In the world of cyber security many organizations are keep on investing millions of dollars to field of cyber security as per recent stats 3 - 6 percent of total IT budget has been allocated to cyber security team to protect their infrastructure.
But in-real following some basic security practices can save you from huge budget and protect you from various cyber attacks.
Strong Password
MFA
Software Updates
Antivirus & Antimalware's
Data Back-up
Strong Password
Password are the key heart of security, Even there are tremendous revolution on the field of cyber security passwords cant be replaced with other technology, but it can be more vulnerable when the passwords length are low.
8 characters password | 10 characters password | 12 characters password | |
Lower character | instantly | instantly | several weeks |
Upper Character | Half an Hour | 1 Month | 5 Years |
Numeric | 1 Hour | 6 Years | 2 thousand years |
Symbols | 1 Day | 50 Years | 63 thousand years |
Requirement of strong password
Do not re-use the password
password length min 8 to max 12
Avoid personal information [DOB, Pet name, etc.]
Use combination of Letter + Number + Symbols
Avoid common word [place, sports, etc.]
Multi Factor Authentication
MFA are adding additional layer of security, as per recent stats most passwords are easy to guess, 59 % of user using personal information [DOB, Pet name, etc.] and 41% of passwords has been shared with other.
MFA are the one and only solution to over come this ultimate chaos, it double verify the user identity to get authorize the users, MFA can be authenticated using multiple types
Hardware OTP (one-time password) tokens.
Standalone OTP mobile applications.
Soft token Software Development Kits (SDKs)
SMS-based OTPs.
Software Updates
Software updates are the primary way to fixing bug and providing security patches, many vulnerabilities are keep on discovering by many researches on many application, and the discover vulnerabilities are keep on patched by the application owner.
By keeping Up-to day patched will makes you device vulnerable free and adding additional feature, its not only used for patching vulnerabilities also used to adding additional feature
Anti-virus & Anti-malware
An mandatory application which prevent the host from being compromised, hence it act as an host based barrier to protect form virus and malware.
Antivirus keep on scanning the host to detect, protect and remove virus from the host.
Data Back-up
The process of creating an exact replication of system data, it been an life saver option if in case of any cyber attacks this backup data are used to restart the business without any interruptions.
Types of data backups
Full : Backup entire files every times
Differential : Combination of regular full back up + regular incremental backup
Incremental : Backup entire data initially and later only newly modified or created file are been backup again
Comments