02.11.2020 Views

Cyber Defense eMagazine November 2020 Edition

Cyber Defense eMagazine November Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine November Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

#3 Delete “default” and sample databases. The word “default” is the playground for cybercriminals.<br />

Those who have suffered cyber breaches will know, it can nearly always be replaced with the phrase<br />

insecure: default passwords are weak passwords; default settings are unsafe settings. If there is a default<br />

anything in your environment – always delete it.<br />

#4 Strong passwords are essential. Again, another seemingly mundane and straightforward action,<br />

but one that is the most overlooked. Default or weak passwords attract cybercriminals like bees to honey.<br />

Change passwords often, use unique passwords for different projects, make sure passwords are strong,<br />

and very importantly, change all default passwords.<br />

#5 Use role-based access control (RBAC) and Active Directory. Control privileges to both<br />

administrative activities and data access with fine-grained access control. Also, protect user credentials<br />

and manage them at a centrally controlled place with Active Directory.<br />

#6 Encrypt your data in-transit, on the wire, and at rest: Make sure that your data is encrypted as it<br />

travels over networks during client-server communications or when it is being replicated within the<br />

database server or being replicated between database servers in different data centers/zones/regions.<br />

Likewise, you should encrypt the data when it is stored for persistence. These measures prevent<br />

unauthorized access to data at all levels.<br />

#7 Use updated TLS Ciphers. Transport Layer Security (TLS) enables secure network communications.<br />

This security can be further enhanced by using updated versions of the ciphers and/or by picking<br />

customized ciphers. On top, a well-thought-out policy for certification expiration/rotation/revocation<br />

should also be implemented.<br />

#8 Limit port access. Allow firewalled access to the minimum set of network ports that are needed for<br />

your database to work.<br />

#9 Report security issues immediately. If your database has been breached or you think there may<br />

be a security flaw, report it. Immediately. There is a community of people out there that can offer you<br />

advice and benefit from this information. Security is always better when we pool resources and work<br />

together as an industry – keeping us one step ahead of cybercriminals.<br />

A problem shared<br />

Hackers and cybercriminals are always going to be part and parcel of our business life. It is a bleak<br />

reality. We need to invest in education and adopt best practices, and we need to acknowledge that<br />

ensuring compliance and adopting good security policies is an industry-wide responsibility.<br />

For those of us deploying, implementing, and developing on databases, this is even more relevant. From<br />

web, mobile, and app developers through to C-suite and technology executives, everyone involved in<br />

databases has responsibility for ensuring they are secure. NoSQL vendors also have a responsibility to<br />

ensure that their systems provide users with the tools to secure themselves better and secure their<br />

services by default.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2020</strong> <strong>Edition</strong> 66<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!