Skip to main content

Article

Cyber resilience: 12 key controls to strengthen your security

Take practical steps to build your cyber resiliency with 12 recommended cybersecurity controls, including their characteristics and requirements. 

Eye, Cyborg, Eye, Human Eye

Cyberattacks continue to dominate news headlines, driven by a surge in ransomware events, which increased by an overwhelming 148% in 2021. The perpetrators of these attacks now demand multimillion-dollar ransom payments as they cripple a business’s operations, bringing them to a standstill until a payment is made.


 

Twelve recommended cyber hygiene controls for your organization to implement include:

  1. Multifactor authentication (MFA) for remote access and privileged or administrator access
  2. Email filtering and web security
  3. Secured, encrypted, and tested backups
  4. Privileged access management (PAM)
  5. Endpoint detection and response (EDR)
  6. Patch and vulnerability management
  7. Incident response plans
  8. Cybersecurity awareness training and phishing testing
  9. Remote desktop protocol (RDP) mitigation and other hardening techniques
  10. Logging and monitoring
  11. Replacement or protection of end-of-life (EOL) systems
  12. Digital supply chain cyber risk management

Implementing these controls will help increase your organization's cyber hygiene and improve your security posture. Download our cyber report Cyber resilience: Twelve key controls to strengthen your security  to learn more about each of these controls, why they should be adopted, and how to implement them.


As cyberattacks become more prolific, related insurance claims follow, meaning underwriters have been able to identify a correlation between certain controls and corresponding cyber incidents. Through this analysis and the continuous examination of relevant data points, the insurance industry has a rich understanding of the technical steps that organizations can take to build their cyber resiliency. 

However, due to the growth in attritional losses, consequently insurers are now taking a much more cautious position. Insurers are tightening their underwriting terms, carefully analyzing all cyber insurance applications, and asking more questions than ever before about an applicant’s cyber operating environment and risk controls.

The adoption of certain controls has now become a minimum requirement of insurers, with organizations’ potential insurability on the line. Organizations are undoubtedly placing more emphasis on controls than ever before to help mitigate their ransomware risks and improve their overall cybersecurity position and resilience.

Organizations are recommended to implement a number of cyber hygiene controls that are key to achieving cyber resilience and insurability.

While these controls have been established best practice for several years, some companies are still struggling to adopt them — most often because they have been unable to justify the cost of implementation, did not deploy them comprehensively, or did not understand or see the need for controls. In many regulated industries where cyber resilience controls have been required for years, the effort was often more about checking a box, than enhancing security.

Marsh has recommended 12 key cybersecurity controls providing practical deep dives into their characteristics and requirements. Complete the form to receive a deep dive to help build your organization’s cyber resilience.

12 key security controls to strengthen your cyber resilience

Read the latest insight