Recommended best practices there are an unlimited

This preview shows page 9 - 11 out of 14 pages.

Recommended Best Practices There are an unlimited number of things that can be done to protect cyber assets and data, but it should all be done in line with the level of the threat. Below is a list of some of the most effective measures that should be used in most technical environments today: Constantly Educate Users and Employees Utilize a Firewall Enforce Safe/Strict Password Policy Perform Regular Backups Use Multi-Factor Authentication Audit Privileged Access Constantly Educate Users and Employees Educating employees and users of acceptable use of company assets and expectations should be an ongoing training. A lot of times, people become complacent in performing the same duties over and over so it is easy to forget some of the most important security protocols. Adding this simple tool had potential to prevent several incidents. Utilize a Firewall A firewall is a guard between the network or computer you may be using and the internet, where all of the potential harm lies. The purpose of a firewall is to filter network traffic, based on a set of rules set up by the system administrator. These rules apply to both incoming and outgoing traffic. With the proper configurations, things like invalid remote connections, prevent downloads from unwanted websites, and blocking messages containing links to
CYBER SECURITY BRIEFING 10 unwanted content (Cawley, 2016). These are all valuable parts of an effective security program, and certainly something needed at CCS International. Enforce Safe/Strict Passwords The password policy should require a minimum of 8 characters, must include a least 1 capital and 1 lower case letter, and 1 special character. This policy should be enforced when users attempt to reset their passwords and can be done by group policy standards. Account lockout should also be enabled upon the third unsuccessful attempt to login. Perform Regular Backups Backups should be completed at normal intervals and verified. For critical systems, it should be considered to store them in another off-site location. Use Multi-Factor Authentication Password cracking has become more and more prominent in the coming years. Even with strong passwords, it is not impossible to guess; just slightly more difficult. For this reason, it is suggested to use multi-factor authentication. There are three factors in which one can be authenticated, something you know, something you have, and something you are. Multi- factor would include using at least 2 of those 3. For example, using a smart card, but requiring that a PIN that only you know be used in order to be authenticated. Audit Privileged Access As much as we would like to trust that our employees are doing the right thing all the time, it is important to verify that privileged users are not abusing their access. Conducting a monthly audit will not only help identify any misuse, but also show the employees that there is monitoring. This may deter any unauthorized activity they may have thought about doing.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture