Page 28 - CYBERSECURITY ESSENTIALS FOR BUSINESS OWNERS
P. 28

 09 - EMAIL AND WEB BROWSER PROTECTIONS
Safeguards Total 7 IG1 2/7 IG2 6/7 IG3 7/7
Improve protections and detections of threats from email and web vectors, as these are opportunities for attackers to manipulate human behaviour through direct engagement.
Why Is This CIS Control Critical?
Web browsers and email clients are very common points of entry for attackers because of their direct interaction with users inside an enterprise. Content can be crafted to entice or spoof users into disclosing credentials, providing sensitive data, or providing an open channel to allow attackers to gain access, thus increasing risk to the enterprise. Since email and web are the main means that users interact with external and untrusted users and environments, these are prime targets for both malicious code and social engineering.
 THE SAFEGUARDS
9.1 Ensure Use of Only Fully Supported Browsers and Email Clients
Network Protect
9.2 Use DNS Filtering Services
  9.3
9.4
9.5
9.6
9.7
Network Protect Maintain and Enforce
Network-Based URL Filters
Network Protect
Restrict Unnecessary or Unauthorized Browser and Email Client Extensions
Network Protect Implement DMARC
Network Protect
Block Unnecessary File
Types
Network Protect
Deploy and Maintain Email Server Anti-Malware Protections
Network Protect
      12345
Asset Type Security Function
1= Asset Type 4= Implentation Group 2 2= Security Function 5= Implentation Group 3 3= Implentation Group 1
        Did You Know?
The top malicious mail attachment types are Office documents which make up 38% the next highest is Archive (.zip etc.) at 37%. A multi-layered approach to web and email protection is vital.
 Introduction | Threats | NIST Security | Framework | CIS Controls | NSA Risk Levels | The Controls | How We Can Help
CONTROL 09



































































   26   27   28   29   30