Photo 96212463 | Network © Daniil Peshkov | Dreamstime
Dreamstime M 96212463

Clark: Cybersecurity starts with cyber hygiene

Oct. 23, 2023
The best cybersecurity team can't function properly if the rest of an organization's employees are not trained on best security practices.

I learned a new term recentlycyber hygiene. O’Dell Hobson, an information security manager, gave a presentation about it at a recent NationaLease meeting.

I am sure most of us are familiar with the term cyber security, but cyber hygiene might be a new term for many of you.

Let’s start by defining what is meant by cyber security. Hobson defined it as “The art of protecting networks, devices, and data from unauthorized access or criminal use, and the practice of ensuring confidentiality, integrity, and availability of information.”

He went on to explain that cyber hygiene, “encompassed the steps and processes necessary to maintain cyber health of devices, networks, and information.”

When we talk about cyber security, Hobson says we are talking about the following three things:

  • Confidentiality: Protecting authorized restrictions on access and disclosure. This includes protecting personal privacy and your company’s proprietary information.
  • Integrity: This focuses on guarding against the improper modification of information or the destruction of information. It includes ensuring the authenticity of your information.
  • Availability: This ensures having timely and reliable access to information and the use of that information.

A significant part of protecting your company’s information is training and educating your employees.

See also: Cybersecurity best practices help industry leaders secure their business

Hobson says you need a robust training regimen that includes information on safe internet browsing, email security phishing and social engineering, the significance of a complex password, and proper corporate network etiquette and use.

A key element of cyber hygiene is access control. Hobson defines it as “a set of procedures and/or processes, normally automated, which allow access to a controlled area or to information to be controlled, in accordance with pre-established policies and rules.”

He also shared information on zero trust security, which is an IT security model that requires strict identity verification for every person and device trying to access resources on a private network.

He encouraged meeting attendees to identify what information they considered to be most important. He calls this information the crown jewels of an organization. Companies need to develop robust contingency plans that include backup and recovery strategies and incident reporting guidelines.

Hobson believes that cyber hygiene is foundational to organizations because ransomware, phishing, and social engineering are rampant. He says that threats can come from corporate adversaries that “find new and inventive ways to get to your assets.” However, companies also need to be aware of attacks from disgruntled employees or even because of actions by employees who did not realize they were compromising security.

There are many solutions for protecting your data but without good cyber hygiene practices all are doomed to fail.

Jane Clark is vice president of member services for NationaLease. In this position, she is focused on managing the member services operation as well as working to strengthen member relationships, reduce member costs, and improve collaboration within the NationaLease supporting groups. Prior to joining NationaLease, Clark served as area vice president for Randstad, one of the nation's largest recruitment agencies, and before that, she served in management posts with QPS Cos., Pro Staff, and Manpower Inc.

About the Author

Jane Clark | Senior VP of Operations

Jane Clark is Senior Vice President, Operations for NationaLease. Prior to joining NationaLease, Jane served as Area Vice President for Randstad, one of the nation’s largest recruitment agencies, and before that, she served in management posts with QPS Companies, Pro Staff, and Manpower, Inc.

Voice your opinion!

To join the conversation, and become an exclusive member of FleetOwner, create an account today!

Sponsored Recommendations

Report: The 2024 State of Heavy-Duty Repair

From capitalizing on the latest revenue trends to implementing strategic financial planning—this report serves as a roadmap for navigating the challenges and opportunities of ...

Fleet Industry Benchmarks: How does your fleet stack up?

Discover how your fleet compares to industry benchmarks and gain insights from a 2024 Benchmarking Report on maintenance spend, turnaround time, and more. Join us to identify ...

Build a Tolling Program to Manage Toll Fees and Risks

Fleets looking to effectively manage their operational costs should consider their tolling costs. Download the PrePass whitepaper, “Build a Tolling Program to Manage Toll Fees...

Reducing CSA Violations & Increasing Safety With Advanced Trailer Telematics

Keep the roads safer with advanced trailer telematics. In this whitepaper, see how you can gain insights that lead to increased safety and reduced roadside incidents—keeping drivers...