Intelligent CISO Issue 85 | Page 19

cyber

TRENDS
Cyberhygiene: Establishing secure habits and practices
Cyberhygiene refers to the practices and habits that users and organisations adopt to maintain the security of their digital environments. Passwords are typically the first line of defence against unauthorised access to systems, data and accounts. Attackers often obtain credentials due to password reuse or users inadvertently downloading infected software on corporate devices. In 2023, 10 % of intrusions began with evidence of stolen credentials, compared to 14 % observed in 2022 according to Mandiant’ s annual M-Trends report.
To combat these vulnerabilities, strong password management remains a critical component of cyberhygiene which is best achieved by implementing policies for strong, unique passwords combined with multi-factor authentication( MFA). It is equally beneficial to enforce strict access controls to ensure that only authorised personnel can access sensitive data and systems, and thereby reduce the risk of insider threats. Finally, regularly updating software and systems is crucial for protecting against known vulnerabilities. Outdated software can serve as an easy target to enter for attackers.
Offensive security and threat intelligence
The first pillar of a strong cybersecurity strategy is Offensive Security which focuses on a proactive approach to tackling vulnerabilities.
Organisations must implement advanced monitoring systems that can provide real-time insights into network traffic, user behaviour and system vulnerabilities. By establishing a comprehensive overview through visibility assessments, organisations can identify anomalies and potential threats before they escalate into full-blown attacks. This proactive approach allows security teams to respond swiftly, minimising the impact of any security incident.
These habits will help to reduce the likelihood of cyberattacks like brute force attacks, stolen credentials and phishing attempts. Key elements of cyberhygiene also include fostering cybersecurity awareness through user education and training employees to recognise phishing attempts, social engineering tactics and other threats to reduce the risk of successful attacks. Examples of training methods include phishing simulations, cyberawareness campaigns and safe Internet browsing demonstrations.
Data protection: Safeguarding the most valuable asset
Data is often regarded as the most valuable asset for any organisation. Effective data protection measures help organisations maintain the integrity and confidentiality of their information, even in the face of cyberthreats.
This includes implementing encryption for sensitive data, employing access controls to restrict unauthorised access and deploying data loss prevention( DLP) solutions. Regular backups – both on-site and in the cloud – are critical for ensuring
Sam Woodcock, Director of Cloud Strategy and Enablement at 11:11 Systems
WWW. INTELLIGENTCISO. COM 19