exida would like to welcome our new director of cybersecurity services Dave Gunter. Dave will be taking us through a multi part blog series based on general cybersecurity evolving into how it pertains to your industrial work environment and what you should do to protect your company and its assets from cyber criminals.
Let's Get Started
In a manner of speaking, cyber hygiene is an individual’s base behavior when it comes to handling, managing, operating, and maintaining today's computing devices and software. The term computing devices is a broad term, however in pragmatic terms, it can viewed to represent computers, tablets, phones as well as boundary devices used to connect to the internet.
Ask yourself the following simple questions to reflect on your cyber hygiene:
- Do you change passwords monthly?
- Do you continually try to down size your social media foot print?
- Do you make routine backups to storage typically unconnected when not performing backup?
- Do you close unused email accounts?
- Do you keep your devices updated?
- Do you physically destroy old computers, phones and tablets when they are retired?
- Do you check your malware prevention to ensure the tables are up-to-date?
- Do you allow close family members to use your devices?
- Do you use work devices for personal emails or personal devices for work emails?
The point is, we could ask another 50 questions, but the takeaway is that cyber hygiene is being aware, staying vigilant, understanding that your digital foot print is everywhere and if not managed, it can have consequences professionally and personally. Think of it like “defensive driving”, if you don’t watch out for the other guy you can be involved in an accident through no fault of your own.