Getting Started

Securing your organization starts with you.

  1. Get organized → be aware of what you have
  2. Get safe → take steps to fix any gaps



Get Organized

to arrange one's things or one's affairs so they can be dealt with effectively ~Merriam-Webster.com

Understand your resources

Quantify exactly what your organization uses.

Know your peers and the org

Quantify exactly who your organization is, and any people or services you work with.

Know your data

Building on Module 3: Data Security & Privacy - we need to quantify exactly what your organization has.  

Especially if you are holding Personally Identifiable Information, or other sensitive data, you'll want to quantify exactly where this data lives and who can access it.

Document everything

Document, document, document.  Everything you record from the questions you asked yourself above needs to be recorded, and needs to be kept fresh. 


Try and use common terms across all of your information sources.  This will help you and your staff join things together for future planning exercises.



Get Safe

1:  a precautionary measure, stipulation, or device
2:  a technical contrivance to prevent accident
~Merriam-Webster.com

Using the information from Get Organized, you'll undoubtedly have many gaps to fill.  Be proactive in tackling these issues to save heartache later on.  Ask yourself a few questions to get started.

Email clients and services

Email is one of the original and most pervasive methods of communications.  As such, it provides attackers one of the most reliable ways into your company. 

Web servers and hosting services

Everything is now on the web.  It is your organization's lifeblood, but of course attackers will use that against you too.  They even use it themselves for their own tools!

Content, collaboration and other online services 

Find out more about your company's various online services.  From Gmail and Outlook.com, to GoDaddy to Wix, to Bitbucket and Github, and everything in between... nearly everything can and will be used against you.

Securing your org 

Whether it's to help build that beautiful website, convert that database into simple spreadsheets, or whatever the task - you're going to need some help along the way.  

And even if you can do it all... eventually you'll need that help anyhow in order to scale your organization.

For Example

Let's imagine...

Attacker Compromise

Below you can see an attacker targeting our organization.

  1. The attacker runs a bit of code against our blog's contact form function
  2. The code lets the attacker do several things:
    1. retrieve data from the blog's database
    2. upload, download or modify any file they wish
  3. The attacker uses both information and access from the blog to target employees
  4. They send a targeted email or spear-phish to a single employee with an infected file
  5. This file is specially crafted to look like a normal payroll update
    1. It is based on information the attacker uncovered
    2. The file also can be uploaded back to the blog or another site to make it even more believable

Employee gets compromised

Next, you'll see the employee fall victim to the attack

  1. Our employee receives the email, which appears to be a link to a paystub and a request to update their info
  2. The link downloads what looks like a spreadsheet.
  3. The file opens using Excel, but it also contains some extra code which requests permission to run
  4. The code runs and opens a simple program like Calculator to demonstrate that the attacker has executed a program on your computer
  5. Here, we're doing something innocuous such as opening the Calculator app on your computer, but a more skilled attacker or tool will be stealthier and do much more.