{"id":16024,"date":"2026-03-31T09:11:17","date_gmt":"2026-03-31T09:11:17","guid":{"rendered":"https:\/\/newestek.com\/?p=16024"},"modified":"2026-03-31T09:11:17","modified_gmt":"2026-03-31T09:11:17","slug":"8-ways-to-bolster-your-security-posture-on-the-cheap","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=16024","title":{"rendered":"8 ways to bolster your security posture on the cheap"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>As every CISO knows, maintaining a strong cybersecurity posture is costly. What\u2019s not so well known is that there are many ways cybersecurity can be enhanced with the help of relatively trivial investments. Simply by thinking creatively, a security leader can substantially boost enterprise protection at a minimal cost.<\/p>\n<p>Could your organization benefit from some extra low-cost protection? If so, here are eight ways to improve enterprise cybersecurity without seriously denting your budget.<\/p>\n<h2 class=\"wp-block-heading\" id=\"1-enforce-mfa-better\">1. Enforce MFA better<\/h2>\n<p>Risk mitigation should start with fundamentals, says <a href=\"https:\/\/www.linkedin.com\/in\/trevorhorwitz\/\">Trevor Horwitz<\/a>, CISO at compliance technology services firm TrustNet. \u201cMFA directly supports confidentiality and access control, which are core security objectives,\u201d he states. \u201cIn almost every breach we analyze, compromised credentials are involved.\u201d Most organizations already have access to this capability. Turn it on, <a href=\"https:\/\/www.csoonline.com\/article\/4123184\/always-on-privileged-access-is-pervasive-and-fraught-with-risks.html\">especially for privileged access<\/a>, Horwitz advises.<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/cisorandygross\/\">Randy Gross<\/a>, CISO at certification firm CompTIA, agrees. \u201cBegin by clearly defining the crown jewels and the next tier of important systems, then <a href=\"https:\/\/www.csoonline.com\/article\/570795\/how-to-hack-2fa.html\">enforce MFA<\/a> and least privilege across those environments,\u201d he recommends. \u201cNext, establish time-bound remediation expectations for the meaningful vulnerabilities in those systems before expanding attention to the broader environment.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"2-take-full-advantage-of-your-existing-tools\">2. Take full advantage of your existing tools<\/h2>\n<p>A practical way to strengthen enterprise security without incurring additional significant spend is to ensure you\u2019re fully leveraging the capabilities of solutions already present within your organization, says <a href=\"https:\/\/www.linkedin.com\/in\/garybrickhouse\/\">Gary Brickhouse<\/a>, CISO at security services firm GuidePoint Security.<\/p>\n<p>\u201cMost organizations have invested heavily in security solutions, yet most are only using a portion of what those tools can do,\u201d he explains. \u201cBy optimizing and operationalizing existing technologies, organizations can realize a reduction in cybersecurity risk with little spend.\u201d<\/p>\n<p>Brickhouse says this approach is highly effective because it focuses on improving operational maturity rather than adding more technology solutions. \u201cThis tactic also increases ROI by helping to ensure organization are getting the most value from solutions they already own,\u201d he says.<\/p>\n<h2 class=\"wp-block-heading\" id=\"3-conduct-tabletop-exercises\">3. Conduct tabletop exercises<\/h2>\n<p>Don\u2019t underestimate the power of <a href=\"https:\/\/www.csoonline.com\/article\/570871\/tabletop-exercises-explained-definition-examples-and-objectives.html\">tabletop exercises<\/a>, advises <a href=\"https:\/\/www.linkedin.com\/in\/ryancdavis\/\">Ryan Davis<\/a>, CISO at IT services provider New Charter Technologies. \u201cThey almost guarantee a positive action, and the only cost is in time,\u201d he says.<\/p>\n<p>A tabletop exercise requires participants to <a href=\"https:\/\/www.csoonline.com\/article\/1311295\/4-tabletop-exercises-every-security-team-should-run.html\">view scenarios from an execution perspective<\/a> rather than a theoretical position.<\/p>\n<p>\u201cPracticing for unexpected scenarios enables teams to exercise muscles they wouldn\u2019t normally use,\u201d Davis says. \u201cIt allows team members to ask questions they may not typically ask in everyday scenarios because there isn\u2019t time or an obvious need to do so.\u201d<\/p>\n<p>He adds that the approach also quickly highlights strengths that don\u2019t need further attention, as well as gaps that need to be closed.<\/p>\n<h2 class=\"wp-block-heading\" id=\"4-utilize-the-application-layer\">4. Utilize the application layer<\/h2>\n<p>An effective way to bolster coverage and reduce overall risk is to include the application layer in your cybersecurity strategy, says <a href=\"https:\/\/www.linkedin.com\/in\/billoliver2\/\">Bill Oliver<\/a>, managing director at cybersecurity platform provider SecurityBridge. He notes that ERP systems sit at the core of your company\u2019s operations and have been targeted by bad actors for years.<\/p>\n<p>\u201cMonitoring your ERP systems for missing security patches, bad security configurations, real-time security events, and so on can give you great cybersecurity protection at a relatively low cost as compared to other cybersecurity initiatives,\u201d he says. \u201cUnderstanding what security events are happening in real time, will greatly bolster your company\u2019s cybersecurity program and correct a weakness that has been there since day one.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"5-implement-passkeys\">5. Implement passkeys<\/h2>\n<p>Passkeys eliminate the single biggest attack vector most organizations face: <a href=\"https:\/\/www.csoonline.com\/article\/4042464\/enterprise-passwords-becoming-even-easier-to-steal-and-abuse.html\">stolen or phished credentials<\/a>, says <a href=\"https:\/\/featured.com\/p\/john-coursen\">John Coursen<\/a>, CISO at Fortify Cyber, a firm that helps regulated industries secure their infrastructure.<\/p>\n<p>\u201cThey remove the human element from authentication,\u201d he explains. Coursen notes that passwords tend to get reused, phished, and stuffed into credential databases. \u201cPasskeys can\u2019t be phished, because there\u2019s no shared secret to steal.\u201d<\/p>\n<p>Coursen observes that most modern identity providers, such as Azure AD and Okta, already support passkeys. \u201cThe tech isn\u2019t hard to implement \u2014 it\u2019s the behavior change and getting users to adopt it.\u201d<\/p>\n<p>Start with your highest-risk users, Coursen advises, including executives, finance teams, and anyone with access to sensitive client data or wire transfer authority.<\/p>\n<h2 class=\"wp-block-heading\" id=\"6-aim-for-the-heart\">6. Aim for the heart<\/h2>\n<p>Target what attackers actually exploit, suggests <a href=\"https:\/\/www.aikido.dev\/team-members\/mike-wilkes\">Mike Wilkes<\/a>, CISO at security technology provider Aikido Security. \u201cSet up redundant DNS providers \u2014 they\u2019re low-cost, high-impact, and massively underused,\u201d he says. \u201cPut Cloudflare\u2019s free plan in front of your public-facing apps, and you get DDoS mitigation and a WAF layer instantly.\u201d<\/p>\n<p>Turn on SPF, DMARC, and DKIM, since email is still the No. 1 initial access vector and these DNS controls take just an afternoon to implement. \u201cEnable MFA everywhere using the free Google Authenticator,\u201d Wilkes says, while also recommending checking DNS records and auditing MFA for gaps.<\/p>\n<h2 class=\"wp-block-heading\" id=\"7-consider-human-risk-management\">7. Consider human risk management<\/h2>\n<p>At a time when the vast majority of cyberattacks involve people, human risk management is a critical and cost-effective way to keep the enterprise safe, says <a href=\"https:\/\/www.linkedin.com\/in\/mattglindley\/\">Matt Lindley<\/a>, chief innovation and security officer at cybersecurity awareness training firm NINJIO.<\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/4123230\/human-risk-management-cisos-solution-to-the-security-awareness-training-paradox.html\">Human risk management<\/a> works because it addresses the most urgent cyberthreat most enterprises face by establishing a culture of cybersecurity at every level of the organization, Lindley says.<\/p>\n<p>\u201cInstead of treating employees as the weak links in an organization\u2019s cybersecurity posture, they should be regarded as its greatest security assets,\u201d he states. \u201cWhen employees are empowered to identify, report, and thwart cyberattacks, the enterprise now has a distributed and adaptive layer of cybersecurity.\u201d<\/p>\n<p>Effective human risk management requires security leaders to provide engaging, actionable, and personalized <a href=\"https:\/\/www.csoonline.com\/article\/3604803\/security-awareness-training-topics-best-practices-costs-free-options.html\">security awareness training<\/a>, Lindley says. It also demands a high degree of accountability. He notes that security leaders should be able to determine whether behavioral interventions are actually working by using benchmarks beyond vanity metrics, such as completion rates.<\/p>\n<p>\u201cThis means providing data on phish reporting and other real-world improvements to the organization\u2019s cybersecurity posture, all of which will generate buy-in across the C-suite,\u201d he says.<\/p>\n<h2 class=\"wp-block-heading\" id=\"8-double-down-on-cybersecurity-fundamentals\">8. Double-down on cybersecurity fundamentals<\/h2>\n<p>One of the most effective low-cost security strategies is to double down on fundamentals such as identity protection, patching, visibility, and user awareness, says <a href=\"https:\/\/www.linkedin.com\/in\/jeffforesman\/\">Jeff Foresman<\/a>, vice president of cybersecurity at technology services firm Resultant.<\/p>\n<p>Most organizations already have the tools they need through platforms like Microsoft and Google, as well as their endpoint and email security stacks, Foresman says. The real opportunity, he notes, lies in better configuration and disciplined execution, such as enforcing MFA everywhere, reducing unnecessary admin access, patching Internet-facing systems quickly, and improving phishing reporting and response. \u201cThose steps alone significantly reduce real-world risk,\u201d Foresman says.<\/p>\n<p>Foresman notes that a fundamentalist approach works by targeting how attackers actually gain access. The majority of breaches still begin with compromised credentials, phishing, exposed systems, or misconfigurations, not advanced zero-day exploits, he explains. By focusing on identity, email, and attack surface reduction, organizations can address the most common entry points.<\/p>\n<p>\u201cIt\u2019s practical, measurable, and tied to the breach patterns we see every day, rather than theoretical controls,\u201d Foresman says.<\/p>\n<p><strong>See also:<\/strong><\/p>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.csoonline.com\/article\/570795\/how-to-hack-2fa.html\">How MFA gets hacked \u2014 and strategies to prevent it<\/a><\/li>\n<li><a href=\"https:\/\/www.csoonline.com\/article\/1312195\/redefining-multi-factor-authentication-why-we-need-passkeys.html\">Redefining multifactor authentication: Why we need passkeys<\/a><\/li>\n<li><a href=\"https:\/\/www.csoonline.com\/article\/4123230\/human-risk-management-cisos-solution-to-the-security-awareness-training-paradox.html\">Human risk management: CISOs\u2019 solution to the security awareness training paradox<\/a><\/li>\n<li><a href=\"https:\/\/www.csoonline.com\/article\/4071102\/cisos-must-rethink-the-tabletop-as-57-of-incidents-have-never-been-rehearsed.html\">CISOs must rethink the tabletop, as 57% of incidents have never been rehearsed<\/a><\/li>\n<li><a href=\"https:\/\/www.csoonline.com\/article\/4071289\/what-to-consider-to-make-your-enterprise-phishing-training-effective.html\">Phishing training needs a new hook \u2014 here\u2019s how to rethink your approach<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>As every CISO knows, maintaining a strong cybersecurity posture is costly. What\u2019s not so well known is that there are many ways cybersecurity can be enhanced with the help of relatively trivial investments. Simply by thinking creatively, a security leader can substantially boost enterprise protection at a minimal cost. Could your organization benefit from some extra low-cost protection? If so, here are eight ways to&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=16024\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-16024","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/16024","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=16024"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/16024\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=16024"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=16024"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=16024"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}