Cybersecurity

Why cyber hygiene should be a top priority

As the world becomes more digital, the risk of cyber attacks on organizations is becoming increasingly high. Learn about the importance of cyber hygiene and three ways you can help protect your organization from cyberattacks.

Mathieu Chevalier
Principal Security Architect & Manager
 

Did you know that cybercrime is expected to cost the world $10,5 trillion annually by 2025? As the world becomes more digital, the risk of cyber attacks on organizations is becoming increasingly high.

Despite cybersecurity being a main concern for organizations, only 15% of businesses globally are ready to defend against cybersecurity threats.

One of their main concerns? Lack of cyber hygiene.

What is cyber hygiene, and why is it important?

Cybersecurity threats can cause significant financial losses, legal issues and damage an organization's reputation. This is where cyber hygiene comes into play.

Cyber hygiene refers to the practices and methods individuals and organizations employ to keep their digital systems and data healthy and secure. Just as we practice excellent personal hygiene to maintain our physical health, cyber hygiene is taking precautions to avoid cyber hazards, including malware, phishing, hacking, and data leaks.

Your physical security system is only as secure as the least trusted device connected to it—so be sure to have a thorough risk management strategy to secure it.

Maintaining the security and upkeep of your organization’s systems, devices, and procedures can be done in many ways. This includes encrypting corporate communications or purchasing cyber liability insurance, among other options. Let’s look at other ways you can help keep your organization safe. 

 
Get my cybersecurity checklist
 

  Prioritize consistent user education across your organization

According to Verizon's 2022 Data Breach Investigations Report, 83% of data breaches involved a human element, such as social engineering or phishing attacks. One of the most effective ways to protect your organization from cyber attacks is through consistent user education and teamwork.

Your employees should be aware of the importance of cybersecurity and training to protect sensitive data. This includes securing their devices, following IT department approvals, and keeping up with software and hardware best practices. It also includes: 

  • Implementing multi-factor authentication (MFA) - MFA adds an extra layer of security to the login process beyond just a username and password. Users must provide at least two forms of authentication to prove their identity, such as a password and a code sent to their phone or an authentication app. This makes it much harder for attackers to gain unauthorized access to an account, even if they somehow obtain the user's password. 

 
  • Enhancing your password management - Using strong passwords with many variations in characters, numbers, and symbols is another great way to ensure they don’t become compromised. Within Security Center, you can use our built-in password manager to automatically generate robust and randomized device passwords that comply with supported device manufacturers’ rules. You can also configure the system to automatically update your camera passwords on a schedule or in batches. 

 
  • Automating software and firmware updates - Automated health monitoring tools and software updates can save you time across maintenance tasks and protect your business. Ensuring your software and firmware are up-to-date is critical to remaining cyber resilient. That’s because product updates often include essential fixes that address new vulnerabilities. The Genetec Update Service informs you when new product updates are available so you can make sure to have the latest fixes to counteract any known vulnerabilities. Genetec customers who upgraded to Security Center 5.11 can also take advantage of the new Certificate Management feature, which simplifies the task of maintaining valid certificates so they can effortlessly keep their devices connected and running smoothly. 

 
  • Educating your employees about cyber hygiene – Education on cyber hygiene is an ongoing task that should begin during onboarding. Having a strong password, locking your devices, and being aware of socially engineered attacks are all very important for your organization. Following these best practices can reduce the chances of human error and keep your organization safer from potential security breaches.

 

  Learn how to detect suspicious communications

Social engineering attacks are getting increasingly complex and difficult to detect. It’s critical to be aware of the warning signs of suspicious behavior to mitigate risks. This may include requests for shared or user passwords, information related to contracts or finances, requests for personal information, strange or suspicious links and files, and ominous phone calls.

While mistakes happen, keeping an eye out for unusual communication requests is crucial. Thinking before you click on any links or messages is a good way to help protect your organization against cyber attacks. 

 
Watch our cybersecurity series for tips and tricks
 

  Have a supply chain risk management strategy

Your organization is not just at risk from cyber attacks aimed directly at it. It is also vulnerable to cyber attacks through its supply chain. Third-party suppliers and contractors can be vulnerable to attacks, and if they have access to your organization's systems, their weaknesses can threaten your organization. That’s why having a supply chain risk management strategy in place is crucial.

Over 82% of CIOs believe their software supply chains are vulnerable. Communicating and working closely with your partners and vendors is essential to understand their data and privacy protection policies. Your supply chain risk management strategy should include regular monitoring and testing of suppliers. Putting in place processes to verify vendor due diligence and contractual language that outlines the supplier's cybersecurity responsibilities will help protect your business. 

After all, the highest level of resilience against cyber threats isn’t achieved alone. It happens when everyone involved commits to upholding best practices.

You can establish this dialogue by asking your vendors and partners the following questions, which are discussed in detail on our Network of Trust page:

• How transparent are my vendors with vulnerabilities?

• Do my vendors prioritize security in the development of their products?

• Do they have a comprehensive strategy to close security gaps and vulnerabilities?

Asking these questions puts your organization in the best position to prevent and, in the worst case, respond to a cyber attack.

Maintaining your cybersecurity is an ongoing process

Remember that cybersecurity threats are constantly evolving, so it's essential to stay informed and be prepared to adapt your approach as necessary. It's critical to regularly check and update the ways you protect your video and access control systems to ensure long-term safety. This includes evaluating potential risks and making any necessary changes to your policies. You can also conduct regular penetration testing on your systems and strategies to identify opportunities for improvement.   

Maintaining strong cyber hygiene through supply chain risk management, secure exchanges, user education, and cyber liability insurance are key ways to protect your organization against evolving cyber threats.

 
Share
Mathieu Chevalier

Mathieu Chevalier, Principal Security Architect & Manager, Genetec Inc.

Related content

Putting AI to work for the security industry

Artificial Intelligence, machine learning, deep learning—what does it all mean for the security industry?

Why data protection and privacy matters
What you need to know about data privacy
How cyber threats can affect your organization

There are many ways cybercriminals can exploit networked computers and other devices to spread malicious software, disrupt computer systems or software, and steal data. The impacts and consequences of these online attacks can have real, and sometimes devastating, effects.