CYE Insights

Neglecting the Basics of Cybersecurity While Increasing Complexity

July 6, 2023

Neglecting the Basics of Cybersecurity While Increasing Complexity

In the ever-evolving landscape of cybersecurity, organizations are increasingly facing sophisticated threats from highly skilled attackers. However, amidst this complexity, it is surprising for me to observe that many organizations I work with are still neglecting the fundamental security elements that form the backbone of their defense. Instead of focusing on basic security practices such as changing default passwords, restricting external access, and enforcing strong password policies, organizations often divert their attention towards complex measures, hoping to catch elusive attackers.

This article dives into this critical oversight within cybersecurity and highlights the need for organizations to prioritize the basics in their security strategy.

The Complexity Trap

With the goal of securing their networks, organizations often find themselves overwhelmed by the intricacies of threat detection and response. They invest significant resources in deploying cutting-edge technologies and tools to identify advanced threats and analyze network anomalies. While these measures are important, they should not overshadow the fundamental security practices that lay the foundation for a robust defense posture.

Neglected Basics

One of the most glaring oversights is the failure to address basic security elements. Simple measures, such as changing default passwords on devices and systems remain unattended, leaving organizations vulnerable to opportunistic attackers. Attackers can exploit default settings to gain unauthorized access and compromise critical systems. By simply changing these default passwords to complex ones with strict policies that disallow common, easily crackable passwords, organizations can significantly enhance their security posture.

Another crucial oversight is the failure to restrict external access to interfaces and sensitive systems. Exposing interfaces to the internet without appropriate security controls is an open invitation to attackers. Implementing robust access controls, blocking external access for all interfaces which do not require it, and employing virtual private networks (VPNs) can help fortify the organization’s perimeter defense and prevent unauthorized access.

Additionally, organizations often neglect to emphasize the importance of password changes at regular intervals, along with ensuring a significant deviation from the previous passwords. This practice is crucial in preventing unauthorized access to accounts and reducing the impact of credential-based attacks. When employees retain the same passwords for extended periods, it becomes easier for attackers to exploit leaked credentials or use methods like brute-forcing to gain unauthorized entry. By implementing a policy that encourages regular password changes and requires substantial differences from previous passwords, organizations can enhance their overall security posture.

Furthermore, maintaining a comprehensive blacklist of commonly used passwords and disallowing the use of easily guessable information is essential. Employees often opt for weak passwords such as “password123” or use personal information like their names, birthdates, or the name of the organization. By proactively preventing the use of such predictable passwords and educating employees on the importance of choosing strong and unique passwords, organizations can significantly reduce the risk of successful credential-based attacks.

By combining regular password changes with effective password blacklisting and educating employees about password security, organizations can significantly enhance their overall cybersecurity defenses and reduce the risk of unauthorized access to their systems and sensitive data.

Prioritizing the Basics

While it is essential to invest in advanced cybersecurity solutions and threat intelligence, organizations must not overlook the significance of the basics. Effective security starts with a strong foundation, and organizations must ensure that their security posture addresses these fundamental elements.
By enforcing strong password policies with regular password changes and active backlists, disabling default credentials on interfaces, and blocking them from external access, organizations can eliminate low-hanging fruit for attackers.

Conclusion

In the relentless battle against cyber threats, it is crucial for organizations to strike a balance between complexity and simplicity. While sophisticated threats exist, neglecting basic security practices leaves organizations exposed to common and easily preventable breaches. By redirecting focus towards the fundamentals, organizations can establish a robust security posture that complements their advanced security measures.
Cybersecurity should be viewed as a holistic approach that incorporates both advanced threat detection and the implementation of basic security elements to create a resilient defense against evolving threats. It is time for organizations to recognize the importance of the basics and bridge the gap between complexity and simplicity in their security strategies.

Learn how CYE helped improve the cybersecurity maturity of an electronic manufacturing company with hands-on security management, expert mitigation, and awareness programming.

Tom Levy

By Tom Levy

Tom is a technical account manager and cybersecurity expert at CYE. He was one of the co-founders of the IDF’s top tier security operation centers and has consulted for various companies on security challenges. Tom is also the former elected youth delegate to the United Nations from Israel.