1. Endpoint Security
Endpoint Security is a pretty broad term so let’s clarify.
2. STRONG AUTHENTICATION
https://blog.fleetsmith.com/password-security-guide/
3. DATA PROTECTION
4. PATCH MANAGEMENT
5. LEAST PRIVILEGE
6. BACKUP
7. SUPPLY CHAIN SECURITY
Having the most secure environment in the world is useless if your suppliers have no controls and you have your or your customer data stored with them. Hold your suppliers accountable for your data as if it was on your own onsite servers. The big Cloud vendors have whole sections of their portals dedicated to all of regulations they are compliant to – PCI DSS, ISO 27001, HPIAA – the list goes on an on.
8. CYBER INSURANCE / CYBER AWARENESS TRAINING
References / Guides
BSI Future Learning series - In this first episode, we’re diving into the realm of cybersecurity— Join Simon Dewar from BSI Digital Learning and Kala Philip (MAICD, GAICD) from BSI Learning and the incredibly knowledgeable Damien Cantelo from Apollo Secure, who has worked closely with enterprises of all sizes to understand the cyber-threat landscape and guide them to ensure their systems, processes and, most importantly, people are cyber-ready.
Australian sanctions Russian man over Cybersecurity attack
Cybersecurity - get qualified - build cyber governance skills
Spotlight on cyber By AsIC
So, how can we adequately address the issue of human error in cyber security? Here are three key strategies based on the latest research.
ReplyDeleteMinimise cognitive load. Cyber security practices should be designed to be as intuitive and effortless as possible. Training programs should focus on simplifying complex concepts and integrating security practices seamlessly into daily workflows.
Foster a positive cyber security attitude. Instead of relying on fear tactics, education should emphasise the positive outcomes of good cyber security practices. This approach can help motivate people to improve their cyber security behaviours.
Adopt a long-term perspective. Changing attitudes and behaviours is not a single event but a continuous process. Cyber security education should be ongoing, with regular updates to address evolving threats.
Ultimately, creating a truly secure digital environment requires a holistic approach. It needs to combine robust technology, sound policies, and, most importantly, ensuring people are well-educated and security conscious.
If we can better understand what’s behind human error, we can design more effective training programs and security practices that work with, rather than against, human nature.
A greater emphasis is needed on human-centered approaches to cybersecurity where people’s needs, motivations, behaviours, and abilities are at the forefront of determining the design, operation, and security of information technology systems.
ReplyDeleteyou might click on a link in an email from an unknown contact, even if you don’t know what will happen. This could lead to you being hacked and losing your money and data, as the link might contain dangerous malware.
ReplyDelete