LeastTrust IT

managed data privacy

Cybersecurity is continuous journey of managing an organization's critical risks and investing in people, processes, and technology that can reduce those risks. Leadership backing and budget efficiency is critical to effective risk buy down


LeastTrust IT partners with FortMesa to assess your SOC2 baseline and architect a roadmap for SOC2 Type 1

Too often risk management gets overlooked in cybersecurity partner selection. Good security programs consist of people, processes, and technology. Tools can then enforce business policies and procedures. Proper configuration and delegated governance are high ROI security elements. Our SOC2 assessment will quickly expose the gaps in your current security posture and inform your organization of potential paths to remediation.

Industry leading standards such as NIST, CIS, ISO27001, and ISO42001 are the foundation to a security roadmap. Control selection is based on business goals and carefully considering the cost. Lets start the journey together to a rational and effective cybersecurity program.

Sample of CIS (the Center for Internet Security) Controls – The LeastTrust IT playbook to protect all organizations  

1. Inventory management of Software, Hardware, Data, and 3rd party (including SaaS usage). “If you dont know what you are protecting, you can’t secure it”

2. Businesses processes, data flows, leadership and escalation points. By understanding critical IT system and data flows and how an organization uses them, together we can better architect a cybersecurity program. 

3. Data access controls to critically important or sensitive data. Zero/Least Trust Architecture (ZTA) strategy to creating controlled and silo’d data access to minimize data exposure and increase resilience.  Instead of giving all access to all employees, ZTA aims to start with “what is the minimum access needed per each employee to each data asset or system?” If one user is compromised, damages and and rebuild are minimized. 

4. “Allowlists” and “do not allowlists” of software and services accessible by employees. By limiting software, add-ins, plugins, and scripts to what is necessary for business greatly reduces the attack surface area (What actually needs to be protected, maintained, and monitored)

5. Daily vulnerability scanning and management. Scanning for vulnerabilities with agent based scanners is critical to removing entry points for attackers.

6. Multi-factor authentication (MFA) – MFA is a modern authentication strategy of requiring more than form of authentication (for example password then phone or biometric auth) to make it more difficult for hackers or adversaries to access an organizations systems.  Phishing resistant MFA is an enhanced authentication tools that we frequently deploy (PassKeys, YubiKeys)

7. Complex passwords and the use of a password manager. By creating unique complex passwords for systems and using a password manager prevents (Brute force attacks – trying simple passwords over and over by machines).. Password managers should make it easier for employees to access systems without remembering each unique & complex password. 

8. Apply regular patching updates to machines and software. This is a critical aspect of vulnerability management and regularly removing new vulnerabilities.

9. Collect logs from as many sources as possible, but most important are access logs, failed login attempts, new devices on the network, etc. Logs are critical after an attack to understand and re-engineer defenses to prevent a similar attack in the future.

10. Disable removable drives (USB) and authorize one or few cloud supported data sharing services (Google Drive is our favorite given its integration with Google Workspaces).. Limiting access and support for data sharing medium will make it easier to control data sharing and review access logs. 

11. Enable data “at rest” and “in transit” encryption. Encryption secures data while being stored and sent by scrambling data so that a key is necessary to read & access the data. 

12. Enable and authorize one specific internet browser for commercial use. By controlling browser and its associated plug-ins will limit data leakage, limit software allowlist, and un-authorized shadow IT or data access. (Chrome & Google authentication make this manageable)

13. Enable mobile management features to allow mobile organizational email access, contacts, and calendar. (We use google device management to accomplish this or skip BYOD with Yubikeys)

14. Conduct regular employee training and cyber awareness on controls, data access, and phishing.

14. Establish process and policies for provisioning new users and revoking exiting employees. Enable log out of devices when necessary,  Enable Screen Lock, Enable Remote Wipe, Disable Toasts

15. Establish an incident response policy for a step by step playbook and escalation chain in times of a incident. 

16. Rehearse and simulate attacks to test and improve incident response, employee training, and identifying areas of possible improvement

17. Enable Endpoint Detection and Response (EDR). EDR is a critical sensor and alarm system to identify unusual activity, unauthorized access, and quarantine systems or access.

18. Enable a VPN  (Virtual Private Network) for remote access. VPNs are critical to protecting devices when used outside the core network and using a public wifi network.  

Security & Risk Collaboration Dashboard

Controls & Compliance Platform

Vulnerability Management (Using AI Based prioritization of the most dangerous vulnerabilities)

Daily Vulnerability Management