Basic Security Practices in Day-to-day IT World
Cyberspace is particularly difficult to secure due to a number of factors: the ability of malicious actors to operate from anywhere in the world, the linkages between cyberspace and physical systems, and the difficulty of reducing vulnerabilities and consequences in complex cyber networks. Implementing safe cybersecurity best practices is important for individuals as well as organizations of all sizes. Using strong passwords, updating your software, thinking before you click on suspicious links, and turning on multi-factor authentication are the basics of what we call “cyber hygiene” and will drastically improve your online safety. These cybersecurity basics apply to both individuals and organizations. For both government and private entities, developing and implementing tailored cybersecurity plans and processes is key to protecting and maintaining business operations. As information technology becomes increasingly integrated with all aspects of our society, there is increased risk for wide scale or high-consequence events that could cause harm or disrupt services upon which our economy and the daily lives of millions of depend.
All organizations—regardless of size—need to adopt a heightened posture when it comes to cybersecurity and protecting their most critical assets. Sophisticated cyber actors and nation-states exploit vulnerabilities to steal information and money and are developing capabilities to disrupt, destroy, or threaten the delivery of essential services. Implementing organizational cybersecurity best practices requires coordination across the organization from leadership to IT to communications and human resources. From governance to updating technology, cybersecurity requires a holistic approach that often starts with leadership directive. Protecting the cyber space is an essential aspect of business operations and must be integrated at all levels.
Course Objectives:
- Start With Security – Limit Scope.
- Train Employees on Security.
- Inventory Devices and Eliminate Exposure to External Networks.
- Encrypt Sensitive Data.
- Use Secure Remote Access Methods.
- Strong, Non-Default Passwords
- Enact the Principle of Least Privilege.