
US government says: Patch your edge devices, or else!
It’s binding for federal agencies, but worth your attention even if you’re not bound by it yourself.


The Cybersecurity & Infrastructure Security Agency (CISA) recently released its latest report — covering 2022 Cross-Sector Cybersecurity Performance Goals (CPGs). These goals demonstrate a continued focus on the cybersecurity and risk management of small to medium-sized companies. These businesses are dealing with budgetary and resource constraints yet fall victim to the same kind of attacks that bedevil enterprise companies. In this article, we’re going to talk about the report, why it’s important for organizations of all sizes, and share our top takeaways from their published suggestions.
The government knows that small to medium-sized companies are at high risk for cybersecurity threats – they often have minimal security and almost no standards to protect them. For organizations with little cybersecurity knowledge or for those confused by all the vendor noise, the CPGs can serve as a valuable starting point. Instead of being seen as comprehensive or strict regulatory guidelines, the CPGs are more like a set of minimum goals to help businesses meaningfully reduce the risks, both to their end-users and their critical infrastructure (CI).
Rather than worrying about every potential threat a business might encounter, these suggestions are meant to address the most common threats that would have the greatest impact. CISA calls the set of practices a “floor” for organizations, not a ceiling. While this means the advice is general, the benefit is that it can be applied across the board with minimal resource/budgetary requirements. Aside from the financial aspect, this is an advantage because it makes the first attempts at adding security measures to your company more straightforward. *
The cybersecurity landscape is constantly changing; accordingly, the CPGs will be updated every 6-12 months to reflect the latest best practices and identify new threats and defenses as they occur.
* For a more substantial set of rules than the CISA guidelines, organizations should look to NIST controls, which include 18 control families and 1000+ controls.
The performance goals are divided into 8 different categories and have been chosen to close the gaps that CISA sees as most urgent, especially for smaller businesses that can be less prepared for incoming threats.
To make it easier to sort through, we’ve provided a summary that includes recommendations for organizations, suggestions specific to Operational Technology and Industrial Control Systems (OT/ICS) teams being the exception. Let’s dive in!
Insecure accounts can leave the door open for cybercriminals to waltz on through. Every step added to the account authentication and authorization process will help improve your organization’s security.
While cleaning your house once a year as part of your new year’s resolution is great, a bit of cleaning every day can give you comfort all year round. Your cyber environment also gets dirty over time as users go about their work. Implementing these recommendations can help maintain order and reduce the attack surface for potential bad actors.
Nothing is more valuable than your data. To keep it safe, you need to protect it on the endpoint and in transit. You should also have a clear view of when data is being accessed as well as control of how it is stored. This is especially critical for sensitive data.
If everyone is in charge, no one is in charge. Assigning a point person to manage cybersecurity leadership and training is essential to encouraging a culture of cyber resilience.
Knowing when your locks are broken or a window is open, can keep your home safe. Staying informed about known exploited vulnerabilities, keeping in touch with security researchers, and performing tests to find potential issues will keep you one step ahead of cybercriminals.
Procurement is an important, but often missed, part of your overall security profile. Put some qualifying questions in place to clear service providers and vendors before employees and contractors can buy from them.
Even though we’d like to be able to prevent every attack, that’s not possible. What happens when you experience a confirmed cybersecurity incident; and, perhaps more importantly, how do you get back to normal quickly?
Here are a couple of additional tips for staying safe.
The CPGs are valuable to smaller companies for a couple of reasons – they can not only provide a security starting point, they can also help companies get funding for cybersecurity resources. Plus, following the guidelines set out by CISA can help reduce organizational cyber debt.
For companies that may be subject to additional regulation as they grow or future proposed regulation, it’s helpful to know that every security practice in the CPGs corresponds with a subcategory in the NIST CSF. While each subcategory is not fully addressed, it’s a great way to set your company up for further compliance in the future. It’s also important to note that if you’ve already adopted and implemented the NIST CSF, you don’t have to take additional steps – you will have met the suggestions in the CPGs.
In any case, the government is clearly concerned about the security (or lack thereof) of small to medium-sized companies, and the publishing of CPGs may be the start of additional regulatory activity. One piece of data security legislation, the American Data Privacy and Protection Act, has been proposed and could pass in Congress. This act could change privacy law country-wide and worldwide. Preparing your organization now with basic security measures and best practices is a great way to get a jump on any future legislation.
Overall, the CISA CPG report serves as a helpful document to guide priorities and build up cyber resilience. It’s a great starting point for those with little to no investment in cybersecurity. However, keep in mind that attackers don’t discriminate. They use the same techniques against small businesses as they do against the Fortune 500. You’ll need to continue to make investments to reach a true state of cyber resilience.
If you need reinforcements, a modern MSSP like SolCyber can help! Our modern managed security services can help you achieve cyber resilience quickly and easily, focusing on your most critical assets and helping you improve your security position in no time.

It’s binding for federal agencies, but worth your attention even if you’re not bound by it yourself.

Not very far at all, apparently.

Phishing remains one of the most prominent attack vectors in use today. According to the Cybersecurity and Infrastructure Security Agency (CISA), over 90% of all cyber attacks begin with phishing. Two core reasons for phishing’s prominence are: By the end of Q4 2022, the number of phishing attacks worldwide spiked to over 1.35 million. Phishing is often the first step in far more sophisticated attacks, such as: Investing in fortifying your business against phishing attacks is one of the more […]

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.






