How to maintain Digital hygiene?

How to maintain Digital hygiene?

Digital hygiene comprises a series of resources and recommendations to?protect people’s?digital identity?and the associated data. It is also aimed at preserving their health from the harmful effects of constant exposure to stimuli. In this article I will be talking about the former and in the next we will cover the latter.

Digital hygiene is also known as?cyber hygiene.

Best Practices for Cyber Hygiene:

While there are numerous threats and multiple vulnerabilities, creating a cyber hygiene routine isn’t as difficult as it may seem. A few?key practices?implemented regularly can dramatically improve the security of any system.

  1. Document All Current Equipment and Programs

All hardware, software, and online applications will need to be documented. Start by creating a list of these three components:

Hardware:?Computers connected devices (i.e. printers, fax machines), and mobile devices (i.e. smartphones, tablets).

Software:?All programs, used by everyone on a particular network, are installed directly onto computers.

Applications:?Web apps (i.e. Dropbox, Google Drive), applications on phones and tablets, and any other program that isn’t directly installed on devices.

2. Analyse the List of Equipements and Programs

After creating a comprehensive list of all cyber-facing components, you can begin to scrutinize the list and find vulnerabilities. Unused equipment should be wiped and disposed of properly. Software and apps that are not current should be updated and all user passwords should be changed. If the programs aren’t in regular use, they should be properly uninstalled. Certain software programs and apps should be chosen to be the dedicated choice for certain functions for all users. For instance, if both Google Drive and Dropbox are being used for file storage, one should be deemed primary and the other used as a backup or deleted.

3. Create A Common Cyber Hygiene Policy

The newly clarified network of devices and programs will need a common set of practices to maintain cyber hygiene. If there are multiple users, these practices should be documented into a set policy to be followed by all who have access to the network.?

Here are typical items that should be included in a cyber hygiene policy:

·????Password Changes: Complex passwords changed regularly can prevent many malicious activities and protect cyber security.

·?????Software Updates: Updating the software you use, or perhaps getting better versions should be a part of your regular hygienic review.

·?????Hardware Updates:?Older computers and smartphones may need to be updated to maintain performance and prevent issues.

·?????Manage New Installs:?Every new install should be done properly and documented to keep an updated inventory of all hardware and software.

·?????Limit Users:?Only those who need admin-level access to programs should have access. Other users should have limited capabilities.

·?????Back Up Data: All data should be backed up to a secondary source (i.e. hard drive, cloud storage). This will ensure its safety in the event of a?breach?or malfunction.

·?????Employ a Cyber?Security Framework: Businesses may want to review and implement a more advanced system (e.g. the NIST framework) to ensure security.

Once the policy is created, the routine for each item should be set to appropriate timeframes. For instance, changing passwords every 30 days or checking for updates at least once per week could be set in place. Doing so will ensure the continued cyber hygiene of your entire network of hardware and software.

Recommendations for protecting your devices

Any of your devices can become?an open door to malicious hacker attacks. Some precautions you can take are:

  1. Use appropriate protection tools?such as:

·???A network?firewall?– this prevents unauthorized users from accessing your websites, mail servers, and other sources of information that can be accessed from the internet.

·???Data-wiping software – whenever you introduce new software, add on hardware, or modify system files, there is a risk of losing personal data. Using data-wiping software enables you to clear out data you don't need and wipe it clean from the hard drive.

·???A?password manager?– using strong, complex passwords which you change regularly is an important aspect of internet hygiene. Using a password manager can help you to keep track of multiple passwords.

·???High-quality antivirus software – which schedules and performs automatic device scans, detects and removes malicious software, and protects you from a range of online threats and security breaches.

2. Using multi-factor authentication

·??????? All my essential accounts – such as email, social media, or banking apps – are protected with multi-factor authentication (MFA) using an app like Google Authenticator or Authy

·??????? I save MFA backup codes in my password manager

3. Backing up data regularly

I keep files secure and protect against data loss by backing up essential files offline, either on an external hard drive or in the cloud.

4. Keeping apps, software, and firmware up to date

·?? I update apps, web browsers, operating systems, and firmware regularly to make I'm using the latest versions, which have eliminated or patched possible security glitches

·?? Where possible, I have set up features to ensure automatic software updates

·???I delete apps I no longer use

·???I only download apps from reputable or official sources

5. Securing routers

·??????? I have changed the default name of my home Wi-Fi

·??????? I have changed my router’s username and password

·??????? I keep firmware up to date

·??????? I have disabled remote access, Universal Plug and Play, and Wi-Fi Protected Set-up

·??????? I have set up a separate network for guests to use

·??????? I have made sure that my router offers WPA2 or WPA3 encryption to protect the privacy of information sent via my network


Stay tuned and subscribe my newsletter for more such useful and privacy saver tips and info.

Gargi Gaur

Emerging Cybersecurity and AI Enthusiast with Google and Microsoft Certifications | 3rd Year Engineering Student | Content Writer| Graphic Designer

3 个月
回复

要查看或添加评论,请登录

Gargi Gaur的更多文章

  • Digital Arrest Explained

    Digital Arrest Explained

    What is a digital arrest scam? A digital arrest scam is an online scam that defrauds victims of their hard-earned…

  • Open guide to Incident Response Plan

    Open guide to Incident Response Plan

    Incident response (IR) in cybersecurity refers to the process of addressing and managing a security breach or…

    2 条评论
  • Password Management and Protection

    Password Management and Protection

    Password management refers to the process of securely creating, storing, and handling passwords for various digital…

    4 条评论
  • Risk Management Guide for Beginners

    Risk Management Guide for Beginners

    Cybersecurity has become a crucial concern for individuals and organizations alike as we move towards a more digital…

    3 条评论
  • Maintaining Digital hygiene Part2

    Maintaining Digital hygiene Part2

    Recommendations for safe browsing Take note of these tips to avoid falling into the trap of cybercriminals: · Do not…

    4 条评论
  • All about Penetration testing

    All about Penetration testing

    What is penetration testing? A penetration test, or "pen test," is a security test that launches a mock cyberattack to…

    2 条评论
  • What is Ethical Hacking?

    What is Ethical Hacking?

    Ethical hacking is the use of hacking techniques by friendly parties in an attempt to uncover, understand and fix…

    2 条评论
  • Are all hackers cyber criminals?

    Are all hackers cyber criminals?

    Hacker is an individual who uses his or her skills to achieve unauthorized access to systems or networks to commit…

    2 条评论
  • Watch out for these most common attacks!

    Watch out for these most common attacks!

    1. Malware Malware — or malicious software — is any program or code that is created with the intent to do harm to a…

  • Is Public Wi-Fi safe? All you need to know

    Is Public Wi-Fi safe? All you need to know

    Using free Wi-Fi is super convenient, allowing you to access online accounts, catch up on work, and check emails while…

    3 条评论

社区洞察

其他会员也浏览了