Account
Please wait, authorizing ...

Don't have an account? Register here today.

×

Four Best Practices for Ensuring Cyber Hygiene

Higiene cibernéticaInternational. With today's evolving digital world, the estimated global cost of cybercrime is expected to rise to $6 trillion by 2021. Cyber threats are only increasing and the harmful effects of cyber attacks are relentless. All it takes is a single insecure device with outdated firmware or a default password to allow an attacker to compromise a network.

Cyberattacks can lead to the loss of private data, fines and lawsuits, operational disruptions, and reputational damage. To mitigate these risks and ensure data remains protected, Convergint partnered with Genetec to provide four tips for ensuring cyber hygiene across organizations.

1. Apply IT best practices in your organization
- Change all default passwords and rotate them frequently.

- Think before clicking on a link or opening an attachment to avoid phishing scams. 53% of organizations confirmed at least one internal attack in the last 12 months.

- Publicidad -

- Keep information safe by locking devices when leaving the workstation.

- Export only relevant data and avoid capturing personal information when it is not necessary.

2. Hardness on your safety device
- Configure registry keys

- Implement custom group policy object

- Configure a Windows firewall and disable NetBIOS

- Check for Windows updates and keep it updated

- Force the selection of a custom password for the first login to the machine

- Publicidad -

- Implement endpoint protection, such as a machine learning antivirus

3. Implement multiple layers of cybersecurity and privacy
- Encryption

- Start by implementing encryption for data in transit and at rest. This is an essential capability that needs to be considered at multiple points in your systems.

Authentication authorization
Unauthorized access accounts for 32% of all data breaches. Make sure that certain information is available to authorized users, so that once they gain access to a system, their identity has been verified and they can only view and access a certain set of data or commands.

Privacy Protection
Make sure you have full control over your data and protect everyone's privacy when needed. Consider implementing privacy protection on the data collected, so that once someone gains access to the system, they cannot recognize the identity of other people unless they are allowed to.

4. Choose solutions you can trust from vendors you can trust
Partner with organizations that are mindful of security and data protection. Convergint partners with Genetec to provide customers with secure, audited and compliant security solutions. Genetec adheres to cybersecurity best practices and offers solutions that meet industry standards. Genetec holds multiple certifications including:

- Publicidad -

Certifications

  • UL 2900-2-3 Cybersecurity Readiness Certification
  • Cloud link CSPN ANSSI Synergis
  • DHS-Approved Security Center
  • ISMS ISO 27001
  • FBI CJIS Cloud Files
  • Microsoft Gold Cloud Platform
  • EuroPriSe Certified Privacy Protector
  • CPNI approved intrusion detector
  • Genetec Security Center, the unified security platform that combines IP security systems within a single, intuitive interface, also offers integrated connected services to help maintain network security and keep systems running at an optimal level.

Connected services available in Security Center:
Service Availability Monitor (SAM) monitors the status of system components and sends event alerts as disconnected devices

Genetec Update Service (GUS) reports when new product updates are available to provide the latest fixes and counter known vulnerabilities.

Status dashboards and the security score widget monitor the security and health of local systems in real time.

Duván Chaverra Agudelo
Author: Duván Chaverra Agudelo
Jefe Editorial en Latin Press, Inc,.
Comunicador Social y Periodista con experiencia de más de 16 años en medios de comunicación. Apasionado por la tecnología y por esta industria. [email protected]

No thoughts on “Four Best Practices for Ensuring Cyber Hygiene”

• If you're already registered, please log in first. Your email will not be published.

Leave your comment

In reply to Some User
Suscribase Gratis
SUBSCRIBE TO OUR ENGLISH NEWSLETTER
DO YOU NEED A SERVICE OR PRODUCT QUOTE?
LATEST INTERVIEWS

Webinar: NxWitness el VMS rápido fácil y ultra ligero

Webinar: Por qué elegir productos con certificaciones de calidad

Por: Eduardo Cortés Coronado, Representante Comercial - SECO-LARM USA INC La importancia de utilizar productos certificados por varias normas internacionales como UL , Ul294, CE , Rosh , Noms, hacen a tus instalciones mas seguras y confiables además de ser un herramienta más de venta que garantice nuestro trabajo, conociendo qué es lo que certifica cada norma para así dormir tranquilos sabiendo que van a durar muchos años con muy bajo mantenimiento. https://www.ventasdeseguridad.com/2...

Webinar: Anviz ONE - Solución integral para pymes

Por: Rogelio Stelzer, Gerente comercial LATAM - Anviz Presentación de la nueva plataforma Anviz ONE, en donde se integran todas nuestras soluciones de control de acceso y asistencia, video seguridad, cerraduras inteligentes y otros sensores. En Anviz ONE el usuario podrá personalizar las opciones según su necesidad, de forma sencilla y desde cualquier sitio que tenga internet. https://www.ventasdeseguridad.com/2...

Webinar: Aplicaciones del IoT y digitalización en la industria logística

Se presentarán los siguientes temas: • Aplicaciones del IoT y digitalización en la industria logística. • Claves para decidir el socio en telecomunicaciones. • La última milla. • Nuevas estrategias de logística y seguimiento de activos sostenibles https://www.ventasdeseguridad.com/2...

Sesión 5: Milestone, Plataforma Abierta que Potencializa sus Instalaciones Manteniéndolas Protegidas

Genaro Sanchez, Channel Business Manager - MILESTONE https://www.ventasdeseguridad.com/2...
Load more...
SITE SPONSORS










LATEST NEWSLETTER
Latest Newsletter