Bookkeeping Service Providers

  • Accounting
  • Bookkeeping
  • US Taxation
  • Financial Planning
  • Accounting Software
  • Small Business Finance
You are here: Home / SECURITY / cyber hygiene

cyber hygiene

April 29, 2021 by cbn Leave a Comment

What is cyber hygiene?

Cyber hygiene (or cybersecurity hygiene) is a cybersecurity practice that maintains the basic health and security of hardware and software. Cyber hygiene is a joint precautionary measure performed by an organization’s security practitioner, computer system administrator and users to help protect from attacks. The basic practice aids in maintaining and protecting already properly functioning devices, ensuring they are protected from threats such as malware.

Cyber hygiene aims to keep any sensitive data organized and secure it from theft or attacks. The concept works similarly to personal hygiene, where an individual maintains their health by taking precautionary measures that would help ensure their health. If an individual neglects their health, they might catch a cold. If an organization neglects cyber hygiene, then it could lead to a virus and data breach.

In order to know what is on an organization’s network and how it’s associated with risk, an organization needs to develop a cyber resilience plan that can evaluate their cyber hygiene.

Why is cyber hygiene important?

Creating a routine around cyber hygiene helps ensure a system’s health by enabling practices that continually help prevent cybercriminals from causing security breaches, installing malware or stealing personal information. Having proper cyber hygiene also ensures better incident response if a successful attack occurs.

Organizations that rely on only cybersecurity professionals to protect their network and devices ignore the role an individual employee or the end user can have in ensuring security. If employees and end users understand basic cyber hygiene practices, they can play a larger role in protecting and maintaining their devices and networks.

Cyber hygiene checklist
Follow this checklist for good cyber hygiene.

Cyber hygiene best practices

To have good cyber hygiene, an organization must have a set of practices and workflows to follow regarding cybersecurity. Some best practices to follow regarding cyber hygiene include:

  • Create a cyber hygiene policy. Creating a common set of practices to maintain cyber hygiene will make it easier to maintain hardware and software.
  • Document all equipment, hardware and software. Create a list of hardware, software and web applications used. Manage any newer installs, so they are kept track of and updated when needed.
  • Inspect the list to find unused or outdated software and hardware that could have vulnerabilities. Uninstall outdated and unused hardware and software.
  • Update all software or hardware that have updates available.
  • Ensure antivirus and antimalware software is properly installed and configured.
  • Ensure proper password management.
  • Limit those who have administrative access to the network.
  • Make sure routers and firewalls are properly set up and configured.
  • Use two-factor authentication (2FA) or multifactor authentication (MFA).
  • Physically segment computer networks.
  • Have an on-call list of workers who can respond to security events.
  • Keep up to date on cyber hygiene best practices.

Tips to maintain effective cyber hygiene

Ensure secure authentication and access. When employees work from various locations, they must secure access to their duties while excluding outsider access from others. This process involves working with existing authentication services to increase control. Multifactor authentication and digital certificates are great places to start and strengthen network security.

Build an extensive governance policy. A comprehensive governance policy should incorporate endpoint protection and prevent cybercriminals from accessing a system. Governance policies should evolve whenever issues arise. This can include, for example, using existing connectivity through a VPN connection and setting up policy-based cloud controls — a process that creates segmentation and network isolation. This is an important aspect of proper cyber hygiene.

Enhance logging. Know who has accessed what and why. IT departments should know how closely they track activities. This is critical to be able to retrace any steps if a breach occurs. One way to fix this is to maintain a detailed log of every action with logging tools. When using logging tools, watch for authentication, authorization, events, access points, network flow, security detections and any other data points so employees can evaluate them appropriately. Another aspect of logging is to set alerts for these items.

Verify endpoint protections. Use and improve standard endpoint controls. This is especially important for Windows-based systems. Test the backup recovery of files and data to help ensure successful recovery in the event of a crisis.

Other tips for maintaining good cyber hygiene are:

  • Determine a baseline to evaluate business risks.
  • Keep an inventory of the organization’s hardware and software.
  • Encourage good password management with complex passwords.
  • Regularly back up data.
  • Identify any vulnerable applications.
  • Establish an incident response plan.
  • Implement controls to protect and recover data.
  • Conduct threat and vulnerability monitoring.
  • Make sure any security software used is trustworthy and kept updated.
  • Make cyber hygiene practices a common part of a worker’s routine.

Benefits of cyber hygiene

The two biggest benefits to cyber hygiene are in both security and maintenance. Some general benefits include:

  • Security — The security cyber hygiene adds can help prevent hackers from installing malware and viruses from accessing an organization’s data.
  • Maintenance — Starting a cyber hygiene routine allows users and cybersecurity experts to find outdated software, outdated administrative privileges or fragmented Well-maintained systems are less likely to become vulnerable to threats.
  • Routine cyber hygiene procedures — Having procedures in place helps in enabling hardware and software to run efficiently while being less vulnerable. Applying a routine to maintenance and security practices helps make the maintenance and security practices more secure.

Other benefits are:

  • Better protected customer data.
  • Increased chances of identifying unauthorized software in a system or device.
  • Increased chances of finding previously unmanaged assets.
  • Running checks for compliance audits more easily.

Challenges of cyber hygiene

Common challenges with cyber hygiene are:

  • Loss of data — if mismanaged, data that is not backed up can be lost or misplaced.
  • Lack of vendor risk management — An organization’s data can still be at risk if a third-party vendor is holding it.
  • Outdated security software — can become vulnerable if left alone. Security patches should always be applied to avoid software breaches.

Poorly managed cybersecurity practices — Poor network security or lacking configuration management can lead to security breaches.

Share on FacebookShare on TwitterShare on Google+Share on LinkedinShare on Pinterest

Filed Under: SECURITY

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • May 2021
  • April 2021
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • March 2016

Recent Posts

  • How Azure Cobalt 100 VMs are powering real-world solutions, delivering performance and efficiency results
  • FabCon Vienna: Build data-rich agents on an enterprise-ready foundation
  • Agent Factory: Connecting agents, apps, and data with new open standards like MCP and A2A
  • Azure mandatory multifactor authentication: Phase 2 starting in October 2025
  • Microsoft Cost Management updates—July & August 2025

Recent Comments

    Categories

    • Accounting
    • Accounting Software
    • BlockChain
    • Bookkeeping
    • CLOUD
    • Data Center
    • Financial Planning
    • IOT
    • Machine Learning & AI
    • SECURITY
    • Uncategorized
    • US Taxation

    Categories

    • Accounting (145)
    • Accounting Software (27)
    • BlockChain (18)
    • Bookkeeping (205)
    • CLOUD (1,322)
    • Data Center (214)
    • Financial Planning (345)
    • IOT (260)
    • Machine Learning & AI (41)
    • SECURITY (620)
    • Uncategorized (1,284)
    • US Taxation (17)

    Subscribe Our Newsletter

     Subscribing I accept the privacy rules of this site

    Copyright © 2025 · News Pro Theme on Genesis Framework · WordPress · Log in