4 Minute Read
The NFL and college football are in full swing, pop-up Halloween stores are everywhere, and cooler temperatures can only mean one thing: it must be Cybersecurity Awareness Month! The 2025 iteration of this annual event, co-hosted by the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCSA) is a bit different. Instead of focusing solely on basic cyber hygiene topics, the theme is 'Building a Cyber Strong America', highlighting the need to strengthen the nation’s infrastructure against cyber threats, ensuring resilience and security. CISA’s focus on critical infrastructure could not come at a better time. As Trustwave, A LevelBlue Company, noted in its recent reports, Cybersecurity Challenges for Energy and Utilities in 2025, and new research on threats to the public sector, these areas are under attack with ransomware activity, phishing, and credential access attacks all on the rise. This month, Trustwave will post a series of blogs starting with CISA’s basic security suggestions and then take a look at: Trustwave will cover Cybersecurity Awareness Month from several angles, starting with CISA's recommended cybersecurity practices to protect your organization and improve resilience. As always, CISA begins with the basics, which focus on making it as hard as possible for threat groups to gain a foothold in an organization. The 2024 Federal Bureau of Investigation’s (FBI) Internet Crime Complaint Center report found that the vast majority of crimes reported were related to phishing. The attacks totaled 193,407, more than double the next most common type, extortion, and three times the number of personal data breaches at 64,882. Business Email Compromise (BEC) complaints totaled 21,442, which were about on par with the previous year. These phishing scams resulted in excess of $70 million in losses. However, BEC losses were listed at $2.7 billion, down from $2.9 billion in 2023. Phishing tricks employees into opening malicious attachments or sharing sensitive information. Train staff to recognize and report suspicious activity. Trustwave recently introduced its Managed Phishing for Microsoft service. This service can help the client educate workers on the finer points of email security. It achieves this by creating an end-to-end setup and managing phishing-related policies and rules, thereby minimizing the burden on internal IT teams. Additionally, the team conducts regular, real-world phishing simulations tailored to each organization’s environment, helping strengthen user vigilance and reduce risk. Strong passwords are a simple but powerful way to block criminals from accessing your accounts through guessing or automated attacks. Make them mandatory for all users because weak passwords can result in disastrous outcomes. Unfortunately, far too many people rely on easily hacked or simply foolish passwords. To create a strong password, it’s essential to follow three key tips. First, make your passwords long, at least 16 characters, as longer passwords are generally stronger. Second, ensure they are random. This can be achieved by using a random string of mixed-case letters, numbers, and symbols, such as “cXmnZK65rf*&DaaD” or “Yuc8$RikA34%ZoPPao98t”. Alternatively, you can create a memorable passphrase consisting of four to seven unrelated words, like “HorsePurpleHatRun” for a good passphrase, “HorsePurpleHatRunBay” for a great one, and “Horse Purple Hat Run Bay Lifting” for an amazing one. Security.org offers a helpful password-strength tool to test the strength of your password. Please remember, if you choose to check your password’s strength, make sure only to use a trustworthy tool. Otherwise, you may well be giving your password to a threat actor who might quickly put it to use or place it into a password dictionary. Multi-factor authentication, sometimes called two-factor authentication or two-step verification, is a cybersecurity measure for an account that requires anyone logging in to prove their identity in multiple ways. Typically, you will enter your username, password, and then verify your identity some other way, like with a fingerprint or by responding to a text message with a PIN code. Using MFA adds an extra layer of protection to an online account, making it significantly harder for an attacker to gain access. It is recommended, and generally very easy, to enable MFA, particularly for those related to email, social media, and finances. Utilize authentication apps or hardware tokens for additional security. Outdated software can contain exploitable flaws. Promptly install security updates and patches to keep your systems protected. To keep your software up to date, follow these three simple steps: This is where Trustwave Managed Vulnerability Scanning (MVS) can help. It's a powerful tool designed to give you complete visibility into your network's assets and the vulnerabilities they harbor. This blog post delves deeper into Trustwave MVS, exploring its functionalities, benefits, and how it empowers you to build a more robust defense against cyber threats. CISA also recommended several “next-level” practices organizations should implement: Don’t forget to stay tuned for our additional coverage in the coming weeks.
Let’s Get Down to It: CISA’s Best Practices
1. Teach Employees to Avoid Phishing Scams
2. Require Strong Passwords
3. Implementing Multifactor Authentication (MFA)
4. Updating Business Software