5 Easy Cybersecurity Steps to Radically Reduce Your Risk NOW

Written by

Geoff Halstead

Published on

Reading time

9 min.

For most small to mid-sized business owners, just keeping business and operations running is the primary concern. When one looks at all of the potential threats, and all of the steps that are required to implement a complete and rigorous cybersecurity defense, it can be very hard to know where to start.

Here is a simple guideline for the 5 easy first steps you can take to reduce the most critical vulnerabilities that are most likely to directly threaten your business production line and operations.

1. Know Your Attack Surface: See What an Attacker Can See

You have probably done a lot to secure your facilities. However, without visibility into your assets that are
accessible across the Internet, you may not fully understand your potential for being attacked. While many people use search engines to find cat pictures, cyber attackers commonly use similar tools to locate Internet-connected IoT devices. In fact, once a device is identified, hacking is not even required in many cases – for example, if default and maintenance passwords are in-use, the attacker’s job is easy as they just flip a switch to exploit.

Attack Surface Assessments and Vulnerability Scanning can show you the internet-connected software, devices and systems that are open to be exploited right now. Easy options to gain this crucial knowledge are available.

Get your Stuff Off Search (S.O.S.)

The Cybersecurity & Infrastructure Security Agency (CISA) has many great free tools and services, particularly in this area.

  • S.O.S. – Get your Stuff Off Search. Gives you both How-to instructions and links to tools like Shodan, Censys and Thingful that enable you to see what is visible to anyone on web-based search platforms.

Faction Attack Surface Threat and Vulnerability Assessments

If you don’t have the staff or time to do this yourself, Faction has partnered with the Mobile Intelligence Alliance, a US 501(c)(3) non-profit organization focused on reducing cyber threats to Internet users, to provide independent services in this area. We use the same tools together with expertise, additional technologies and databases developed over decades for a flat fee of $500.00. You can get started on that right now here:

2. Prioritize What Is Critical and Get It Off the Internet

OK, so now you can see what attackers can see. If you are like most companies, it is probably a pretty eye-opening and frightening revelation! But the good news is that not all software, systems and devices are equal. Some are critical to your operations, production and safety of your customers and users and some are not. So, just ask yourself this simple question:

  • What software, devices and systems will shut down my business if they are ransomwared or sabotaged?

That’s clearly what you want to focus on first! For this, getting your ‘Stuff Off Search’ is good, but not enough. If it is still connected to the Internet – or connected to another device that is – it can still be attacked. Often, this will happened through back doors and devices you never thought of (see below) that then are the gateway to other parts of your network and software applications. But at the same time, these systems of software, PCs and devices need to be connected to each other and often to Cloud servers that run them. So, what can you do about that?

Implement a Faction Virtual Private Circuit

With a Faction Virtual Private Circuit you can take all these OFF the Internet and into your private Faction Network where only the users and devices that you personally invite and authorize can see or access it. This can include:

  • computers – whether they are workstations, PC, laptops, smartphones;
  • smart, dumb and legacy devices and smart machines – the ones you can’t protect otherwise; and
  • cloud servers they need to connect to.

They can all connect and talk to each other, but NOBODY outside of your organization can see of connect to them.

3. Fix known security flaws in your software

OK, so the first two steps will help you to secure the stuff that would threaten to kill your business if attacked. But these next 3 are also important to address the threats to the broader circle of operations of your business.

Always keep in mind that any computing device (PC, laptop, smartphone, etc.) that you add into your Virtual Private Circuit can then be an inside point of attack if it is compromised. Our recommendation is simply do not allow those devices to connect to anything outside. The cost of a few extra PCs and laptops pales in comparison to the cost of a catastrophic attack, and truly shielding your vital systems will reduce your cyber insurance costs.

That said, good ‘cyber hygiene’ is a basic part of maintaining the health of your business. CISA maintains a tremendously useful resource for this:

where you can check for alerts about known and active exploits of software that may be in use right now by your organization. Who else reads these? Attackers! And where they go next – to scanners to zero in on exactly who to attack. Do you get the. picture? if listed, you need to update the software to the latest version according to the vendor’s instructions immediately.

But most people and smaller organizations don’t have time for that – and IT staff or services to do this are expensive. That’s why we put together this handy tool:

We are also working on an AI Bot that will enable you to quickly build a profile of the software and devices you are using, and get an instant read-outs of any current known vulnerabilities. We will also offer the option to subscribe to alerts that will be combined with a private monitoring tool to keep your attack surface at ZERO.

What About When You CAN’T Fix Them?

There are many different situations were this is the case, but two of the most common are:

  • legacy computers, smart machines and devices that have are too old to upgrade to newer OSs but vital to your operations or production line; or
  • a new exploit in the KEV catalogue that has no current “mitigation” (i.e. there is not a fix yet).

That’s where Faction Pods come in. You simply connect the devices to a Pod – which is a normal WiFi router – and they are now in your Faction Virtual Private Circuit.

4. Implement multifactor authentication (MFA) – or Beyond

Your password isn’t protecting you the way you think it is. It is often trivial for computers to guess passwords, and phishing is the direct cause of most breaches of SMMs. Even if your organization consistently enforces complex passwords – or use of password managers – unfortunately malicious cyber actors still have ways to get past your password. And once they’re in your accounts and networks, the impacts on your business can be catastrophic.

Multifactor authentication (MFA) can make you much more secure. This is a layered approach to securing your online accounts, requiring you provide a combination of two or more authenticators to verify your identity.   Taking the extra step beyond just a password can protect your business, bank accounts, data and critical equipment and production lines from hackers. There are many different options and tools – usually readily available and just need to be turned on.

But Don’t Trust Your Critical Devices to MFA

However, we recommend that when it comes to your most critical equipment and networks – the ones that will stop your business cold if they are ransomwared or sabotaged – even MFA can be defeated fairly easily if you are targeted. Why? Because they are cloud-based, and everything in the Cloud can be compromised.

That’s why Faction Virtual Private Circuits use no credentials or external authentication servers whatsoever. You generate your private network with encryption keys created on your own endpoint devices (PC, Laptop, Smartphone, etc.) and share those keys directly to the devices you want to protect. Once added to the network, they are invisible and inaccessible to the Internet.

5. Halt These Other Bad Practices

The list of bad practices – or let’s be honest, stupid things – that people do with software and equipment that is connected to the Internet is a long one! We are compiling a list and primer to help, but if you focus on these first – which tend to be overlooked or not even understood as threats – you will go a long way to reducing your risk of a catastrophic attack. And again, if you don’t have the money or resources to address the right now, you can get all of these device OFF the Internet and into a Faction Virtual Private Circuit with Faction Pods in literally minutes.

  1. Unsupported (or end-of-life) software
    • Old PCs, servers, smart machines which are no longer supported – and thus have no fixes or upgrades for critical vulnerabilities – are more than just a drag on your productivity. They can be the direct open door for attackers.
  2. Unsecured Security Cameras
  3. Unsecured Home and Office WiFi Routers
  4. Unsecured Printers
    • So, your wonderful smart printer connects to the Internet so it can order new ink and paper for you. Guess what, anybody on the Internet with the right tools can find and connect to it!
  5. Unsecured UPS (Uninterruptible Power Supply)

You Have The Power to Do This. We Can Help.

There is always more that can be done, but each one of these steps will have a major and direct impact on radically reducing your attack surface – and thus catastrophic risks to your business. If you implement a Faction Virtual Private Circuit in the recommended way, then you can eliminate all Internet-based threats to your most critical stuff. None of this requires a lot of IT support, or much money, and all can be implemented in a matter of weeks.

Faction Networks can work with you directly or work with your MSP to help get this done. Hopefully, some steps – and others – are already underway. But whatever your status and resource level, we can help you to secure the most critical stuff that makes your business go.

Related Blogs

WiFi

Alert: Two major flaws expose WiFi networks to attack, affects billions of users

Reading Time: 5 min.

Summary Two major flaws in open-source software could enable bad actors to break into password-protected home and enterprise WiFi networks. The…

Read more

The Internet Cannot be Defended from the PRC

Reading Time: 4 min.

The NSA release this week a comprehensive report with explicit details of the extent of the activity and ‘Tradecraft” of…

Read more
Keep It Simple

KISS: Keep It Simple Security

Reading Time: 7 min.

Faction Networks changes the paradigm and enables K.I.S.S. by going back to the foundation of actually securing networking, and then…

Read more
Linux XYZ Utils Back Door

The System is Blinking Red

Reading Time: 6 min.

The “Good Enough” strategy in Cyber Security is not going to cut it any more. The time frame here is…

Read more

How Could This Happen?! A Deep Dive into the Change Healthcare Attack

Reading Time: 11 min.

It’s not an aberration – it WILL happen again As many of you have no doubt heard or read about,…

Read more
Food Manufacturing

Not Just ‘Factories’ – 40% of Food & Beverage Manufacturers Impacted by Ransomware Attack

Reading Time: 1 min.

JSB Foods ransomware incident just a prominent example According to Claroty, more than 40% of food and beverage-sector respondents had…

Read more
Hacking data

Why a 2nd Class Air National Guardsman Could Read the Pentagon’s Briefings on Ukraine’s War Plan

Reading Time: 3 min.

Most people by now have heard of Jack Teixeira, or if not at least the infamous story of how a…

Read more
Smart UPS Devices

Uninterruptible Power Supply (UPS) Devices In the Bullseye for Hackers

Reading Time: 2 min.

Weak Protocols and Built-in Back Doors Make These Inviting Targets The Cybersecurity and Infrastructure Security Agency (CISA) and the Department…

Read more

Nobody Would Have Agreed to This

Reading Time: 9 min.

Even George Orwell Could Not Have Imagined the World We Live in Today Let’s Start with a Thought Experiment If…

Read more

5 Easy Cybersecurity Steps to Radically Reduce Your Risk NOW

Reading Time: 9 min.

For most small to mid-sized business owners, just keeping business and operations running is the primary concern. When one looks…

Read more

Warning: Undefined array key 0 in /var/www/factionnetworks/wp-content/themes/bricks/includes/elements/code.php(216) : eval()'d code on line 19

Warning: Attempt to read property "cat_ID" on null in /var/www/factionnetworks/wp-content/themes/bricks/includes/elements/code.php(216) : eval()'d code on line 19

Warning: Undefined array key 0 in /var/www/factionnetworks/wp-content/themes/bricks/includes/elements/code.php(216) : eval()'d code on line 20

Warning: Attempt to read property "cat_name" on null in /var/www/factionnetworks/wp-content/themes/bricks/includes/elements/code.php(216) : eval()'d code on line 20

5 Easy Cybersecurity Steps to Radically Reduce Your Risk NOW

For most small to mid-sized business owners, just keeping business and operations running is the primary concern. When one looks at all of the potential threats, and all of the steps that are required to implement a complete and rigorous cybersecurity defense, it can be very hard to know where…

Reading Time: 9 min.

For most small to mid-sized business owners, just keeping business and operations running is the primary concern. When one looks at all of the potential threats, and all of the steps that are required to implement a complete and rigorous cybersecurity defense, it can be very hard to know where to start.

Here is a simple guideline for the 5 easy first steps you can take to reduce the most critical vulnerabilities that are most likely to directly threaten your business production line and operations.

1. Know Your Attack Surface: See What an Attacker Can See

You have probably done a lot to secure your facilities. However, without visibility into your assets that are
accessible across the Internet, you may not fully understand your potential for being attacked. While many people use search engines to find cat pictures, cyber attackers commonly use similar tools to locate Internet-connected IoT devices. In fact, once a device is identified, hacking is not even required in many cases – for example, if default and maintenance passwords are in-use, the attacker’s job is easy as they just flip a switch to exploit.

Attack Surface Assessments and Vulnerability Scanning can show you the internet-connected software, devices and systems that are open to be exploited right now. Easy options to gain this crucial knowledge are available.

Get your Stuff Off Search (S.O.S.)

The Cybersecurity & Infrastructure Security Agency (CISA) has many great free tools and services, particularly in this area.

  • S.O.S. – Get your Stuff Off Search. Gives you both How-to instructions and links to tools like Shodan, Censys and Thingful that enable you to see what is visible to anyone on web-based search platforms.

Faction Attack Surface Threat and Vulnerability Assessments

If you don’t have the staff or time to do this yourself, Faction has partnered with the Mobile Intelligence Alliance, a US 501(c)(3) non-profit organization focused on reducing cyber threats to Internet users, to provide independent services in this area. We use the same tools together with expertise, additional technologies and databases developed over decades for a flat fee of $500.00. You can get started on that right now here:

2. Prioritize What Is Critical and Get It Off the Internet

OK, so now you can see what attackers can see. If you are like most companies, it is probably a pretty eye-opening and frightening revelation! But the good news is that not all software, systems and devices are equal. Some are critical to your operations, production and safety of your customers and users and some are not. So, just ask yourself this simple question:

  • What software, devices and systems will shut down my business if they are ransomwared or sabotaged?

That’s clearly what you want to focus on first! For this, getting your ‘Stuff Off Search’ is good, but not enough. If it is still connected to the Internet – or connected to another device that is – it can still be attacked. Often, this will happened through back doors and devices you never thought of (see below) that then are the gateway to other parts of your network and software applications. But at the same time, these systems of software, PCs and devices need to be connected to each other and often to Cloud servers that run them. So, what can you do about that?

Implement a Faction Virtual Private Circuit

With a Faction Virtual Private Circuit you can take all these OFF the Internet and into your private Faction Network where only the users and devices that you personally invite and authorize can see or access it. This can include:

  • computers – whether they are workstations, PC, laptops, smartphones;
  • smart, dumb and legacy devices and smart machines – the ones you can’t protect otherwise; and
  • cloud servers they need to connect to.

They can all connect and talk to each other, but NOBODY outside of your organization can see of connect to them.

3. Fix known security flaws in your software

OK, so the first two steps will help you to secure the stuff that would threaten to kill your business if attacked. But these next 3 are also important to address the threats to the broader circle of operations of your business.

Always keep in mind that any computing device (PC, laptop, smartphone, etc.) that you add into your Virtual Private Circuit can then be an inside point of attack if it is compromised. Our recommendation is simply do not allow those devices to connect to anything outside. The cost of a few extra PCs and laptops pales in comparison to the cost of a catastrophic attack, and truly shielding your vital systems will reduce your cyber insurance costs.

That said, good ‘cyber hygiene’ is a basic part of maintaining the health of your business. CISA maintains a tremendously useful resource for this:

where you can check for alerts about known and active exploits of software that may be in use right now by your organization. Who else reads these? Attackers! And where they go next – to scanners to zero in on exactly who to attack. Do you get the. picture? if listed, you need to update the software to the latest version according to the vendor’s instructions immediately.

But most people and smaller organizations don’t have time for that – and IT staff or services to do this are expensive. That’s why we put together this handy tool:

We are also working on an AI Bot that will enable you to quickly build a profile of the software and devices you are using, and get an instant read-outs of any current known vulnerabilities. We will also offer the option to subscribe to alerts that will be combined with a private monitoring tool to keep your attack surface at ZERO.

What About When You CAN’T Fix Them?

There are many different situations were this is the case, but two of the most common are:

  • legacy computers, smart machines and devices that have are too old to upgrade to newer OSs but vital to your operations or production line; or
  • a new exploit in the KEV catalogue that has no current “mitigation” (i.e. there is not a fix yet).

That’s where Faction Pods come in. You simply connect the devices to a Pod – which is a normal WiFi router – and they are now in your Faction Virtual Private Circuit.

4. Implement multifactor authentication (MFA) – or Beyond

Your password isn’t protecting you the way you think it is. It is often trivial for computers to guess passwords, and phishing is the direct cause of most breaches of SMMs. Even if your organization consistently enforces complex passwords – or use of password managers – unfortunately malicious cyber actors still have ways to get past your password. And once they’re in your accounts and networks, the impacts on your business can be catastrophic.

Multifactor authentication (MFA) can make you much more secure. This is a layered approach to securing your online accounts, requiring you provide a combination of two or more authenticators to verify your identity.   Taking the extra step beyond just a password can protect your business, bank accounts, data and critical equipment and production lines from hackers. There are many different options and tools – usually readily available and just need to be turned on.

But Don’t Trust Your Critical Devices to MFA

However, we recommend that when it comes to your most critical equipment and networks – the ones that will stop your business cold if they are ransomwared or sabotaged – even MFA can be defeated fairly easily if you are targeted. Why? Because they are cloud-based, and everything in the Cloud can be compromised.

That’s why Faction Virtual Private Circuits use no credentials or external authentication servers whatsoever. You generate your private network with encryption keys created on your own endpoint devices (PC, Laptop, Smartphone, etc.) and share those keys directly to the devices you want to protect. Once added to the network, they are invisible and inaccessible to the Internet.

5. Halt These Other Bad Practices

The list of bad practices – or let’s be honest, stupid things – that people do with software and equipment that is connected to the Internet is a long one! We are compiling a list and primer to help, but if you focus on these first – which tend to be overlooked or not even understood as threats – you will go a long way to reducing your risk of a catastrophic attack. And again, if you don’t have the money or resources to address the right now, you can get all of these device OFF the Internet and into a Faction Virtual Private Circuit with Faction Pods in literally minutes.

  1. Unsupported (or end-of-life) software
    • Old PCs, servers, smart machines which are no longer supported – and thus have no fixes or upgrades for critical vulnerabilities – are more than just a drag on your productivity. They can be the direct open door for attackers.
  2. Unsecured Security Cameras
  3. Unsecured Home and Office WiFi Routers
  4. Unsecured Printers
    • So, your wonderful smart printer connects to the Internet so it can order new ink and paper for you. Guess what, anybody on the Internet with the right tools can find and connect to it!
  5. Unsecured UPS (Uninterruptible Power Supply)

You Have The Power to Do This. We Can Help.

There is always more that can be done, but each one of these steps will have a major and direct impact on radically reducing your attack surface – and thus catastrophic risks to your business. If you implement a Faction Virtual Private Circuit in the recommended way, then you can eliminate all Internet-based threats to your most critical stuff. None of this requires a lot of IT support, or much money, and all can be implemented in a matter of weeks.

Faction Networks can work with you directly or work with your MSP to help get this done. Hopefully, some steps – and others – are already underway. But whatever your status and resource level, we can help you to secure the most critical stuff that makes your business go.

If you liked this post, Share it on: