5 Top most Important Cyber Security Controls we can implement on daily basis.

Clear InfoSec
3 min readAug 26, 2019

--

Concepts that require attention and everyone should learn and implement on day to day basis.

5 Effective Cyber Security Controls that can be implemented in our day to day life — For more details about our Information Security services; Please visit our website

“Humans are the weakest link in security…!!!”

To avoid employee related incidents, every organizations need to train their employees with security awareness training program. But, by following few basic things on day to day bases one can prevent becoming a victim.

Few top most important cyber security related concepts are

Clean Desk Policy

1. Clean Desk Policy

“I have nothing to hide, because I haven’t done anything wrong”. Many people misinterpret this by not realizing that sticky notes, papers, printouts on a desk can give away sensitive information to thieving hands and prying eyes. Clean desk policy states when a person is away from the desk on break or on work during office hours all the critical information should be removed from desk and kept in safe place. By end of the day, employee must ensure all the papers, printouts are placed in locked drawers. Policy also talks about papers, notes, printouts on the desk must be related to current projects only all the time.

Secure Password

2. Secure Passwords

All a cybercriminal need is a weak password. The door to all our digital environment. All the employees must understand meeting the minimum requirements while choosing a password is very essential. Same passwords cannot be used for a longer time and the most important is not sharing the passwords with anyone or saving the password in a place which can be easily accessed.

Safe Internet Computing

3. Safe Internet Computing

Internet, there’s nothing possible for a tech to perform work without accessing internet. So, its very necessary for every organization to train their employees about safe internet habits in order to prevent attackers from penetrating into corporate network

Below is a list of some secure internet habits:

Ø Don’t open any malicious attachments

Ø Don’t click on any suspicious links

Ø Ensure all the software updates and patches are done on regular basis

Ø Disable pop-up windows, they invite risks

Ø Use USB drives following secure measures

Malware

4. Malware

All employees must be given knowledge about malware types and their implications. Every organization must understand that employees must be trained to identify the malware and if they system or network seems to be affected what should be the very next step of action to be performed and to whom should they report to.

The immediate step of action to be done when a person feels they system or network is affected is to turn off the system and report to the security team in their organization.

Social Networking

5. Social Networking

“Social Networking” today’s most powerful tool for building brand globally. But organizations must understand this term can lead to most dangerous attacks. Employees must be trained in do’s and don’ts while suffering the net.

Clear Infosec is information security subsidiary of Ana-Data Consulting inc. For more details on our information security services, please visit us on https://clearinfosec.com or call us on 1800–760–5656.

--

--

Clear InfoSec
Clear InfoSec

Written by Clear InfoSec

Clear InfoSec is the subsidiary of Ana-Data Consulting Inc. that provides Information Security Services to help organizations improve their security posture.

No responses yet