In today’s digital age, every organization must prioritize its cyber defenses to protect against sophisticated threats. CBM Technology recognizes the importance of robust cyber security measures, and as part of our commitment to safeguarding your operations, we’ve prepared a comprehensive guide on the key cyber security implementations that are often prerequisites for obtaining a cyber security insurance policy. Whether you are exploring options for cyber security insurance or aiming to enhance your existing security measures, this guide outlines essential security practices and how CBM Technology supports your organization in meeting these requirements.

Proactive Cyber Defense Measures

Privileged Access Management (PAM)

Implementing a Privileged Access Management solution is crucial for controlling, monitoring, and managing privileged user activities. This foundational security measure helps prevent unauthorized access and potential insider threats.

Multi-Factor Authentication (MFA)

MFA is enforced across multiple critical access points:

  • Email Systems: MFA for email access ensures that accessing email accounts requires more than just a password, significantly reducing the risk of unauthorized access.
  • External Administrative Access: MFA is also mandatory for external administrative access, providing an additional layer of security for sensitive operations.
  • VPN and External System Access: We strongly encourage the use of MFA for all VPN and external system accesses. This practice is vital for remote work environments where secure access must be guaranteed.

Endpoint Detection and Response (EDR)

With SentinelOne, our chosen EDR solution, your organization benefits from real-time monitoring and response to threats at the endpoint level, ensuring quick isolation and remediation of potentially harmful software actions.

Security Operations Center (SOC) and Managed Detection and Response (MDR)

Having either an SOC or an MDR solution provides 24/7 threat monitoring, detection, and response capabilities, essential for maintaining continuous security oversight and response readiness.

Network Security Controls

  • Firewalls with Geo Filtering: Our firewalls are equipped with geo filtering to block or allow traffic based on geographical locations, enhancing the control over incoming and outgoing network traffic.
  • DNS and Spam Filters: We implement robust DNS filtering to prevent access to malicious websites, along with spam filters to safeguard your email systems from unsolicited and harmful emails.

Patch Management

Regular patching of Microsoft and third-party software is non-negotiable to protect against vulnerabilities. CBM Technology ensures consistent updates are applied weekly to keep your systems secure.

Vulnerability Management and End of Life Systems

Our comprehensive vulnerability management program helps identify, evaluate, and mitigate security vulnerabilities. Additionally, we provide strong recommendations and support for transitioning from end-of-life Microsoft operating systems to supported versions.

Mail and Phishing Protections

Using Microsoft Defender for Office 365, we ensure your email systems are shielded against advanced threats with attachment scanning, sandboxing, and phishing filters.

Cyber Security Awareness Training

We advocate for regular cyber security awareness training to educate your team about the latest threats and best practices, enhancing the overall security posture through informed and vigilant staff.

Password Policy

Our enforced password policy requires a complex 8-character minimum password, incorporating numbers, uppercase, lowercase letters, and symbols, with mandatory changes every 90 days.

Leverage This Guide in Your Insurance Applications and Proposals

Utilizing this guide helps streamline the cyber security insurance application process by affirming your organization’s commitment to implementing recommended security practices. For specific exceptions or verifications, please contact CBM Technology directly.

Stay Secure and Insured: With CBM Technology, rest assured that your cyber defense strategies not only comply with insurance requirements but also provide substantial protection against an evolving threat landscape. Use this guide as a baseline for discussions with insurance providers and ensure that your organization is recognized for its proactive security measures.