Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Strategies

Locking down team communication can help control information

  • Rick Farrell
  • May 4, 2022
Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.
Courtesy: Brett Sayles
Total
0
Shares
0
0
0
0

Communication is vital to managing every part of a business. In each communication within your company and between your company and external entities, you’re exchanging information. Some of that information might be simple pleasantries or general knowledge, but most or perhaps even all your communications will contain some proprietary, confidential or other critical information that needs to be kept secure.

Locking down the team’s communication system to control the flow, access and types of information exchanged is an important component of an organization’s security. Let’s explore why information locking is necessary, how it can be accomplished and what the benefits are of a restricted and secure communication system.

What does locking down a communication system mean?

Locking down your team communication system means restricting access to specific devices and users. Most large organizations use a hierarchical access structure. For example, the U.S. government uses confidential, secret and top secret as its access levels. Confidential information could harm national security, secret information might cause serious damage to national security, and top-secret information may lead to grave harm to national security.
Your company’s confidential information might include customer addresses, names, dates of birth and order numbers. Your company’s equivalent of secret might include tax identification numbers, Social Security numbers, a list of candidates you’d never hire and a list of your business contracts or employee salaries. Your top-secret equivalent could be diagrams of how you produce your products, algorithms your organization uses for relationship management or proprietary technology.

Why locking down a communication system is important

Hackers and other nefarious entities know that every business has valuable information, and that information is exchanged in internal communications as well as in communications with prospective, current and past partners, employees, candidates and others. If someone gains access to your confidential information, your reputation, livelihood and trustworthiness are at risk.

Avoid common scams

Malicious individuals and groups want easy money. With the right coding skills, a nefarious entity can quickly gain access to an insecure communication system. Social engineering is a common method used by hackers to gain access to private communications networks. IP spoofing is also used by con artists.

Some other scams that could harm an open team communication system include a network or distributed denial-of-service attack, eavesdropping, man-in-the-middle, transport protocol replay attack and spim. Locking outside users out of your communication system and implementing a clearance or access hierarchy decreases the likelihood of your company falling victim to these common scams.

Reduce the risk of hacking

A wide-open communication system might be convenient and engaging, but it’s also inviting and easy for hackers to infiltrate. When you lock down your team communication system and control the who, what, where, when and how of information exchange, you’re reducing the risk of hacking. If your company’s employees’ personnel files aren’t accessible through your instant messaging system, then they can’t get hacked as easily. By limiting access to cloud storage to those who absolutely need it, you’re lowering the risk of spoofing, spimming and social engineering attacks.

Prevent accidental data release

Not all misuse of data is purposeful or malicious. Accidents happen. Another reason to lock down your team communication system is to avoid an accidental release of confidential information. The finance, technology, research and healthcare industries handle confidential, proprietary and personally identifiable information, much of which is protected by law. Locking down a communication system lowers the risk of an accidental data release that could result in your business getting fined or being sued by the entity or individual whose information was accessed or shared.

Maintain compliance

If your company has government or university contracts, you may be required to maintain compliance with laws on information security, such as the Federal Information Security Management Act (FISMA) of 2002. Failure to comply with security standards could result in the loss of those contracts, fines and other penalties. For example, if you’re working on a NASA contract, you can’t use Zoom to discuss the project. This violates FISMA. Your employees can’t use their personal phones, tablets or other devices to send work-related communications about those contracts.

Methods of locking down a team communication system

You may already use one method to lock down your team communications, such as requiring multi-factor authentication or password changes every 90 days. However, there’s more to locking down a team’s communication system to control information in a structured way.

Take stock of information

Large companies might not realize what types of and how much confidential information they have, who uses it and how it is exchanged. Knowing what information you have, who needs it and why is the first step in locking down your communication system.

Scale down

Pare down to the essentials in your team communication network. Does the whole sales team need to be in the chat, or can the communication channel be pared down to just the sales managers? Each person should only have access to communication channels and information that is required for them to do their jobs. Locking the system down to just the essential users facilitates better information control.

Only keep what you need

Information hoarding won’t do your company any good. If you collect the data, you must protect it. Likewise, locking down your team communication system means that there must be a strong business case for retaining information and sending it to participants.

Authenticate users and devices

Do periodic reviews of who accesses what and why. As soon as a person changes teams, leaves your organization or takes a leave of absence, turn off their access to your communication system and files. Restrict external device access, including printers and copiers you rent from vendors, guests’ phones and internet-enabled lights, window shades and other devices. They’re all vulnerable to hacking through your communications system.

Keep in mind that like other aspects of your business, communication needs and demands are fluid. Technology changes, and so will the threats that come from different types of communications. You’ll need to revisit your lockdown methods on a regular basis to keep your company’s information secure.

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

Rick Farrell

Farrell is North America’s foremost expert in improving manufacturing group communication, education, training and group hospitality processes. He has over 40 years of group hospitality experience, most recently serving as president of Plant-Tours.com for the last 18 years. He has provided consulting services with the majority of Fortune 500 industrial corporations improving group communication dynamics of all types in manufacturing environments.

Related Topics
  • CFE Content
  • Featured
Previous Article
As threat increases, college cybersecurity programs are more in demand
  • Threats & Vulnerabilities

FBI’s Internet Crime Report discloses 3,700+ ransomware attacks in 2021

  • Steve Kardon
  • May 3, 2022
Read More
Next Article
Courtesy: CFE Media
  • Threats & Vulnerabilities

The Colonial Pipeline cyberattack exposed the soft underbelly of U.S. critical infrastructure

  • GlobalData
  • May 11, 2022
Read More
You May Also Like
Courtesy: A3/Siemens
Read More

Industrial robot utilization requires cybersecurity strategy

Courtesy: Brett Sayles
Read More

Throwback attack: Russia launches its first cyberattack on the U.S. with Moonlight Maze

Read More

Throwback attack: Russia breaches Wolf Creek Nuclear Power facility

Courtesy: CFE Media and Technology
Read More

Lack of qualified cybersecurity personnel for critical infrastructure

Figure 1: PLCs, HMIs, and other Ethernet-capable automation devices used for modern automation systems can no longer rely on “cybersecurity by obscurity” and “air gaps.” They must progressively adopt advanced IT type security features. Courtesy: AutomationDirect
Read More

Cybersecurity-centered systems and fundamentals

Read More

Port and maritime cybersecurity vulnerabilities are getting more focus

Figure 1: For smaller organizations with limited network resources, it can be tempting to plug your machine directly into the business network. Courtesy: DMC
Read More

Securing your facility

Courtesy: Trekkor
Read More

Bridging the IT and OT gap for a power service company

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Berkeley Internet Name Domain (BIND) - May 19, 2022
  • Mitsubishi Electric - May 19, 2022
  • Apache - May 16, 2022
  • CISA - May 16, 2022
  • Joint Cybersecurity Advisory - May 17, 2022

RECENT NEWS

  • Will CISA recommend securing industrial control systems?
  • How to implement layered industrial cybersecurity in volatile times
  • Throwback Attack: DDoS attacks are born in the Big Ten
  • Improve two-factor authentication system security
  • A rise in ransomware leaves businesses looking for answers

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT