How to maintain Digital hygiene?
Gargi Gaur
Emerging Cybersecurity and AI Enthusiast with Google and Microsoft Certifications | 3rd Year Engineering Student | Content Writer| Graphic Designer
Digital hygiene comprises a series of resources and recommendations to?protect people’s?digital identity?and the associated data. It is also aimed at preserving their health from the harmful effects of constant exposure to stimuli. In this article I will be talking about the former and in the next we will cover the latter.
Digital hygiene is also known as?cyber hygiene.
Best Practices for Cyber Hygiene:
While there are numerous threats and multiple vulnerabilities, creating a cyber hygiene routine isn’t as difficult as it may seem. A few?key practices?implemented regularly can dramatically improve the security of any system.
All hardware, software, and online applications will need to be documented. Start by creating a list of these three components:
Hardware:?Computers connected devices (i.e. printers, fax machines), and mobile devices (i.e. smartphones, tablets).
Software:?All programs, used by everyone on a particular network, are installed directly onto computers.
Applications:?Web apps (i.e. Dropbox, Google Drive), applications on phones and tablets, and any other program that isn’t directly installed on devices.
2. Analyse the List of Equipements and Programs
After creating a comprehensive list of all cyber-facing components, you can begin to scrutinize the list and find vulnerabilities. Unused equipment should be wiped and disposed of properly. Software and apps that are not current should be updated and all user passwords should be changed. If the programs aren’t in regular use, they should be properly uninstalled. Certain software programs and apps should be chosen to be the dedicated choice for certain functions for all users. For instance, if both Google Drive and Dropbox are being used for file storage, one should be deemed primary and the other used as a backup or deleted.
3. Create A Common Cyber Hygiene Policy
The newly clarified network of devices and programs will need a common set of practices to maintain cyber hygiene. If there are multiple users, these practices should be documented into a set policy to be followed by all who have access to the network.?
Here are typical items that should be included in a cyber hygiene policy:
·????Password Changes: Complex passwords changed regularly can prevent many malicious activities and protect cyber security.
·?????Software Updates: Updating the software you use, or perhaps getting better versions should be a part of your regular hygienic review.
·?????Hardware Updates:?Older computers and smartphones may need to be updated to maintain performance and prevent issues.
·?????Manage New Installs:?Every new install should be done properly and documented to keep an updated inventory of all hardware and software.
·?????Limit Users:?Only those who need admin-level access to programs should have access. Other users should have limited capabilities.
·?????Back Up Data: All data should be backed up to a secondary source (i.e. hard drive, cloud storage). This will ensure its safety in the event of a?breach?or malfunction.
·?????Employ a Cyber?Security Framework: Businesses may want to review and implement a more advanced system (e.g. the NIST framework) to ensure security.
Once the policy is created, the routine for each item should be set to appropriate timeframes. For instance, changing passwords every 30 days or checking for updates at least once per week could be set in place. Doing so will ensure the continued cyber hygiene of your entire network of hardware and software.
Recommendations for protecting your devices
Any of your devices can become?an open door to malicious hacker attacks. Some precautions you can take are:
·???A network?firewall?– this prevents unauthorized users from accessing your websites, mail servers, and other sources of information that can be accessed from the internet.
领英推荐
·???Data-wiping software – whenever you introduce new software, add on hardware, or modify system files, there is a risk of losing personal data. Using data-wiping software enables you to clear out data you don't need and wipe it clean from the hard drive.
·???A?password manager?– using strong, complex passwords which you change regularly is an important aspect of internet hygiene. Using a password manager can help you to keep track of multiple passwords.
·???High-quality antivirus software – which schedules and performs automatic device scans, detects and removes malicious software, and protects you from a range of online threats and security breaches.
2. Using multi-factor authentication
·??????? All my essential accounts – such as email, social media, or banking apps – are protected with multi-factor authentication (MFA) using an app like Google Authenticator or Authy
·??????? I save MFA backup codes in my password manager
3. Backing up data regularly
I keep files secure and protect against data loss by backing up essential files offline, either on an external hard drive or in the cloud.
4. Keeping apps, software, and firmware up to date
·?? I update apps, web browsers, operating systems, and firmware regularly to make I'm using the latest versions, which have eliminated or patched possible security glitches
·?? Where possible, I have set up features to ensure automatic software updates
·???I delete apps I no longer use
·???I only download apps from reputable or official sources
5. Securing routers
·??????? I have changed the default name of my home Wi-Fi
·??????? I have changed my router’s username and password
·??????? I keep firmware up to date
·??????? I have disabled remote access, Universal Plug and Play, and Wi-Fi Protected Set-up
·??????? I have set up a separate network for guests to use
·??????? I have made sure that my router offers WPA2 or WPA3 encryption to protect the privacy of information sent via my network
Stay tuned and subscribe my newsletter for more such useful and privacy saver tips and info.
Emerging Cybersecurity and AI Enthusiast with Google and Microsoft Certifications | 3rd Year Engineering Student | Content Writer| Graphic Designer
3 个月Subscribe to my newsletter ???????? https://www.dhirubhai.net/newsletters/cybersphere-7214556828242780160