Building a home is best achieved when following a blueprint. The written security policy of the organization serves as the organization’s blueprint for compliance and governance. When IT develops policy in a vacuum, enforcing that policy will be challenging. You should facilitate policy discussions amongst the various stakeholders. Using a template such as that defined by NIST (below) will improve the process.
A common void in information security is a definition, driven by the business, of the data
within the organization and how it should be handled. Doing so is the foundation for
so many downstream decisions (i.e. who should have access, the retention rate, what
happens if the data is compromised), yet it’s very rare that an organization classifies its
data. Policies can be a great driver for getting the Data Classification process going.
The C-Suite will understand the need for security initiatives due to compliance regulations and news about breaches. But it’s rare when line workers share that sense of responsibility. It’s important to find the right blend of training and communications to get employees to understand their pivotal role. It can be a struggle to master the softer side of security: the human.
"Enabling really came in and spent time trying to understand what we had done well already and where the gaps were. They then walked through the process of how their managed service solution, PhishHunter, was going to be able to solve the problem for us."
John Michael Gross CIO at the Cascade Environmental
We enabled PhishHunter at exactly the right time. Otherwise, we were going to have a potential catastrophe on our hands.
Alex Kennedy Director of Infrastructure & Technical Services at Volusia County Schools
A common scenario we encounter is a customer that has invested in securing their on-premises data and devices. As they move to the cloud they come to us for security guidance. After partnering with us, Volusia County Schools is using Microsoft Cloud App Security and Advanced Threat Protection to mitigate attempted attacks. Assisted by Enabling Technologies, Volusia is seeing immediate results of the customized PhishHunter configurations.
Four teams were involved in each phishing incident, totaling ~7 hours of labor.
One person alerts the user and helps reset their password, totaling just 1 hour. “Overall, by solving the phishing issue, the IT team members involved have ~15% of their time back” said Alex Kennedy.
“It would take up to 24 hours to remediate.” In that time, the phish would be replicated around the organization.”
“Within 7 minutes of a compromise, the account is automatically disabled. No human could detect or respond that fast."