top of page
Writer's pictureHarisuthan

Basic Cyber Security Practices


Basic cyber security practices


In the world of cyber security many organizations are keep on investing millions of dollars to field of cyber security as per recent stats 3 - 6 percent of total IT budget has been allocated to cyber security team to protect their infrastructure.


But in-real following some basic security practices can save you from huge budget and protect you from various cyber attacks.


  1. Strong Password

  2. MFA

  3. Software Updates

  4. Antivirus & Antimalware's

  5. Data Back-up

Strong Password

Password are the key heart of security, Even there are tremendous revolution on the field of cyber security passwords cant be replaced with other technology, but it can be more vulnerable when the passwords length are low.


8 characters password

10 characters password

12 characters password

​Lower character

instantly

instantly

several weeks

Upper Character

Half an Hour

1 Month

5 Years

Numeric

​1 Hour

6 Years

2 thousand years

Symbols

1 Day

50 Years

63 thousand years

Requirement of strong password

  1. Do not re-use the password

  2. password length min 8 to max 12

  3. Avoid personal information [DOB, Pet name, etc.]

  4. Use combination of Letter + Number + Symbols

  5. Avoid common word [place, sports, etc.]

Multi Factor Authentication

MFA are adding additional layer of security, as per recent stats most passwords are easy to guess, 59 % of user using personal information [DOB, Pet name, etc.] and 41% of passwords has been shared with other.


MFA are the one and only solution to over come this ultimate chaos, it double verify the user identity to get authorize the users, MFA can be authenticated using multiple types

  1. Hardware OTP (one-time password) tokens.

  2. Standalone OTP mobile applications.

  3. Soft token Software Development Kits (SDKs)

  4. SMS-based OTPs.


Software Updates

Software updates are the primary way to fixing bug and providing security patches, many vulnerabilities are keep on discovering by many researches on many application, and the discover vulnerabilities are keep on patched by the application owner.


By keeping Up-to day patched will makes you device vulnerable free and adding additional feature, its not only used for patching vulnerabilities also used to adding additional feature


Anti-virus & Anti-malware

An mandatory application which prevent the host from being compromised, hence it act as an host based barrier to protect form virus and malware.


Antivirus keep on scanning the host to detect, protect and remove virus from the host.


Data Back-up

The process of creating an exact replication of system data, it been an life saver option if in case of any cyber attacks this backup data are used to restart the business without any interruptions.

Types of data backups

  • Full : Backup entire files every times

  • Differential : Combination of regular full back up + regular incremental backup

  • Incremental : Backup entire data initially and later only newly modified or created file are been backup again


109 views0 comments

Comments


bottom of page