0% found this document useful (0 votes)
13 views14 pages

TGCSB PPT 3 Final

Uploaded by

jrameshwmq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views14 pages

TGCSB PPT 3 Final

Uploaded by

jrameshwmq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

CYBER HYGIENE

Table Of Contents

Monitoring backups
Is the most Valuable or Sensitive data encrypted
Using of VPN
Use Organization- Owned Secure Portable Media Only
(Pend rives-HDDS)
Secured Files Sharing
Updating Hardware to maintain performance and prevent
problem
Hardware, data base, and service or connected to a secure
network
Monitoring backups
Monitoring backups ensures that critical data can be restored if lost
due to a system failure, cyberattack, or accidental deletion.

 What if Not Implemented


1. Risk of permanent data loss, causing operational disruptions.
2. Potential downtime if data cannot be quickly restored.
3. Increased recovery costs without reliable, accessible backups.
4. Difficulty meeting compliance requirements for data retention.
Is the most Valuable or
Sensitive data encrypted
Encrypting valuable or sensitive data protects it from unauthorized access
and ensures confidentiality during storage and transmission.
What if Not Implemented?
1. Increased vulnerability to data breaches, leading to exposure of sensitive
information.
2. Higher risk of data theft, which can lead to regulatory penalties.
3. Greater possibility of data leaks during transfers or storage.
4. Damage to the organization’s reputation if confidential data is accessed.
 Right Click on Folder Properties Advanced Encrypt contents
ok Advanced Attributes Apply
Using of VPN

Using a Virtual Private Network (VPN) secures internet


connections, especially on public networks, protecting data from
interception.
What if Not Implemented?
1. Higher risk of data interception on unsecured networks.
2. Potential for unauthorized access to sensitive
communications.
3. Exposure to man-in-the-middle attacks, compromising data
integrity.
4. Increased vulnerability to network-based cyber threats.
Suggested Countermeasures:
1. Require VPN use for remote and public network access.
2. Use a reliable, organization-approved VPN service with
strong encryption.
3. Educate employees on safe VPN usage practices.
4. Regularly update VPN software to patch any
vulnerabilities.
Use Organization- Owned Secure
Portable Media Only (Pend rives-
HDDS)
Limiting data storage to organization-owned, secure portable media
(such as encrypted USB drives and HDDs) prevents unauthorized
access and malware spread.
What if Not Implemented?
1. Increased risk of malware infection from unverified devices.
2. Greater likelihood of sensitive data leakage from unsecured media.
3. Potential data breaches if devices are lost or stolen.
4. Non-compliance with data protection regulations if unauthorized
devices are used.
Process for Encrypting a Pendrive:
1. To encrypt a USB drive, you can follow these steps: Plug your flash
drive into a USB port.
2. On Windows, right-click the drive and select BitLocker, then turn
BitLocker on.
3. On macOS, right-click the USB drive and click on "Encrypt ", then
enter a strong password.
4. Alternatively, you can use third party encryption software or buy a
hardware encrypted USB drive
Secured Files Sharing
Using secure methods for file sharing protects data during collaboration,
ensuring that sensitive information isn’t accessed or altered by
unauthorized parties.
What if Not Implemented:
1. Increased risk of data breaches from insecure sharing channels.
2. Potential data corruption or unauthorized changes during transfer.
3. Higher chance of sensitive information exposure to third parties.

4. Process: Right click on folder properties sharing Advanced


sharingEveryoneEdit permissios(Read/Write) as per your
requirementOk
5. This shared folder can be visible to all your network peers within your
network..
Updating Hardware to Maintain
Performance and Prevent Problems

Regularly updating hardware ensures optimal system performance,


prevents unexpected failures, and reduces the likelihood of security
vulnerabilities in outdated equipment.
What if Not Implemented:
1. Increased risk of system slowdowns, reducing productivity.
2. Higher likelihood of hardware failure, leading to potential downtime.
3. Exposure to security vulnerabilities in outdated hardware
components.
4. Additional maintenance costs from frequent breakdowns and repairs.
Hardware, Database, and Services
Connected to a Secure Network
Connecting all critical infrastructure, including hardware, databases,
and services, to a secure network protects them from unauthorized
access and cyber threats.
What if Not Implemented?
1. Higher risk of unauthorized access to sensitive data and services.
2. Potential for data breaches or data loss from unsecured connections.
3. Increased vulnerability to malware and network attacks.
4. Compromised system integrity, affecting overall security posture.

You might also like