Engage a Professional Cyber Security Consultant for peace of mind that allows you to rest easy at night.
Cybersecurity best practices for companies in 2023 are essential to protect sensitive information, data, and assets from cyber threats. Here are some of the top best practices that businesses should consider:
- Implement multi-factor authentication (MFA) Multi-factor authentication is a security practice that requires users to provide two or more forms of identification before granting access to systems or applications. This helps to prevent unauthorized access to sensitive data and accounts, even if a hacker manages to steal or guess a password. MFA can involve something you know (password), something you have (a token), or something you are (biometric authentication). Implementing MFA can significantly enhance your company’s security posture.
- Conduct regular employee training and awareness programs Employee training and awareness programs can help to educate your workforce on the latest cyber threats, phishing scams, and security best practices. Regular training can also help to ensure that employees are aware of the risks associated with their actions and understand their role in protecting company data and systems. This can help to reduce the likelihood of accidental data breaches caused by human error.
- Regularly update software and systems Software and system updates often include security patches and bug fixes that can help to address vulnerabilities and protect against cyber threats. Regularly updating software and systems can help to minimize the risk of a cyber attack and ensure that your company is using the latest security measures.
- Regularly backup data Backing up data is an essential component of any cybersecurity strategy. It helps to ensure that your company can recover from a data breach or other disaster, such as a ransomware attack. Regularly backing up data can help minimize the damage caused by a cyber attack and reduce the time it takes to recover.
- Conduct regular vulnerability assessments and penetration testing Vulnerability assessments and penetration testing can help to identify potential weaknesses in your company’s security infrastructure. Regularly conducting these assessments can help to ensure that your security measures are up-to-date and effective in protecting against the latest cyber threats.
- Limit access to sensitive data Limiting access to sensitive data is another essential cybersecurity best practice. Not all employees need access to all data. By limiting access to sensitive data on a need-to-know basis as a requirement. RBAC Access Control. Role-based access control (RBAC) and attribute-based access control (ABAC)
- Finally, hire a professional Cyber Consultant who is vendor agnostic.
Please also consider these former best practices if it sounds redundant it is because rinse-and-repeat best practices work.
1. Consider creating a dedicated insider threat role.
Insider threats are on the rise, across all industries and company sizes (and they can cost organizations an average of $8.76 million per year). Stopping insider threats, for this reason, should be a team sport.
A dedicated insider threat professional can bring together the cross-departmental teams needed to quickly detect, investigate, and respond to insider threat incidents when they do occur. This role can also help your team become more proactive by assembling the right policies and tools to prevent insider threats from happening in the first place.
2. Conduct phishing simulations.

According to Verizon’s 2018 Data Breach Investigation Report, phishing attacks are still as prevalent as ever, but in an analysis of phishing simulations, 73% of people did not click on a single malicious email all year (bravo!)
An important aspect of cybersecurity awareness training is helping employees understand how phishing attacks may manifest themselves in their day-to-day lives. As social engineering attacks and credential theft attempts become more sophisticated, investing in phishing simulations creates a safe space to test employees’ knowledge.
3. Educate employees on cybersecurity policies for remote work and business travel.
We recently surveyed 1,000 employees about how they access corporate networks during work travel, and 77% admitted to connecting to free public Wi-Fi networks (which are typically unsecured) using corporate computers and phones. Only 17% of respondents said they always use a VPN when they’re away from the office.

With the remote work trend on the rise, employees need to know that sacrificing security for convenience isn’t an acceptable tradeoff. Nearly half of employees aren’t aware of their travel or remote work cybersecurity policies — so it may be time for a refresher (or to establish these guidelines if they aren’t already in place!)
4. Prioritize employee privacy.
Even a quick look at the tech news headlines from 2018 shows that data privacy awareness and sensitivity is at an all-time high. Not to mention, GDPR regulations and others coming down the pike (such as California’s Consumer Data Privacy Law) make data privacy a business imperative.
Prioritize employee privacy by anonymizing any data you collect from them in an insider threat prevention capacity, and communicating clearly about how cybersecurity policies impact their privacy in any way.
5. Create a cybersecurity awareness training program.
Consider this: two out of three insider threat incidents are caused by employee or contractor mistakes, and mistakes are preventable! Now is the time to invest in cybersecurity awareness training. In fact, according to SANS, 85% of cybersecurity awareness professionals reported that their work had a positive impact on the security of the organization.
If you’re wondering where to start, check out our Coachable Moments series, which regularly features cybersecurity awareness tips. Cliff’s Notes version: find multiple channels to reinforce your cybersecurity policies in employees’ day-to-day work (since no one wants to read a long, boring document).

6. Inform third-party contractors of the cybersecurity policy.
According to a recent NPR/Marist poll, one in five jobs is held by freelance workers, and that trend will only continue to rise. Many organizations reap the benefits of third-party contract work, but few educate these contractors on cybersecurity policies and best practices that may affect their day-to-day workflows. Ensure these workers are aware of your policies and know how to adhere to them.
7. Monitor both user and file activity.
We predicted that savvy, malicious insider threats would take advantage of multiple channels to exfiltrate data and hide their tracks in 2019, which means that having the right user and file activity monitoring solution in place is one of the best methods of prevention. Solutions like DLP that focus on the data, and not user activity, often fall short of stopping malicious insider threats in their tracks.
8. Be vigilant of state-sponsored threats.
We’ve seen a lot of headlines in 2018 about international threats targeting U.S.-based companies, including Amazon’s high-profile insider threats in China. Employees at companies within high-value industries, including banking, technology, healthcare, and more, may face major incentives to exfiltrate and sell data to foreign governments. Understanding the motivations of nation-state insider threats is crucial, so you’ll be able to spot patterns of suspicious activity.
9. Enforce the use of a password manager, SSO & MFA.

It sounds like an obvious faux pas to the cybersecurity professional, but the use of weak or repeat passwords is still rampant among workers today. If you can’t teach employees how to reliably create hack-proof passwords, then adopting and enforcing a quality password manager is another great option. If you haven’t already chosen a password management solution, check out this post on the benefits and risks of password managers.
Other account security measures such as single sign-on (SSO) and multi-factor authentication (MFA) should also be enforced across the board, taking as much margin for user error out of the picture as possible.
10. Audit privileged access.
If you haven’t done it in a while, check how many users have privileged access to sensitive areas of your servers, and ask whether each person’s level of access is really necessary. Privileged access tends to creep up on organizations over time, as certain people leave the organization, change roles, or no longer work on tasks related to their admin credentials. If you find this issue is repeatedly happening at your organization, it may be time to adopt a system of temporary or rotating credentials.
Final Thoughts
We hope that adopting these best practices can help your organization reduce unnecessary risk.