Cybersecurity and Information Assurance

ODS has been and continues to be an industry leader in information assurance, information protection, and cybersecurity services since 2001.

With almost twenty years of experience in information assurance across both digital and paper protocols, coupled with a focus on cybersecurity and protection of digital data, ODS brings the critically important legacy mindset historically associated with information assurance and marries it to the more recent discipline of cybersecurity. This provides industry best practices across two oft misunderstood disciplines, ensuring that both standards are met or exceeded, thereby assuring the integrity of information systems across all mediums.

With these standards in mind, there are seven metrics of cybersecurity you should be aware of, and ideally actively monitoring in your organization.

If any of these sound like something your organization might not be keeping up with, you may want to contact ODS for a no-risk consultation, where we’ll evaluate your systems and make recommendations based on our experience and the level of risk your organization is exposed to. Contact us for additional details.

Mean Time To Identify (MTTI) and Mean Time To Contain (MTTC)

These are known as the detect and respond phases, and the average in 2017 was about 52 days to detect and 208 days to contain. This is a huge cause of a breach and results in a massive cost outlay for any company impacted by a breach. In almost every case of a breach, involving an outside organization like ODS could have prevented the initial breach.

Systems with known vulnerabilities

This is another huge issue with most organizations. Across the board, systems with vulnerabilities represent a key metric for determining the level of risk your organization is shouldering in terms of cybersecurity risks. Proper implementation of a vulnerability assessment program is a necessity.

Incorrect configuration of SSL certificates

Improperly configured SSL certificates inside of an organization can allow malicious third parties to compromise transactions end users believe to be genuine. As the number of incorrectly configured certificates increases, so does the risk of them being abused to steal user details.

External data transfers

While it’s a given that certain types of network traffic are by default blocked, there are still numerous instances where members of organizations have relatively unrestricted access to the internet. In these cases, downloads of videos, software, applications, and even movies can present risks from malware and botnets. This is especially true when users are accessing dangerous websites.

Super Users and Administrators

In many organizations, particularly smaller organizations, ‘superuser’ or administrator levels of access tend to be readily granted, even to users who lack a basic understanding of cybersecurity. Strictly controlling and limiting the number and type of Administrative level users can greatly reduce your organization’s level of exposure to risk.

Time to deactivate credentials of former employees

All too often an employee who has been terminated can have his or her login credentials left unedited in the system. Over time the number of these users can increase to the point where a bad actor may be able to gain access to the network, wreaking havoc and causing damage. Make sure to quickly delete users who no longer need access.

Length of time ports are open

Open ports are a major cause of third-party data breaches, costing organizations millions of dollars every year. As a general rule, ports should be monitored depending on the type of port, for how long they are opened. This can help to identify unauthorized use and minimize the risk of a breach through unauthorized port access.