Photo 96212463 | Network © Daniil Peshkov | Dreamstime
Dreamstime M 96212463 65366b1001c68

Clark: Cybersecurity starts with cyber hygiene

Oct. 23, 2023
The best cybersecurity team can't function properly if the rest of an organization's employees are not trained on best security practices.

I learned a new term recentlycyber hygiene. O’Dell Hobson, an information security manager, gave a presentation about it at a recent NationaLease meeting.

I am sure most of us are familiar with the term cyber security, but cyber hygiene might be a new term for many of you.

Let’s start by defining what is meant by cyber security. Hobson defined it as “The art of protecting networks, devices, and data from unauthorized access or criminal use, and the practice of ensuring confidentiality, integrity, and availability of information.”

He went on to explain that cyber hygiene, “encompassed the steps and processes necessary to maintain cyber health of devices, networks, and information.”

When we talk about cyber security, Hobson says we are talking about the following three things:

  • Confidentiality: Protecting authorized restrictions on access and disclosure. This includes protecting personal privacy and your company’s proprietary information.
  • Integrity: This focuses on guarding against the improper modification of information or the destruction of information. It includes ensuring the authenticity of your information.
  • Availability: This ensures having timely and reliable access to information and the use of that information.

A significant part of protecting your company’s information is training and educating your employees.

See also: Cybersecurity best practices help industry leaders secure their business

Hobson says you need a robust training regimen that includes information on safe internet browsing, email security phishing and social engineering, the significance of a complex password, and proper corporate network etiquette and use.

A key element of cyber hygiene is access control. Hobson defines it as “a set of procedures and/or processes, normally automated, which allow access to a controlled area or to information to be controlled, in accordance with pre-established policies and rules.”

He also shared information on zero trust security, which is an IT security model that requires strict identity verification for every person and device trying to access resources on a private network.

He encouraged meeting attendees to identify what information they considered to be most important. He calls this information the crown jewels of an organization. Companies need to develop robust contingency plans that include backup and recovery strategies and incident reporting guidelines.

Hobson believes that cyber hygiene is foundational to organizations because ransomware, phishing, and social engineering are rampant. He says that threats can come from corporate adversaries that “find new and inventive ways to get to your assets.” However, companies also need to be aware of attacks from disgruntled employees or even because of actions by employees who did not realize they were compromising security.

There are many solutions for protecting your data but without good cyber hygiene practices all are doomed to fail.

Jane Clark is vice president of member services for NationaLease. In this position, she is focused on managing the member services operation as well as working to strengthen member relationships, reduce member costs, and improve collaboration within the NationaLease supporting groups. Prior to joining NationaLease, Clark served as area vice president for Randstad, one of the nation's largest recruitment agencies, and before that, she served in management posts with QPS Cos., Pro Staff, and Manpower Inc.

About the Author

Jane Clark | Senior VP of Operations

Jane Clark is the senior vice president of operations for NationaLease. Prior to joining NationaLease, Jane served as the area vice president for Randstad, one of the nation’s largest recruitment agencies, and before that, she served in management posts with QPS Companies, Pro Staff, and Manpower, Inc.

Voice your opinion!

To join the conversation, and become an exclusive member of FleetOwner, create an account today!

Sponsored Recommendations

The Future of Mirrors is Closer Than it Appears

Why Mirror Camera Systems are the next step for fleet safety and exoneration While many commercial trucking cameras are similarly marketed, they are not all created equally. The...

The 20:1 Solution: Unlocking the ROI of a Modern Asset Maintenance Solution

Discover how modern fleet maintenance software can drive step-change improvements in shop efficiency, cost control and vehicle productivity, along with how to calculate the ROI...

Digital and AI Solutions for Rideshare Safety

Anyline’s study, “How Digital AI Solutions Can Enhance Rideshare Safety,” reveals rideshare drivers are overly confident in their tire knowledge, risking passenger safety. Download...

Introducing the World’s First Mobile Tire Tread Scanner

Anyline’s innovation allows accurate tire tread measurement via any mobile device, ensuring legal compliance for fleets. Read more and find out how you can cut operating costs...