IBM Security Global Forum

 View Only

What Is Cyber Hygiene?

By Noureldin Ehab posted Wed September 08, 2021 08:19 AM

  

cyber hygiene
Cyber Hygiene

What is Cyber Hygiene

Cyber hygiene (Also known as cybersecurity hygiene) are the fundamental best practices that an organization's security practitioners and users can undertake, Cyber hygiene is about training yourself to think proactively about your cyber security — as you do with your daily personal hygiene — to resist cyber threats and online security issues. Unfortunately, cyber security still isn’t taken as seriously as cavities and root canals. Some people take cyber security for granted, but this may change, as cyber threats continue to evolve. In the meantime, establishing solid cyber hygiene practices should be as routine as brushing your teeth.


Those are 9 habits for a healthy hygiene

(Those habits are according to a famous antivirus company)


Habit 1: Install reputable antivirus and malware software

Habit 2: Use network firewalls

Habit 3: Update software regularly

Habit 4: Set strong passwords

Habit 5: Use multi-factor authentication

Habit 6: Employ device encryption

Habit 7: Back up regularly

Habit 8: Keep your hard drive clean

Habit 9: Secure your router

These habits might sound like common sense but here we are in the 21 century and people, companies, and governments ignore these basic implementations. Usually, people, companies, Governments avoid caring about their cyber security for financial reasons, but I don't think it is about money it is about the mindset because as you might notice most of those habits literally cost nothing

Case Study

I think one of the best ways to implement cybersecurity hygiene for businesses is by using IBM ZERO TRUST services, you might ask what is a zero-trust approach?
Zero Trust is a strategic initiative that helps prevent successful data breaches by eliminating the concept of trust from an organization's network architecture, Zero Trust is not about making a system trusted, but instead about eliminating trust.

Here is an example: 



This blog was inspired by @Hamid Karbasiafshar discussions
1 comment
53 views

Permalink

Comments

Wed September 08, 2021 12:47 PM

Great article!

Vicente G.