Call: 1300 422 542

What is Cyber Hygiene?

First, let’s begin with the definition of hygiene.

All of us know about hygiene, what it is and so on. Google defines hygiene as, “conditions or practices conducive to maintaining health and preventing disease, especially through cleanliness.”

Now if we look at the Wikipedia definition it says: hygiene “is a series of practices performed to preserve health. According to WHO, Hygiene refers to conditions and practices that help to maintain health and prevent the spread of diseases”

All it is good and clear, but you may be asking yourself, what about Cyber Hygiene?


Definition of Cyber Hygiene

Cyber Hygiene should be maintained not only for individuals but also for organizations. For instance, some individuals/companies are hacked due to poor controls in certain areas such as patch, password and device management.

This is not new, it is not like this has never happened before, but the difference now is that this was not as much of an issue in the past because computers were not connected to the internet, and hacking techniques were not as advanced as they are today. Therefore, having a bad password while the computer was not connected to the Internet was not as big of a security risk as it is today.

Today there are still small, medium and big companies which do not know what they have. This means they may not know which computers are connected to their network and to the Internet. So how do you fix something that you don’t know you have? Or if it is even connected to your network?

Asset Inventory for Security

For that reason, you need a proper and accurate “Asset Inventory.” This is not limited to an inventory of which hardware is connected to the network but also what software are deployed.

Remember, visibility is your friend when it comes to security. If you don’t know what you don’t know….. then you have a problem. Once you know what you have, the next step is to set up some controls around that….. but first step first…

Let’s just take baby steps here. First, go and find all of the devices that are connected to your network. We will discuss later what to do with them, but for now begin creating your inventory.

More to come soon…

And as always, be safe out there until the next Malware Monday.

Share This Post
Subscribe To Our Newsletter
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

More To Explore

In The Media

2 Great Companies Come Together

A sign of further consolidation in the Australian ICT channel as Brisbane’s Azentro buys Adelaide’s Calibre One. The enlarged group, with combined sales of $A35m

Read More »

Find out what our team can do for your business.

Let us know how we can help

Contact Us
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.