Our Blog

Securtity Monitoring

Security Monitoring – Day 9 – Security Visibility: Part 1

Hail! If you are new to the series start with Day 1. For those caught up let’s get hunting. Today will focus on instituting a cost-effective, management-light security monitoring solution. Like its analog in the physical world (security cameras) security monitoring is an important tool for deterrence, real-time detection of crime in progress and clear evidence for law enforcement or insurance in the event of a crime. I recommend all businesses with a physical footprint to have a security camera and likewise all businesses with important digital assets should have a basic monitoring capability.

This will be the first time I suggest that unless you have an in-house security person or are highly technical that you should bypass the instructions below and reach out to a professional. Costs on this for a small business run from several hundred to several thousands a month depending on the scope of your digital assets. Feel free to contact me or any other qualified security expert on this one. For those with an internal security person or that is highly tech savvy the following applies…for the rest you have been warned 🙂

Security Monitoring

For those going on your own I recommend using a cloud-managed solution as the infrastructure requirements to roll your own can be complex and burdensome. There are several good cloud-based products, if you would like a recommendation reach out to me. Steps to get basic monitoring deployed below:

  • Sign up for a free trial
  • Read through the documentation and/or watch their training video content
  • Deploy sensors to your most important digital assets
  • Configure the sensors to pull only the data you plan to use (you will generally pay per GB)

— You can stop here if you just want to collect the data for review. To get notified in real time of a crime in progress continue below…

  • Design alerts for common indicators of compromise relevant to your environment
  • Tier the alerts so priority alerts rise to the top
  • Test the alerts to ensure they fire when you think they should
  • Design dashboards that allow you to spot changes in your environment at a glance
  • Review your alerts based on priority (high: daily – medium: weeks – low: only as needed)
  • Put aside some time each month to ensure your alerts are working properly and to design new alerts as needed

The process of installing, configuring and monitoring your security sensors can be daunting if you haven’t done it before but it can be done quickly and efficiently when carried out by an expert. Don’t hesitate to reach out and Happy Hunting!

Be sure to come back for Day Ten / Basic Web Security / Part 1

CTO / Principal Engineer

 

David Hyde-Volpe
CTO / Principal Engineer

 

CONTACT
INFORMATION

SECURITY MANAGED.
BACK TO BUSINESS!