{"id":6450,"date":"2020-07-28T23:16:32","date_gmt":"2020-07-28T22:16:32","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6450"},"modified":"2021-04-09T23:18:51","modified_gmt":"2021-04-09T22:18:51","slug":"dont-forget-cyberhygiene-1-of-2","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/dont-forget-cyberhygiene-1-of-2","title":{"rendered":"Don\u2019t Forget Cyberhygiene, Part 1 of 2: 5 Tips for Staying Safe"},"content":{"rendered":"<p>Cyberattacks are ever present, but the confusion surrounding times of uncertainty can cause people to let their guards down. This can not only increase overall cybercrime activity, but can also lead to an increase in successful attacks. And once successful, cybercriminals could easily sit on a business\u2019s network for months without being detected.<\/p>\n<p>This in mind, it\u2019s important to make sure you\u2019re covering your bases. Especially in times of crisis, it\u2019s important to check that you\u2019re keeping up with the fundamentals of cyberhygiene.<\/p>\n<p>Today, we\u2019re going to go back to the fundamentals. We\u2019re going to talk about what you should be checking off on your cyberhygiene list.<\/p>\n<h3>1. Multifactor authentication<\/h3>\n<p>Multifactor authentication (MFA) is no longer just nice to have\u2014it\u2019s a must-have for any critical systems. Usernames and passwords were designed for a time when people only had a handful to remember; these days, we have too many to keep in mind. This can lead to people reusing passwords, and ultimately leaving their accounts open to compromise.<\/p>\n<p>This is a particular problem when it comes to cloud services. As more people work at home, businesses will increasingly rely on cloud services and shift their infrastructure into the cloud. One of the biggest threats to cloud services are user credentials. With this being the case, MFA needs to be an essential part of your security strategy, whether it\u2019s email based, SMS based, app based like Google Authenticator or Authy, or hardware based like Yubikeys.<\/p>\n<h3>2. Manage your identities<\/h3>\n<p>One way of mitigating cyber-risk is to reduce the potential ways that criminals can make off with valuable data. This means keeping data on a need-to-use basis and making sure that only the right people can access the right information. For example, a graphic designer won\u2019t need access to company HR data or customer financial data. By making sure users can access only the data and systems they need, you can not only reduce the likelihood of insider threats but also reduce the damage done if an external malicious actor does compromise their accounts.<\/p>\n<p>To do this, you want to make sure new accounts and existing accounts conform to this principle of least privilege. User permissions can grow unwieldy over time, so now\u2019s a good time to schedule some time to run an audit and take action as needed. Plus, it\u2019s worth scheduling these audits to occur on a regular basis.<\/p>\n<h3>3. Know and protect your crown jewels<\/h3>\n<p>You can\u2019t paint security with a broad brush. Some data could be riskier to lose than others. Some employees need more sensitive access than others. These are your crown jewels, and they should gain additional protection compared to the rest of the organization and infrastructure. This allows you to focus your security efforts and resources in the right places and avoiding overburdening individual employees.<\/p>\n<p>For example, systems administrators will have a lot of power and access to critical data and systems. Adding more steps requiring them to turn on strong two-factor authentication (2FA) for access to critical systems (or even more factors) could be one step for this. Another should involve active monitoring of their accounts for indicators of suspicious activity (which may indicate an insider attack, but more likely means an account was compromised). For lower-risk employees like graphic designers or salespeople, you may not require the same number of hoops for them to jump through.<\/p>\n<h3>4. Protect your endpoints<\/h3>\n<p>With more users working outside the office, the battle for security gets waged even more at the endpoint. Endpoints are simply everywhere\u2014from company-issued laptops to store-bought, personal internet of things (IoT) devices. MSPs have less control over the networks to which the endpoints connect, so endpoint security has become more essential than ever.<\/p>\n<p>Antivirus (AV) needs to remain up-to-date, but ultimately, this increasingly hostile environment often requires more advanced protection. A good endpoint detection and response (EDR) tool can help detect\u2014and remediate\u2014threats at the endpoint level beyond malware. Since attackers increasingly use malware obfuscation methods and fileless attacks, having an EDR that can detect anomalies that could be attack indicators beyond traditional malware files will be\u00a0<em>essential<\/em>\u00a0for protecting customers working outside their corporate office.<\/p>\n<h3>5. Patch, patch, and patch<\/h3>\n<p>Patching should be one of the most fundamental practices for any security package. Vulnerabilities get discovered frequently, and cybercriminals can quickly rush to exploit these issues. Making sure your customers\u2019 endpoints have the latest patches\u2014both for their operating system and for their third-party software\u2014helps prevent a good number of (mostly) easily preventable attacks. Set up an automated patch management schedule and stick to it. If any endpoints appear out-of-date in your RMM system, try to fix them as soon as possible.<\/p>\n<h3>Good fundamentals matter<\/h3>\n<p>Practicing sound fundamentals often makes the biggest difference in defeating cybercriminals. Highly motivated criminals may use sophisticated techniques, but more often than not most cybercriminals look for easy targets, like unpatched systems or accounts with weak, common passwords. As challenging times continue, don\u2019t let these fundamentals fall by the wayside.<\/p>\n<p>Stay tuned for part two of this where I cover another five cyberhygiene tips to help you keep your customers safe.<\/p>\n<p>&nbsp;<\/p>\n<p><em><strong>You can read the second part\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/dont-forget-cyberhygiene-part-2-5-more-tips-keeping-customers-secure\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/strong><\/em><\/p>\n<p>&nbsp;<\/p>\n<p><strong>During this article, we mentioned endpoint detection and response tools, which can offer protection against a wider range of threats than traditional malware\u2014including fileless attacks, weaponized documents, and polymorphic malware. SolarWinds<sup>\u00ae<\/sup>\u00a0Endpoint Detection and Response (EDR) was built to help MSPs offer strong protection for their customers. It even can automatically roll back endpoints to a safe state after a ransomware attack.\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/n-central\/endpoint-detection-and-response\">Learn more today<\/a>.\u00a0<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Brush up on your cyberhygiene with 5 tips for defending against cyberattacks.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6450","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Don\u2019t Forget Cyberhygiene, Part 1 of 2: 5 Tips for Staying Safe - N-able<\/title>\n<meta name=\"description\" content=\"Brush up on your cyberhygiene with 5 tips for defending against cyberattacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/dont-forget-cyberhygiene-1-of-2\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Don\u2019t Forget Cyberhygiene, Part 1 of 2: 5 Tips for Staying Safe - N-able\" \/>\n<meta property=\"og:description\" content=\"Brush up on your cyberhygiene with 5 tips for defending against cyberattacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/dont-forget-cyberhygiene-1-of-2\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-28T22:16:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-09T22:18:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/dont-forget-cyberhygiene-1-of-2#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/dont-forget-cyberhygiene-1-of-2\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Don\u2019t Forget Cyberhygiene, Part 1 of 2: 5 Tips for Staying Safe\",\"datePublished\":\"2020-07-28T23:16:32+01:00\",\"dateModified\":\"2021-04-09T22:18:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/dont-forget-cyberhygiene-1-of-2\"},\"wordCount\":951,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/dont-forget-cyberhygiene-1-of-2\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/dont-forget-cyberhygiene-1-of-2\",\"name\":\"Don\u2019t Forget Cyberhygiene, Part 1 of 2: 5 Tips for Staying Safe - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"datePublished\":\"2020-07-28T23:16:32+01:00\",\"dateModified\":\"2021-04-09T22:18:51+00:00\",\"description\":\"Brush up on your cyberhygiene with 5 tips for defending against cyberattacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/dont-forget-cyberhygiene-1-of-2#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/dont-forget-cyberhygiene-1-of-2\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/dont-forget-cyberhygiene-1-of-2#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/fr\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Don\u2019t Forget Cyberhygiene, Part 1 of 2: 5 Tips for Staying Safe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Don\u2019t Forget Cyberhygiene, Part 1 of 2: 5 Tips for Staying Safe - N-able","description":"Brush up on your cyberhygiene with 5 tips for defending against cyberattacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/dont-forget-cyberhygiene-1-of-2","og_locale":"fr_FR","og_type":"article","og_title":"Don\u2019t Forget Cyberhygiene, Part 1 of 2: 5 Tips for Staying Safe - N-able","og_description":"Brush up on your cyberhygiene with 5 tips for defending against cyberattacks.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/dont-forget-cyberhygiene-1-of-2","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-07-28T22:16:32+00:00","article_modified_time":"2021-04-09T22:18:51+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"N-able","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/dont-forget-cyberhygiene-1-of-2#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/dont-forget-cyberhygiene-1-of-2"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Don\u2019t Forget Cyberhygiene, Part 1 of 2: 5 Tips for Staying Safe","datePublished":"2020-07-28T23:16:32+01:00","dateModified":"2021-04-09T22:18:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/dont-forget-cyberhygiene-1-of-2"},"wordCount":951,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"articleSection":["Security"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/dont-forget-cyberhygiene-1-of-2","url":"https:\/\/www.n-able.com\/fr\/blog\/dont-forget-cyberhygiene-1-of-2","name":"Don\u2019t Forget Cyberhygiene, Part 1 of 2: 5 Tips for Staying Safe - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"datePublished":"2020-07-28T23:16:32+01:00","dateModified":"2021-04-09T22:18:51+00:00","description":"Brush up on your cyberhygiene with 5 tips for defending against cyberattacks.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/dont-forget-cyberhygiene-1-of-2#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/dont-forget-cyberhygiene-1-of-2"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/fr\/blog\/dont-forget-cyberhygiene-1-of-2#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/fr\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Don\u2019t Forget Cyberhygiene, Part 1 of 2: 5 Tips for Staying Safe"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/6450","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=6450"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/6450\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=6450"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}