Security

Startup Security: Protecting Your Company

Jasper Laagland
#security#startup#small business

Many startups prioritize growth over security, often overlooking the importance of safeguarding data and systems. However, in an era of increasing cyber threats, it’s crucial to prioritize security even with limited resources. This blog post provides valuable tips to kickstart your security journey while keeping costs in check.

Security starts with people

Security isn’t necessarily about technology; it’s mostly about people. The human element is the most common threat vector; it was the root cause of 82% of data breaches, as reported in Verizon’s 2022 Data Breach Investigations Report. Implementing security in your organization primarily revolves around awareness. Here are things you can do:

Here are some actions you can take:

Lead by example; when management demonstrates a commitment to security, employees are more likely to follow suit.

Zero trust

Numerous companies commonly grant unrestricted access to most users on platforms like Dropbox, which is often far from a prudent approach. While it might initially seem somewhat stringent, implementing a zero trust policy, also known as the principle of least privilege, can significantly reduce potential security challenges.

Zero trust essentially entails providing access only to the specific resources individuals genuinely require. Furthermore, when access to a system is only necessary for a limited time, promptly revoking that access is a recommended practice. Fortunately, putting zero trust into practice is more manageable than it may initially appear.

It is advisable to categorize your documents into the following basic labels:

Identify possible attack surfaces

Put yourself in the shoes of an attacker—how might someone attempt to access your data? Conduct exercises designed to simulate potential data breaches; this will help you identify vulnerabilities within your company. Be thorough, examining both internal and external threats, including cyberattacks, data leaks, and insider threats. Encourage each department to conduct its security analysis. By consolidating these results, you can compile a comprehensive list of areas where security measures should be implemented.

Email

Forgotten your password? We’ve got you covered, we will send you an email to recover your account! Your email account serves as your digital identity and the gateway to the systems you use. However, the standard used for email, SMTP, is not inherently secure by design. Nevertheless, it has become our primary means of communication with other companies. Therefore, it’s essential to prioritize the security of your email accounts.

Enforce robust password policies for email accounts and make multi-factor authentication (MFA) mandatory. There are options to enhance security using DMARC, DKIM, and SPF protocols. These measures significantly reduce the risk of unauthorized access or tampering with your email. Setting them up is not overly complex, so you can either tackle this task yourself or enlist the assistance of your IT administrator.”

Access control

Begin by identifying the applications and systems utilized within your company. Create a list and organize it in your preferred application, making it easily accessible for all employees. Subsequently, assign an owner to each application. An owner’s responsibilities include:

It’s important to note that being responsible doesn’t necessarily mean managing everything personally; the task of granting and revoking access can be delegated to multiple users. It’s most convenient to assign ownership to those who are the heaviest users of a specific application. For instance, if it’s a marketing tool, appoint someone from the marketing department as the owner. Avoid the hassle of sending access requests to a generic ‘IT’ department for every application; this practice can be cumbersome.

Furthermore, by creating an overview of your applications, you can easily identify redundant ones, potentially saving a significant amount of money. Once you’ve compiled a comprehensive list, consider creating profiles within your organization and allocate applications to these profiles. This will also streamline the onboarding process for new employees.

Multi factor authentication

Multi factor authentication (MFA) requires you to provide two authentication factors. In most cases this means you use your password and code from a text message or a one time generated code. Nowadays most applications support MFA, and you should use it. It takes a bit of time to get used to, but it’s definitively worth it. MFA is very effective in preventing unauthorized access when a password is compromised. I recommend to use Authy for MFA, it’s developed by Twilio and free to use.

Passwordless authentication

Passwords can be a hassle; fortunately, passwordless authentication is gaining popularity and is, in fact, more secure than traditional authentication methods. Passwordless authentication relies on alternative factors such as biometrics (e.g., fingerprint or facial recognition) or cryptographic keys for verification. Many companies are now adopting this approach, enabling you to log in without the need for a password.

Password management

If you ever find the need to store passwords, using a password manager is the recommended approach. I’ve come across numerous companies that rely on a ‘magic’ Excel sheet containing all their passwords, often secured with an easily guessable password. If you’re keen on compromising your security, this is the way to go.

Fortunately, there’s a multitude of password managers available, and most of them perform their job effectively. In many instances, you can create teams that can access shared passwords, enhancing collaboration. While it’s ideal for each user to have their individual account, sharing passwords securely through a password manager remains the best option when that’s not feasible.

Password managers can not only generate and store secure passwords for you but also assist in updating existing ones. Additionally, they provide a convenient means for employees to share passwords when necessary, eliminating the need for sending passwords via insecure methods like email or Slack messages.

IT administration

You can outsource your IT administration to a specialized company at minimal or no additional cost. For example, if you use Microsoft 365, the subscription fee may already cover the expenses associated with an IT administrator who is a certified Microsoft partner.

Be ready

Plan ahead for when something bad does happen. Think about what the necessary steps are when a data breach occurs. Who do you contact, what will your message be. This is called an incident response plan. When you start thinking when a data breach has occurred you often feel rushed to take action, which can result in suboptimally dealing with the issues.

When a data breach affects your users it’s your responsibility to inform them. Attempt to objectively describe the issue. Keep your users updated with relevant information, do not send messages when there is no news. When the crisis is over explain to your users what measures you have taken to prevent this from happening again. If necessary contact the authorities.

Conclusion

Prioritizing security within your startup, even with limited resources, is imperative to safeguard your users’ and employees’ data. By emphasizing the human factor, implementing zero trust policies, proactively identifying vulnerabilities, and embracing secure practices, you can strengthen your company’s security posture without straining your budget. In the unfortunate event of a breach, a well-defined incident response plan will be your guiding light, enabling you to navigate the situation with confidence.

In need of a Fractional CTO?

Contact us for a free consultation and learn what a Fractional CTO can do for your business.

← Back to Blog