Use the NIST Cybersecurity Framework for your Business

Integral IT - NIST cyber security framework

Share This Post

One of the best ways to protect your business against cyber-attacks is by using cyber security frameworks. Cyber security can often seem daunting and challenging to get your head around. But by using a framework, your cyber security can become simple and organised.

The NIST cyber security framework may seem overcomplicated for a small business. However, it is effective in companies, big or small. The NIST framework was set up by the National Institute of Standards and Technology in 2014, and in 2017, advancements were made when Donald Trump became president of the United States. Trump demanded that all government agencies use the NIST framework to protect them from cyber-attacks. Since then, this framework has been adopted by many large businesses and then began to trickle down into the smaller business.

Within Each function of the framework, there are also categories and subcategories.  This is to help your business implement tools and processes to improve your cyber security. This framework also includes the implementation of tiers; to make things more accessible, it is best to think of these as ‘scores’.

Identify Function

This is the first function that must be looked at. This function requires you to understand better all the systems that make up the critical infrastructure of your business. This stage focuses on assessing which assets and processes are at risk, ensuring nothing flies under the radar. Asset management, listing business hardware and internet devices under this function and software, such as cloud services, must be identified. Within this function also comes Risk Assessment. It is to pick up on any old software versions as these could be breached. Once all of this has been completed, you have identified all of the things that could be a cyber security risk and require protection within your business.

Protect Function

This function looks at all the tools and processes to protect the previously identified assets against a cyber-attack. This may include multi-factor authentication to improve protection or find means to protect against phishing attacks. Many IT companies stop after this Function. However, three more handy functions can be completed to ensure the best protection.

Detect Function

How can you detect if and when a Cyber-attacks is being attempted on your business? If you can find out about an attack early, there is a much less threat of a detrimental impact. Security monitoring can save your business. An example of this is email alerts for login attempts in areas where there are no employees. These are hackers attempting to get into your accounts.

Respond Function

After identifying an attempted or a potential cyber-attack, we must then analyse the breach, contain any damage that has been done,  and carry out an appropriate response plan.  This may mean notifying directors, stakeholders, and possibly even customers.

Recover Function

The best recovery tactic is to prevent a cyber-attack altogether. However, we must have a recovery plan in place if a cyber-attack happens. NIST framework identifies this stage as ‘to restore any impaired capabilities or services due to a cyber security event. Recovering from a ransomware attack may mean that all your data is encrypted and you have no access to it. Using an excellent backup will be a key to recovering from this. It also means speaking to your team and talking to them about preventing this from happening again.

That is the last of the functions of the NIST framework; although this is intended for government agencies, it is excellent at protecting businesses as well.

Subscribe To Our Newsletter

Get updates and learn from the best

More To Explore

How to use Microsoft to do

The ULTIMATE Microsoft To Do Tutorial

How do you handle your to-do lists? Do you write tasks on scraps of paper? Or do you pop them in a notebook? Perhaps you have a digital application such as Todoist!  If you’re a Microsoft 365 user, you already pay for a task management system! It is called Microsoft To Do.  We all have

Zero Trust Holy Grail

Is Zero Trust Security The Holy Grail OF Cyber Security?

USA president, Joe Biden, thinks that Zero Trust is the way to go in your cyber security journey, but, what is Zero Trust, and what does it mean for your business?  When it comes to your business, I’m sure you’ve got a strategy in place for how you’re going to win new business, market your

Scroll to Top