Wellforce

Best Practice for Information Security: What Actually Works in Complex Organizations

Cut through the noise on information security best practices. A framework-grounded guide for IT leaders managing real risk in SMBs and mid-market organizations.

SM
Scott Midgley

CEO, Wellforce IT

13 min read
Best Practice for Information Security: What Actually Works in Complex Organizations

Best Practice for Information Security: What Actually Works in Complex Organizations

Most information security guidance suffers from the same problem: it lists controls without telling you which ones fail first, under what conditions, and why. The result is organizations that technically follow best practices but still experience breaches — because they implemented the letter of the guidance without understanding its logic.

This piece isn’t a checklist. It’s an analysis of how the most durable security practices actually function together, where organizations typically break down in implementation, and what separates organizations that survive incidents from those that don’t.

The Framework Problem Nobody Talks About

When security teams discuss best practices, they inevitably reference frameworks: NIST Cybersecurity Framework, ISO 27001, CIS Controls v8, HITRUST CSF. Each has its place. But the real problem isn’t which framework you choose — it’s that most organizations treat frameworks as compliance checklists rather than operational postures.

NIST CSF, for example, is built around five functions: Identify, Protect, Detect, Respond, Recover. Organizations routinely invest heavily in Protect (firewalls, endpoint protection, MFA) while dramatically underinvesting in Detect and Respond. When a threat actor spends 90 days moving laterally through a network before triggering any alert, no amount of perimeter protection matters.

CIS Controls v8 addresses this more directly. The first six controls — collectively called “basic hygiene” — focus on knowing what you have before you try to protect it. Inventory of enterprise assets. Inventory of software. Data protection. Secure configuration. Account management. Access control management. These six controls, implemented rigorously, would prevent the majority of successful attacks organizations experience. Most organizations implement them partially.

The principle worth internalizing: the best practice isn’t the one with the most sophisticated technology. It’s the one your team will actually maintain consistently.

Zero Trust Is an Architecture, Not a Product

Zero Trust has become one of the most abused terms in security marketing. Vendors sell “Zero Trust solutions” as if purchasing software completes the transformation. It doesn’t.

Zero Trust as an architecture means: never trust, always verify. Every user, device, and network flow is treated as potentially hostile, regardless of network location. Access is granted based on verified identity, device health, and least-privilege principles — not on whether traffic originates inside the corporate firewall.

The practical implications are significant. According to cybersecurity research for 2026, Zero Trust security is among the most critical defensive architectures organizations should be implementing — not because it’s new, but because the traditional perimeter model has fundamentally broken down in a world of remote work, cloud infrastructure, and third-party integrations.

What Zero Trust actually requires in practice:

Identity as the new perimeter. Every access request requires strong authentication. MFA is the baseline — not a differentiator, a requirement. Privileged access management (PAM) for administrative accounts is non-negotiable. Service accounts, often overlooked, need the same scrutiny as human accounts.

Microsegmentation of networks. Flat networks are breach multipliers. If an attacker compromises one endpoint, a flat network gives them a running start at everything else. Segmentation limits blast radius. In practice, this means separating workloads by sensitivity classification, not just by function.

Continuous validation, not periodic audits. Zero Trust doesn’t mean verify at login and trust forever. Session tokens expire. Device health is checked continuously. Anomalous behavior triggers step-up authentication. This is operationally demanding — which is why it requires tooling and process, not just policy.

For organizations evaluating where to start, the IT advisory services guide on wellforceit.com covers how to assess your current state before committing to a transformation roadmap.

Where Information Security Actually Fails: The Human and Process Layer

Technical controls get the attention. The failures usually happen elsewhere.

Phishing Remains the Primary Entry Vector

This isn’t a new observation, but the sophistication of phishing attacks has changed substantially. Business email compromise, voice phishing (vishing), SMS-based attacks, and QR code phishing now operate alongside traditional email-based lures. Each channel has distinct characteristics that require different detection approaches.

The wellforceit.com breakdown of signs of phishing by channel is worth reviewing specifically because it addresses the channel-specific tells that generic security awareness training misses. A Teams message from a spoofed internal account doesn’t look like a suspicious email — and your staff won’t apply the same scrutiny unless they’ve been trained on that specific context.

Security awareness training is often criticized as ineffective. The criticism is fair when training is annual, generic, and not reinforced by simulated attacks. It’s unfair when applied to well-designed programs that use targeted simulations, immediate feedback, and role-specific scenarios. The difference isn’t the concept — it’s the execution.

Privileged Access Is Chronically Mismanaged

Audit most mid-market environments and you’ll find the same pattern: too many accounts with administrative rights, service accounts with passwords that haven’t rotated in years, and former employees with credentials that were never fully disabled. This isn’t negligence — it’s the predictable outcome of organizations that grew their IT infrastructure without proportional investment in identity governance.

The fix isn’t complicated in concept. It’s operationally painful:

  • Enumerate all privileged accounts, including service accounts and shared credentials
  • Apply least-privilege principles — admin rights only for tasks that require them
  • Implement just-in-time access for administrative tasks rather than persistent elevation
  • Rotate service account credentials on a defined schedule
  • Audit access rights quarterly and after any personnel change

The quarterly audit is where most organizations slip. Access rights accumulate through legitimate one-off grants that never get reviewed. After two years, the average employee has permissions well beyond what their current role requires.

Data Classification Is the Prerequisite Nobody Implements

You cannot protect what you haven’t classified. This sounds obvious. In practice, most organizations protect everything with the same controls — which means they’re either over-investing in protection for low-sensitivity data or under-protecting their most critical assets.

Effective data classification starts with understanding what sensitive data actually looks like in your specific environment. The taxonomy we’ve covered in example of sensitive data is a practical starting point — but the classification framework only delivers value when it’s implemented at the point where data is created and stored, not retroactively applied after a breach investigation.

Microsoft Purview and similar tools can automate classification for structured data. The harder problem is unstructured data — the SharePoint libraries, email attachments, and shared drives that accumulate over years without consistent naming conventions or sensitivity labels. That’s an operational problem, not a technology problem.

Ransomware Defense: The Recovery Imperative

Ransomware defense is often framed as a prevention problem. Prevention matters, but the organizations that recover fastest from ransomware incidents aren’t the ones that prevented every possible intrusion vector — they’re the ones that had functioning backup and recovery infrastructure before the incident.

According to current cybersecurity threat analysis, ransomware remains one of the highest-impact threat categories organizations face, with attackers increasingly targeting backup systems specifically to prevent recovery.

This changes the calculus on backup strategy. Immutable backups — copies that cannot be modified or deleted even by accounts with administrative access — are no longer optional for any organization with meaningful data assets. Air-gapped backups, while operationally complex, provide the highest assurance against attackers who compromise privileged credentials.

The 3-2-1 backup rule (three copies, two different media types, one offsite) has been the standard recommendation for years. A more current framing is 3-2-1-1-0: three copies, two media types, one offsite, one offline or immutable, zero errors (verified recovery). The verification piece is what most organizations skip — they have backups, but they’ve never tested whether those backups actually restore successfully.

For organizations managing data migration alongside security hardening, the migration strategies guide addresses how to maintain security posture during transitions that create temporary vulnerability windows.

Third-Party Risk: The Attack Surface You Don’t Control

Supply chain attacks — where threat actors compromise a trusted vendor to reach downstream targets — have demonstrated that your security posture is only as strong as your weakest third-party integration. This isn’t theoretical. The operational reality is that most mid-market organizations have dozens of third-party integrations with varying levels of access to internal systems, data, and networks.

Effective third-party risk management requires:

Vendor inventory with access scoping. Know which vendors have what access. This sounds basic, but the answer is often “we’re not sure” for organizations that have grown through acquisitions or rapid hiring.

Security questionnaires as a baseline, not a conclusion. Asking vendors to complete a security questionnaire provides a starting point. It doesn’t tell you whether they’ve implemented what they claimed. Higher-risk vendors warrant independent validation — SOC 2 Type II reports, penetration test summaries, or audit rights in contracts.

Contractual security requirements. Your vendor contracts should specify minimum security requirements, breach notification timelines (ideally within 24-72 hours of discovery), and your right to audit. Many organizations discover during an incident that their vendor contracts are silent on security obligations.

Offboarding discipline. When a vendor relationship ends, access should be revoked immediately. This is a process problem more than a technology problem — someone needs to own the vendor offboarding checklist and execute it consistently.

The Incident Response Gap

Every organization of meaningful size should have a documented incident response plan. Most do, at least nominally. The gap is that the plan has never been tested, the people named in it have moved on, and the contact information for external resources (legal counsel, forensics firms, cyber insurance providers) is out of date.

A tabletop exercise doesn’t require significant investment. It requires two to four hours, the right stakeholders in a room, and a realistic scenario to work through. What you’ll discover: communication chains that don’t work, decision-making authority that isn’t clear, and technical playbooks that assume tools or access that no longer exist.

The NIST framework’s Respond and Recover functions are where tabletop exercises reveal gaps fastest. Run the exercise before the incident, not as a post-mortem.

AI in the Security Stack: Defensive and Offensive Implications

AI-enhanced security tooling is becoming more capable — particularly in areas like behavioral analytics, threat hunting, and automated triage of security events. Security operations teams that previously couldn’t process alert volumes effectively can now use AI-assisted tools to surface the signals worth investigating.

The offensive side is equally important to understand. Cybersecurity trend analysis for 2026 notes that AI is enabling attackers to craft more convincing phishing content, automate reconnaissance, and identify vulnerabilities at scale. The same technology that improves defenses is improving attacks.

This means the organizations that will fare best aren’t those with the most AI-powered tools — they’re the ones with the operational discipline to act on what those tools surface. AI can flag anomalous behavior. Humans still need to investigate and respond. The bottleneck is usually not detection; it’s the response capacity to act on what’s detected.

SharePoint and Collaboration Platform Security

A significant portion of organizational data now lives in collaboration platforms — SharePoint, Teams, OneDrive. These platforms have robust security capabilities that most organizations haven’t fully configured.

External sharing settings in SharePoint deserve particular attention. Default configurations in many tenants allow broader external sharing than most security policies would permit if applied deliberately. The SharePoint security audit sequence on wellforceit.com walks through the configuration review process specifically for organizations that have grown their SharePoint environment organically and suspect they have gaps.

Microsoft Purview’s integration with SharePoint enables sensitivity labels, DLP policies, and access controls that are tied to data classification. For organizations already in the Microsoft 365 ecosystem, these are high-value controls that don’t require additional licensing for basic implementation.


Frequently Asked Questions

What’s the difference between information security and cybersecurity?

Information security is the broader discipline — it encompasses protection of information in all forms, including physical documents, verbal communications, and digital data. Cybersecurity specifically addresses digital systems and networks. In practice, the terms are used interchangeably in most business contexts, but the distinction matters when scoping a security program: physical security, clean desk policies, and visitor access controls are information security concerns that cybersecurity frameworks sometimes underemphasize.

Which security framework should a mid-market organization prioritize?

For most mid-market organizations without a specific regulatory mandate, the NIST Cybersecurity Framework provides a practical starting structure because it maps to business functions rather than just technical controls. If you’re in healthcare, HITRUST CSF aligns with HIPAA requirements. If you’re pursuing enterprise contracts or need to demonstrate security rigor to clients, SOC 2 Type II is often the most recognized attestation. The top cybersecurity standards overview from Socium Solutions provides a useful comparative summary.

How often should a security policy be reviewed?

At minimum, annually — and after any significant infrastructure change, acquisition, or incident. Policies that don’t reflect how systems are actually configured or how work is actually performed become security theater. The review process should include the people who operate under the policies, not just the security team that wrote them.

Is multi-factor authentication sufficient to prevent account compromise?

MFA dramatically reduces the risk of credential-based attacks, but it’s not a complete solution. MFA fatigue attacks — where attackers send repeated authentication requests until a user approves one to stop the notifications — are a documented bypass method. Push-based MFA is more vulnerable to this than FIDO2/passkey authentication or number-matching prompts. Conditional Access policies that require compliant devices and flag risky sign-ins provide additional layers beyond MFA alone.

What should a security incident response plan include?

At minimum: defined severity classifications, a communication chain with named roles and backup contacts, decision-making authority (who can authorize taking systems offline, engaging external forensics, notifying regulators), technical playbooks for the most likely incident types, and pre-negotiated relationships with a forensics firm and legal counsel. The plan should also include your cyber insurance carrier’s incident response hotline — many policies require notification within a specific timeframe.

How do we handle security for employees using personal devices?

Mobile Device Management (MDM) or Mobile Application Management (MAM) policies, combined with Conditional Access requirements, allow organizations to require baseline device compliance without taking full control of personal hardware. The key control is preventing organizational data from being accessible on devices that don’t meet minimum security requirements — unencrypted storage, outdated OS, no screen lock. MAM-level policies can enforce this specifically for managed apps without requiring full device enrollment.


The Practical Starting Point

If you’re assessing where to focus first, the sequence that delivers the most risk reduction per unit of effort is consistent across most environments:

  1. Complete an asset inventory — you cannot protect what you don’t know exists
  2. Implement MFA universally, with number-matching or FIDO2 where available
  3. Audit and reduce privileged access to the minimum required
  4. Verify that backups are immutable, offsite, and tested for recovery
  5. Configure sensitivity labels and DLP policies for your highest-value data
  6. Run one tabletop exercise against a ransomware scenario

None of these require new technology purchases. All of them require operational discipline. That’s the honest answer to what best practice for information security actually demands — not a product evaluation, but a commitment to executing fundamentals with rigor.

If your environment includes Microsoft 365, much of this infrastructure already exists and is waiting to be configured. The data security best practices guide for 2026 covers the M365-specific implementation path in more detail.

Need help with data security & protection?

Get a free assessment from our team — no commitment required.

Ready to Strengthen Your IT Strategy?

Get a free assessment from our team and discover how we can help your organization thrive.

Schedule Your Free Assessment
SM

Written by

Scott Midgley

CEO, Wellforce IT

Wellforce provides AI-forward managed IT services for SMBs and nonprofits in Washington DC and Raleigh NC.

Share this article