Simple Steps for Attack Surface Reduction

In today’s digital landscape, cybersecurity threats have evolved from mere nuisances to sophisticated, profit-driven operations. This transformation necessitates proactive defense strategies that not only respond to threats but also prevent them from infiltrating networks in the first place. For Chief Information Security Officers (CISOs), IT administrators, and Managed Service Providers (MSPs), the objective is clear: implement solutions that block attacks by default, rather than merely detecting them post-breach. While industry frameworks such as NIST, ISO, CIS, and HIPAA offer valuable guidance, they often lack the actionable steps required for effective security implementation.

Adopting a security-by-default mindset involves configuring systems to block potential risks from the outset. This approach not only frustrates threat actors but also streamlines security processes without alienating IT teams. As the adage goes, Attackers only have to be right once; we have to be right 100% of the time. By setting the right defaults, organizations can eliminate entire categories of risk.

1. Enforce Multi-Factor Authentication (MFA) on All Remote Accounts

Implementing MFA across all remote services—including SaaS platforms like Office 365 and G Suite, as well as domain registrars and remote access tools—is a foundational security measure. Even if a password is compromised, MFA can prevent unauthorized access. While it may introduce some friction, the security benefits far outweigh the risk of data theft or financial loss.

2. Adopt a Deny-by-Default Approach

One of the most effective security measures today is application whitelisting or allowlisting. This approach blocks all applications by default and only allows known, approved software to run. The result: ransomware and other malicious applications are stopped before they can execute. It also blocks legitimate-but-unauthorized remote tools like AnyDesk, which attackers often try to sneak in through social engineering. Users can still access what they need via a pre-approved store of safe applications, and visibility tools make it easy to track everything that runs—including portable apps.

3. Implement Secure Configuration Changes

Small adjustments to default settings can close significant security gaps:

– Disable Office Macros: This simple change blocks one of the most common attack vectors for ransomware.

– Enable Password-Protected Screensavers: Auto-locking screens after a short period prevents unauthorized access.

– Disable SMBv1: This outdated protocol has been exploited in major attacks like WannaCry and is generally unnecessary.

– Turn Off the Windows Keylogger: Rarely useful and potentially a security risk if left enabled.

4. Control Network and Application Behavior

– Remove Local Administrative Rights: While most malware doesn’t require admin access to run, revoking these rights prevents users from altering security settings or installing unauthorized software.

– Block Unused Ports and Limit Outbound Traffic: Restricting network access reduces the avenues through which attackers can infiltrate or exfiltrate data.

By implementing these strategies, organizations can significantly reduce their attack surface, making it more challenging for threat actors to exploit vulnerabilities. A proactive, security-by-default approach not only enhances protection but also simplifies security management, allowing IT teams to focus on strategic initiatives rather than constant firefighting.