Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

10 steps to reduce cyber risk

By Maria Henriquez
defense-freepik1170x658.jpg

Image via Freepik

February 18, 2022

Russian-state-sponsored cyber actors have targeted U.S. cleared defense contractors (CDCs) to obtain sensitive information, according to an advisory released by the Federal Bureau of Investigation (FBI), Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA), and National Security Agency (NSA). 


In the advisory, the federal agencies detail the industries and information Russian actors have targeted, common adversary tactics, detection and incident response actions, and mitigation recommendations.


The actors have targeted both large and small CDCs and subcontractors with varying levels of cybersecurity protocols and resources. These CDCs support contracts for the U.S. Department of Defense (DoD) and Intelligence Community in several areas, including: command, control, communications, and combat systems; Intelligence, surveillance, reconnaissance, and targeting; weapons and missile development; vehicle and aircraft design; and software development, data analytics, computers, and logistics.


Russian state-sponsored cyber actors have used common but effective tactics to access target networks, including spearphishing, credential harvesting, brute force/password spray techniques, and known vulnerability exploitation against accounts and networks with weak security.


Threat actors take advantage of simple passwords, unpatched systems and unsuspecting employees to gain initial access before moving laterally through the network to establish persistence and exfiltrate data.


To reduce risk and protect critical assets, CDCs can follow 10 best practices:


1. Implement Credential Hardening


A. Enable Multifactor Authentication 

  • Enable multifactor authentication (MFA) for all users, without exception.


B. Enforce Strong, Unique Passwords 

  • Require accounts to have strong, unique passwords. 
  • Enable password management functions, such as Local Administrator Password Solution (LAPS), for local administrative accounts.


C. Introduce Account Lockout and Time-Based Access Features

  • Implement time-out and lock-out features in response to repeated failed login attempts.
  •  Configure time-based access for accounts set at the admin level and higher. 


D. Reduce Credential Exposure

  • Use virtualization solutions on modern hardware and software to ensure credentials are securely stored, and protect credentials via capabilities.


2. Establish Centralized Log Management

  • Create a centralized log management system. 
  • If using M365, enable Unified Audit Log (UAL). 
  • Correlate logs, including M365 logs, from network and host security devices.


In addition to setting up centralized logging, organizations should:

  • Ensure PowerShell logging is turned on.
  • Update PowerShell instances to version 5.0 or later and uninstall all earlier versions of PowerShell. 
  • Confirm PowerShell 5.0 instances have module, script block and transcription logging enabled.
  • Monitor remote access/Remote Desktop Protocol (RDP) logs and disable unused remote access/RDP ports.


3. Initiate a Software and Patch Management Program

  • Consider using a centralized patch management system. Failure to deploy software patches promptly makes an organization a target of opportunity, increasing its risk of compromise. 

o Subscribe to CISA cybersecurity notifications and advisories to keep up with known exploited vulnerabilities, security updates, and threats.

  • Sign up for CISA’s cyber hygiene services, including vulnerability scanning, to help reduce exposure to threats.


4. Employ Antivirus Programs

  • Ensure that antivirus applications are installed on all organizations’ computers and are configured to prevent spyware, adware, and malware as part of the operating system security baseline.
  • Keep virus definitions up to date.
  • Regularly monitor antivirus scans.


5. Use Endpoint Detection and Response Tools

  • These tools allow a high degree of visibility into the security status of endpoints and can be an effective defense against threat actors.


6. Maintain Rigorous Configuration Management Programs

  • Audit configuration management programs to ensure they can track and mitigate emerging threats. Review system configurations for misconfigurations and security weaknesses. Having a robust configuration program hinders sophisticated threat operations by limiting the effectiveness of opportunistic attacks.


7. Enforce the Principle of Least Privilege

  • Administrator accounts should have the minimum permissions they need to do their tasks. This can reduce the impact if an administrator account is compromised.
  • For M365, assign administrator roles to role-based access control (RBAC) to implement the principle of least privilege. 
  • Remove privileges not expressly required by an account’s function or role.
  • Ensure there are unique and distinct administrative accounts for each set of administrative tasks.
  • Create non-privileged accounts for privileged users, and ensure they use the non-privileged accounts for all non-privileged access (e.g., web browsing, email access).
  • Reduce the number of domain and enterprise administrator accounts, and remove all unnecessary accounts.
  • Regularly audit administrative user accounts.
  • Regularly audit logs to ensure new accounts are legitimate users.
  • Institute a group policy that disables remote interactive logins and uses the Domain Protected Users Group. To assist with identifying suspicious behavior with administrative accounts:
  • Create privileged role tracking.
  • Create a change control process for all privilege escalations and role changes on user accounts.
  • Enable alerts on privilege escalations and role changes.
  • Log privileged user changes in the network environment and alert for unusual events.


8. Review Trust Relationships

  • Review existing trust relationships with IT service providers, such as managed service providers (MSPs) and cloud service providers (CSPs). Threat actors are known to exploit trust relationships between providers and their customers to gain access to customer networks and data.
  • Remove unnecessary trust relationships.
  • Review contractual relationships with all service providers, and ensure contracts include:

o Security controls the customer deems appropriate.

o Appropriate monitoring and logging of provider-managed customer systems.

o Appropriate monitoring of the service provider’s presence, activities, and connections to the customer network.

o Notification of confirmed or suspected security events and incidents occurring on the provider’s infrastructure and administrative networks


9. Encourage Remote Work Environment Best Practices

  • Regularly update VPNs, network infrastructure devices, and devices used for remote work environments with the latest software patches and security configurations. 
  • When possible, require MFA on all VPN connections. 
  • Monitor network traffic for unapproved and unexpected protocols.
  • Reduce potential attack surfaces by discontinuing unused VPN servers that adversaries may use as a point of entry.


Note: For additional information, see joint NSA-CISA Cybersecurity Information Sheet: Selecting and Hardening Remote Access VPN Solutions


10. Establish User Awareness Best Practices

  • Provide end user awareness and training. To help prevent targeted social engineering and spearphishing scams, ensure that employees and stakeholders are aware of potential cyber threats and how they are delivered. Also, provide users with training on information security principles and techniques.
  • Inform employees of the risks of social engineering attacks, e.g., risks associated with posting detailed career information to social or professional networking sites.
  • Ensure that employees know what to do and whom to contact when they see suspicious activity or suspect a cyber intrusion to help quickly and efficiently identify threats and employ mitigation strategies.


Bonus: Apply Additional Best Practice Mitigations

  • Deny atypical inbound activity from known anonymization services, including commercial VPN services and The Onion Router (TOR).
  • Impose listing policies for applications and remote access that only allow systems to execute known and permitted programs under an established security policy.
  • Identify and create offline backups for critical assets.
  • Implement network segmentation.
  • Review CISA Alert AA20-120A: Microsoft Office 365 Security Recommendations for additional recommendations on hardening the M365 cloud environment.


Read more on how to adopt a high posture when it comes to cybersecurity and protecting the most critical assets here.

KEYWORDS: cyber security defense security information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Global News

    6 strategies to reduce workplace violence risk

    See More
  • Employee holding phone

    10 ways to reduce workplace cybersecurity risk

    See More
  • Cyber risk c-suite

    Six ways to reduce cyber risk in the C-suite

    See More

Related Products

See More Products
  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing