LUtZSy03ODYAAAGFbYd-L8CPgth07Di4nVPvBdDH9a7-mQ0_3MlMGm0Wceph55llteW-0GdD5T0-4rxSQqfEa1w=
Effective URL: https://www.reliaquest.com/blog/cybersecurity-bad-practices-expanding-on-the-cisa-list/?mkt_tok=NDM4LUtZSy03ODYAAAGFbYd-Lxk...
Submission: On July 05 via api from US — Scanned from DE

Form analysis 4 forms found in the DOM

GET https://www.reliaquest.com/

<form method="get" id="h_searchform" action="https://www.reliaquest.com/" role="search">
  <div class="input-group">
    <label for="search" style="display:none;">Search</label>
    <input class="field form-control" id="search" name="s" type="text" aria-labelledby="search" placeholder="Type and hit enter ..." autocomplete="off">
    <span class="input-group-btn">
      <input class="submit btn search_btn" id="searchsubmit" name="submit" type="submit" value="Go">
    </span>
  </div>
</form>

<form id="mktoForm_1795" novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutAbove" style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); width: 1601px;">
  <style type="text/css">
    .mktoForm .mktoButtonWrap.mktoSimple .mktoButton {
      color: #fff;
      border: 1px solid #75ae4c;
      padding: 0.4em 1em;
      font-size: 1em;
      background-color: #99c47c;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#99c47c), to(#75ae4c));
      background-image: -webkit-linear-gradient(top, #99c47c, #75ae4c);
      background-image: -moz-linear-gradient(top, #99c47c, #75ae4c);
      background-image: linear-gradient(to bottom, #99c47c, #75ae4c);
    }

    .mktoForm .mktoButtonWrap.mktoSimple .mktoButton:hover {
      border: 1px solid #447f19;
    }

    .mktoForm .mktoButtonWrap.mktoSimple .mktoButton:focus {
      outline: none;
      border: 1px solid #447f19;
    }

    .mktoForm .mktoButtonWrap.mktoSimple .mktoButton:active {
      background-color: #75ae4c;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#75ae4c), to(#99c47c));
      background-image: -webkit-linear-gradient(top, #75ae4c, #99c47c);
      background-image: -moz-linear-gradient(top, #75ae4c, #99c47c);
      background-image: linear-gradient(to bottom, #75ae4c, #99c47c);
    }
  </style>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
      <div class="mktoOffset" style="width: 10px;"></div>
      <div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 100px;">
          <div class="mktoAsterix">*</div>Email
        </label>
        <div class="mktoGutter mktoHasWidth" style="width: 10px;"></div><input id="Email" name="Email" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email" class="mktoField mktoEmailField mktoHasWidth mktoRequired"
          aria-required="true" style="width: 150px;"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="botCheckerHidden" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoButtonRow"><span class="mktoButtonWrap mktoSimple" style="margin-left: 0px;"><button type="submit" class="mktoButton">Submit</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
    value="1795"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="438-KYK-786">
</form>

<form novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutAbove"
  style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;"></form>

<form>
  <input class="st-default-search-input st-search-set-focus" type="text" value="" placeholder="Search this site" aria-label="Search this site" id="st-overlay-search-input" autocomplete="off" autocorrect="off" autocapitalize="off">
</form>

Text Content

SOC Talk: Conversations from the Trenches continues 7/13 with Detection,
Investigation and Response in a Cloud-Based World. Register Today ➞
 * Why ReliaQuest?
    * Why ReliaQuest We’ve run SOCs. We know the problems. And we’ve got the
      solutions.
    * Our Approach We solve problems differently to get CISOs the consistent
      outcomes they need.
   
    * Customer Stories We are committed to helping our customers strengthen
      their security operations.
    * Integration Partners Get operational integrations for unified visibility,
      detection and response.
   
    * Choose Your Plan ReliaQuest plans created to meet you where you are and
      focused on the security outcomes you require.
    * Get a Quote Our experts will get in touch with you to review a customized
      plan based on your business’s unique challenges, needs, and interests.

 * Platform Capabilities
    * Reduce Complexity What happens when you get operational integrations
      instead of app stores and plug ins? Truly unified visibility.
    * Detection, Investigation Response What if you didn’t have to deal with
      duplicates and false positives? Find out, with ReliaQuest GreyMatter.
   
    * Force Multiply Security Teams When the mundane and repetitive are managed,
      you can focus your team where their expertise matters.
    * Continuous Measurement Consistent, business-relevant metrics to drive ROI,
      alignment and accelerate your goals.
   
    * GreyMatter Features ReliaQuest GreyMatter is a comprehensive platform
      giving you visibility to detect, investigate and respond faster.
    * Request a Demo Our security experts will customize a demo based on your
      use cases and technologies.

 * Solutions
    * MDR Security Tailored to Your Needs Don’t limit your security program with
      a traditional approach to MDR. Take a strategic approach with ReliaQuest.
    * Open XDR EDR, NDR, MDR, XDR, Open XDR…we don’t care what you call it. We
      care about making security possible.
    * Cloud Security You might have multiple clouds, tools and locations. But
      you only need one platform for unified visibility, detection and response.
   
    * Security Automation More of your mind, less of your time. Reduce noise by
      89%, speed MTTR and improve analyst quality of life.
    * Phishing Automate anti-phishing tasks, freeing up your teams for more
      critical tasks.
    * Security Operations We help you operationalize security. Any tech stack.
      Any size team.
   
    * Threat and Risk Management Stay on top of threats and manage risk with
      groundbreaking capabilities in GreyMatter.
    * Threat Hunting IOCs got you down? Track them down with threat hunting made
      easy in GreyMatter
    * Ransomware Ransomware detection is critical to stopping its spread within
      an environment.
    * Microsoft 365 E5 ReliaQuest GreyMatter provides you with a unified view of
      Microsoft 365 E5 and non-Microsoft security tools.

 * Company
    * About Us We bring our best attitude, energy and effort to everything we
      do, every day.
    * Careers Security is a team sport. Join our world-class team.
      * Avoid and Report Scams
   
    * Events Join us virtual or in-person for engaging conversations from our
      industry experts
    * In the News Press releases and trending articles to stay in the know.
      * Media Coverage
      * Press Releases
   
    * Contact Us How can we help you?

 * Insights
    * Blog From the trendy to the fun to tactical how-tos. Our blog is sure to
      have something for you.
    * Resources Learn more about security operations best practices, recent
      threat research or emerging trends like Open XDR.
      * Case Studies
      * Data Sheets
      * Ebooks
      * Guides
      * Infographics
      * Podcasts
      * Research Reports
      * Solution Briefs
      * Threat Advisories
      * Webinars
      * White Papers
      * Videos
   
   
    * LATEST BLOG POST
   
    * Security OperationsJuly 1, 2022
      
      
      MAXIMIZE YOUR SECURITY STACK WITH OPEN XDR
   
    * SOC Talk: Conversations from the Trenches In each of these interactive
      discussions, you’ll hear cybersecurity experts and members of
      the ReliaQuest Security Operations team discuss challenges, trending
      security topics and share solutions for achieving best in class security
      operations.
   
   
    * FEATURED RESOURCES
   
    * Case Studies
      
      Boston Celtics Case Study
   
    * White Papers
      
      The CISO’s Guide to Security Metrics That Matter
   
    * Webinars
      
      SOC Talk: Conversations from the Trenches

 * 
 * Request Demo

Search

--------------------------------------------------------------------------------

SHARE ARTICLE



--------------------------------------------------------------------------------

SIGN UP FOR OUR MONTHLY NEWSLETTER

*
Email





Submit

You are signed up.
Thank you for your submission.


BLOG


CYBERSECURITY BAD PRACTICES: EXPANDING ON THE CISA LIST

In cybersecurity, we all tend to focus on those covetable “best practices.” But
what’s on the other side? The U.S. Cybersecurity and Infrastructure Security
Agency (CISA) got the ball rolling by publishing some cybersecurity “bad
practices,” especially those that relate to protecting critical infrastructure
or national critical functions. Provided below are the three practices listed by
CISA as of October 5, 2021, plus our take.

 * Use of unsupported (also known as “end-of-life”) software: The risk inherent
   in this practice is that unsupported software no longer receives updates, at
   least not on a regular basis. Without a consistent update mechanism, users
   will have no means of patching a growing list of software vulnerabilities
   uncovered by researchers or exploited by attackers. They’ll therefore be in a
   position where they’re exposed to multiple known attack vectors that might
   not ever receive a fix.
 * Use of known or default passwords and credentials: Most devices ship out with
   default passwords, but users don’t always change those credentials once
   they’ve deployed them on their networks. That’s an issue, as many devices’
   default passwords are published online either in publicly available
   documentation or on dark web marketplaces. Attackers can use those resources
   to compromise a device for the purpose of stealing a user’s data, gaining
   access to the user’s network, or performing other malicious activity.
 * Use of single-factor authentication: Data breaches of users’ account
   credentials are a common occurrence these days. Such events make plenty of
   credentials available to attackers, empowering them to launch credential
   stuffing attack campaigns. In the absence of an additional factor of
   authentication, those malicious actors can successfully authenticate
   themselves on one or more of a victim’s accounts and abuse that access to
   conduct identity theft or credit card fraud.

CISA stated that it will continue to add entries into its catalog of bad
practices over time.

Looking to a best-in-class SOC? Check out our ebook >


EXPANDING ON CISA’S CYBERSECURITY BAD PRACTICES LIST

Despite CISA’s assurance, we still thought the list looked a little short as it
currently stands. So, we caught up with Joe Partlow, CTO of ReliaQuest, to get
his take on what we see among our customer base and in the industry as “worst
practices.” We also asked him about the impact those “worst practices” can have
on organizations who follow them as well as how organizations can optimize their
security operations so that they can avoid them.

Our conversation with Joe is replicated below.

Joe Partlow, ReliaQuest CTO


WHAT IS OUR TAKE ON THE CISA LIST?

Unfortunately, most of the time, these critical infrastructure organizations are
at the mercy of their vendors to support newer security controls like
multifactor authentication. The lack of budget, maintenance windows, or other
resources to upgrade these legacy systems is a factor in using old
software/hardware or rotating passwords.


WHY DO YOU THINK CISA FOCUSED IN ON THESE BAD PRACTICES IN PARTICULAR?

This list of bad practices encapsulates some of the most common ones we see in
environments such as these due to the above reasons. They are also some of the
most effective controls against malware or ransomware spreading in an
environment.


WHAT WOULD WE ADD?

Some of the other effective controls I would add are advanced endpoint
detection, ensuring offline backups are kept up to date, and effective
monitoring and alerting of potentially malicious events or misconfigurations.
All these controls also have challenges getting implemented in critical
infrastructure environments, however.


WHAT KINDS OF BAD PRACTICES DO WE SEE IN OUR CUSTOMER BASE (OR THE INDUSTRY)
HERE AT RELIAQUEST?

Most of the bad practices we see are related to over-privileged users or
accounts as well as incomplete monitoring or alerting on events. Poor patching,
asset control, vulnerability management, or backup strategies are also a common
contributor.


WHAT KINDS OF RISKS ARE ASSOCIATED WITH THESE BAD PRACTICES?

All these bad practices could lead to increased downtime, loss of sensitive data
or intellectual property, or in the case of critical infrastructure loss of
life-saving support services and utilities.


WHAT’S BEHIND THESE BAD PRACTICES? WHY ARE THEY THE PROBLEM THAT THEY ARE?

Most of the reasons for these bad practices are a lack of budget or available
time to upgrade the systems or make them redundant. There’s also the reality
that some vendors are not always supporting the necessary modern security
controls in their devices or applications (mostly due to cost and/or
recertification time).


WHAT SECURITY CONTROLS CAN ORGANIZATIONS USE TO ADDRESS THOSE BAD PRACTICES?

Best practice items that can help reduce risks such as ransomware spread
include:

 * * Enabling advanced logging for all systems (including cloud assets)
   * Creating a watchlist for high-value accounts and hosts
   * Removing administrative access for accounts that don’t need it
   * Enabling MFA and strong passwords on all accounts

 * Enabling and testing offsite backups
 * Verifying with legal & leadership necessary cyber insurance policy coverage
 * Implementing effective network segmentation
 * Installing advanced endpoint protection on all hosts


WHAT CHALLENGES MIGHT THEY FACE ALONG THE WAY?

Budget to add redundant systems or pay for necessary upgrades is one of the most
common reasons along with the inability to take systems down for the necessary
maintenance to be performed. Also, executive buy-in is important to prioritize
implementing secure devices and applications throughout the organization


HOW DOES RELIAQUEST GREYMATTER HELP COMPANIES OVERCOME THOSE CHALLENGES AND
IMPLEMENT THOSE CONTROLS?

GreyMatter helps overcome these challenges by providing a holistic platform to
not only provide incident response and detection for any potential incidents but
also to proactively threat hunt and automate any remediation actions.

Learn more about how GreyMatter can help you avoid cybersecurity’s worst
practices ➞



--------------------------------------------------------------------------------

BY ABBY THURMAN

Abby brings 5 years’ experience in the tech and SaaS industry to her role as
content marketing strategist for ReliaQuest. Based in Salt Lake City, she
graduated with a degree in English from the University of Utah, and when she’s
not working, she’s usually reading, cooking, or hanging out with her husband and
pets.


RELATED ARTICLES


HOW TO ACHIEVE BEST-IN-CLASS SECURITY OPERATIONS

by Ashok Sankar Read More


OVERCOMING FIVE KEY CHALLENGES IN THE WAY OF EFFECTIVE SECURITY OPERATIONS

by Ashok Sankar Read More


THE CIS CONTROLS – AN OVERVIEW OF WHAT THEY ARE AND WHAT’S NEW IN VERSION 8

by Ken Westin Read More

© 2022 ReliaQuest, LLC All Rights Reserved


GET IN TOUCH

 * Share on LinkedIn
 * Follow us on Twitter
 * Follow us on Facebook
 * Follow us on Youtube

info@reliaquest.com

(800) 925-2159

777 South Harbour Island Blvd,
Suite 500
Tampa, FL 33602

 * Why ReliaQuest?
 * Open XDR
 * Our Approach
 * Why ReliaQuest
 * Customer Stories
 * Integration Partners
 * Choose Your Plan
 * Get a Quote

 * Platform Capabilities
 * Reduce Complexity
 * Detection Investigation Response
 * Force Multiply Security Teams
 * Continuous Measurement
 * MDR Security Tailored to Your Needs
 * Features
 * Request Demo

 * Company
 * About Us
 * Careers
 * Events
 * Contact Us
 * Media Coverage
 * Press Releases
 * Privacy Policy

 * Insights
 * Blog
 * Resources
 * Webinars
 * Case Studies

A video is being shown


Close modal window
This site uses cookies to provide you with a more responsive and personalized
service. By using this site, you agree to the storing of cookies on your device
to enhance your site navigation, analyze site usage and enhance our marketing
efforts. For more info, please see our cookie policy located in our privacy
policy.OkPrivacy policy








Close


suggested results





Search this site