Cyber Hygiene Framework

We have been working with CIS Controls framework since 2020 starting with an assessment of our own organization. Equipped with our experience and knowledge of this framework, we have applied our purpose of Simplifying Lives and incorporated the Essential 56 IG1 Safeguards into the following simple and relatable cyber and personal hygiene categories.

Compliance with the Essentials protects you from 80% of the most common attack methods of bad actors.

 

11 Essential Hygiene Categories

Much like working out, washing your hands, or eating healthy foods regularly to keep healthy and strong, implementing security practices makes organizations stronger and more resilient against potential cyber threats.

 

Passwords and Toothbrushes

Passwords

Passwords shouldn’t be shared, reused or left exposed. They are personal and if shared, can lead to cyber vulnerabilities.

Personal Hygiene

You wouldn’t share your toothbrush with others due to the germs and potential for illness. You also don’t use the same toothbrush forever…

Security Practices and Physical Exercise

Security Practices and Physical Exercise

Adopting and maintaining regular cybersecurity practices, such as updating systems, reviewing logs, or running vulnerability scans, strengthens the security posture of an organization, making it more resilient against potential cyber threats.

Personal Hygiene

Engaging in regular physical exercise strengthens the body, increases stamina, and boosts overall health, helping to ward off many diseases.

Software Updating and Hand Washing

Software Updating and Hand Washing

Regularly updating software ensures that known vulnerabilities are patched, preventing cyber infections.

Personal Hygiene

Regularly washing your hands can help prevent the spread of diseases.

Antivirus and Hand Sanitizers

Antivirus and Hand Sanitizers

Antivirus & EDR (Endpoint Detection & Response) programs detect and neutralize threats, providing a secondary layer of defense when other measures might fail.

Personal Hygiene

Hand sanitizers kill bacteria and viruses when soap and water aren’t available.

Phishing and Junk Food

Phishing and Junk Food

One should be wary of web popups & phishing emails that look legitimate but can harm our digital environment.

Personal Hygiene

Just like we avoid junk food which might seem tempting but is bad for health.

Multifactor Authentication and Protective Gear

Multifactor Authentication and Protective Gear

Multifactor authentication is an extra layer of protection, ensuring that even if a password is compromised, there’s another barrier in place.

Personal Hygiene

When doing risky tasks, we wear protective gear like helmets and pads.

Firewalls and Masks

Firewalls and Masks

Firewalls act as barriers, preventing harmful data or unauthorized users from entering a network.

Personal Hygiene

Wearing a mask can filter out harmful particles and protect from airborne diseases.

Regular Check-ups

Regular Check-ups

Regularly auditing and assessing IT environments can identify vulnerabilities before they are exploited.

Personal Hygiene

Regular health check-ups catch potential issues early, ensuring they don’t develop into more serious conditions.

Backups and Vaccinations

Backups and Vaccinations

Backing up data prepares companies to restore information if a cyberattack or data loss occurs.

Personal Hygiene

Vaccinations prepare your immune system to fight off diseases.

Employee Training and Personal Health Education

Employee Training and Personal Health Education

Regularly training employees about cyber threats and how to recognize and avoid them ensures they don’t accidentally compromise security.

Personal Hygiene

Educating individuals about health risks and how to maintain good health can prevent illnesses.

Emergency Responses and First Aid Kits

Emergency Responses and First Aid Kits

Organizations prepare with incident response strategies, equipped with tools and protocols, to quickly address and learn from cyber incidents.

Personal Hygiene

Individuals keep first aid kits and emergency plans ready for unexpected physical mishaps, ensuring rapid response to injuries or threats.

Pen Testing and Blood Work

Pen Testing and Blood Work

While not classified as an Essential Control in the framework, penetration testing can uncover hidden vulnerabilities within an organization’s systems, networks, and applications.

Personal Hygiene

Blood work can identify internal health issues that aren’t always visible from the outside.

Check Out Our Cyber Hygiene Tip Videos