October 9, 2019

How Good Cyber Hygiene Can Reduce The Likelihood of a Breach

You’ve probably been hearing this phrase thrown around lately in the news as more and more breaches are coming to light. Maybe your company has warned you to practice good cyber hygiene at work and while working from home. Maybe every time you hear the phrase you nod but still don’t really know what this cyber hygiene business is all about. We’re here to help.

Let’s think about the hygiene we are use to. Like brushing our teeth or bathing, hygiene is made up of three parts: using the correct products and tools that fit your needs, performing tasks effectively, and establishing a routine.

What is cyber hygiene and how does it relate to your computer and computer habits? Cyber hygiene refers to the practices and steps that you should take to maintain system health and improve online security, which in turn keeps your data safe and well-protected. Establishing good cyber hygiene routines helps protect your system and data from outside attacks.

But why should you take the time to establish and routinely perform cyber hygiene practices? Two reasons: maintenance and security. Maintenance is why we go to the doctors for a yearly checkup. Routine maintenance allows us to spot issues early enough to fix them, and prevent serious issues from evolving. Maintained systems are thus healthier and less vulnerable to cybersecurity threats. Security is the other crucial piece of a cyber routine. While hackers are becoming more and more skilled at infiltrating your systems and data, preparing for and preventing these attacks becomes feasible when the proper security practices are in place.

Common cyber hygiene problems that can lead to a breach

Internet of Things (IoT)

If you start to think about all of the interconnected devices existing out their today, it is not surprising security teams find keeping up with the accurate extent of their networks challenging.

Use of Cloud Services

The introduction and use of the cloud has transformed the way companies and individuals store and share their data. While it has come with its set of advantages, we cannot overlook the new security threat challenges it also has introduced into our daily lives with so much data going into the cloud.

Employee Cyber Education

Employees are an organizations greatest resource…yet humans remain the weakest link when it comes to cyber-attacks. Phishing email attacks remain one of the most successful ways hackers target and gain entry into a system. As these emails get more advanced, it becomes increasingly difficult for employees, even those trained in IT, to discern between safe and malicious emails, links, and attachments. No matter a company’s size, investing in some sort of employee education is essential in increasing individual and company-wide cyber resiliency

Weak Passwords

No matter how many times we hear it, we still are using predictable, weak passwords. Conversely, when we use complex passwords either at home or professionally, another problem is introduced- where to store it. What happens when we create really effective difficult to crack passwords? We forget them. So how do we remember them? We write them down. Whether we store them on a Word doc or on a post it note next to our desk, unsafe locations make us more vulnerable to an attack.

Outdated Software

Outdated security software – even software that has gone a few months without an update – can’t protect the enterprise against the latest threats. Software applications must be updated regularly to ensuring that the latest security patches and most current versions are in use across the enterprise – for all applications. Antivirus software and other security software must be updated continuously to keep pace with the ever-changing threat landscape.

Best Practices

Organizations must focus on the critical assets to be protected by a cyber hygiene program. To do this effectively the organization must look at reducing risk by conducting hygiene that identifies, prioritizes, and responds to risk.

The first step in doing this of course is knowing what assets you actually have. Organizations should be able to identify its systems, services, products, vendors, etc. They must conduct analysis and feel comfortable with the risks associated with acquiring a new customer, launching a new product, utilizing new software etc.

While it is unrealistic to try to eliminate all risk, determining the biggest, most likely risks, focuses effort and improves efficiency. Cyber Innovative Technologies offers organizations of varying maturities cyber risk management solutions through the utilization of the digital asset approach. The result allows companies to see the whole picture of their organization and where their risk lies, in order to prioritize budget and make the necessary changes.

Whether you work at home for yourself or are the president of a large multinational, cyber hygiene is a must in order to protect your data, your clients, your company, and your reputation.

RELATED TOPICS