Monday 13 January 2020

TERM IN NEWS - CYBER HYGIENE

CYBER HYGIENE AND ITS USAGE


Cyber hygiene is often compared to personal hygiene. Much like an individual engages in certain personal hygiene practices to maintain good health and well-being, cyber hygiene practices can keep data safe and well-protected. In turn, this aids in maintaining properly functioning devices by protecting them from outside attacks, such as malware, which can hinder functionality. Cyber hygiene relates to the practices and precautions users take with the aim of keeping sensitive data organized, safe, and secure from theft and outside attacks.

DEFINITION OF CYBER HYGIENE

It is referred to the practice and steps that users of computers and other devices take to maintain system health and improve online security. These practices are often part of a routine to ensure the safety of identity and other details that could be stolen or corrupted. 
Much like physical hygiene, cyber hygiene is regularly conducted to ward off natural deterioration and common threats.

BENEFITS OF CYBER HYGIENE

Having a routine cyber hygiene procedure in place for your computers and software is beneficial for two distinct reasons – maintenance and security.
Maintenance is necessary for computers and software to run at peak efficiency. Files become fragmented and programs become outdated, increasing the risk of vulnerabilities. Routines that include maintenance are likely to spot many of these issues early and prevent serious issues from occurring. A system that is well-maintained is less likely to be vulnerable to cybersecurity risks.
Creating A Common Cyber Hygiene Policy(CHP)
The newly clarified network of devices and programs will need a common set of practices to maintain cyber hygiene. 
Here are typical items that should be included into a CHP:
● Password Changes: Complex passwords changed regularly can prevent many malicious activities and protect cyber security.
● Software Updates: Updating the software you use, or perhaps getting better versions should be a part of your regular hygienic review.
● Hardware Updates: Older computers and smartphones may need to be updated to maintain performance and prevent issues.
● Manage New Installs: Every new install should be done properly and documented to keep an updated inventory of all hardware and software.
● Limit Users: Only those who need admin-level access to programs should have access.
● Back Up Data: All data should be backed up to a secondary source (i.e. hard drive, cloud storage). This will ensure its safety in the event of a breach or malfunction.
● Employ a Cyber Security Framework: Businesses may want to review and implement a more advanced system to ensure security.
Once the policy is created, the routine for each item should be set to appropriate timeframes. For instance, changing passwords every 30 days or check for updates at least once per week could be set in place. Doing so will ensure the continued cyber hygiene of your entire network of hardware and software.
Developing comprehensive cyber hygiene procedures is a must for today’s enterprises. When carried out in conjunction with robust, enterprise-wide security practices, sound cyber hygiene practices aid in maintaining a sound security posture for modern organisations.

No comments:

Post a Comment