SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
7 Steps to
Basic Cybersecurity
Hygiene for Government
1 THE INSIDER’S GUIDE TO CYBERSECURITY FOR GOVERNMENT
Recently, the White House announced the
Cyber National Action Plan (CNAP), a $19
billion commitment to enhance cybersecurity
awareness and protections throughout the
public sector.
To reflect this urgent shift towards more secure
government information and systems, there
are a number of basic hygiene strategies that
government organizations can employ now.
These seven steps are a starting point
to enabling strong cyber hygiene and
up-to-date cybersecurity practices for
the entire organization.
Understanding what data needs to be
protected allows your organization to plan
for stronger security measures and access
controls for certain types of information.
This is part of a larger data security
strategy that outlines tiered access and
manages user rights as well. Proper data
classification determines the criticality
of data sets and helps to align proper
processes for handling.
Identify critical dataSTEP 01
President Obama’s recent CNAP
announcements emphasized the need
to shift away from vulnerable cybersecurity
basics like passwords towards more secure
forms of identification such as multi-factor
authentication.
Today, new methods are being developed
to leverage more flexible derived credentials.
In these new models, asymmetric key
pairs—rather than string comparisons, like
passwords—are used, and hardware can
secure key material even further.STEP 02
Emphasize multi-factor,
strong identification
Patching critical systems and maintaining
their health is vital to protecting agency
information, as newer patched systems
are more secure. And, whenever possible,
agencies should move toward more
standardized and automated processes
to decrease the time necessary to
manage incidents.
STEP 03
Patch systems and
automated processes
The right security policies can go a long
way to keeping data safe. Establishing
information rights management rules and
data loss protection procedures are two
basic hygiene measures that are critical for
government agencies. In addition, agency
data should be fundamentally segmented
from employees’ personal information to
prevent vulnerability and leaks.
Prevent data leakageSTEP 04
Part of preventing leaks requires instructing
employees on the best practices to follow
when working in email, on social media, or
with outside systems. Often, employees (at
all levels) in the public sector don’t recognize
that they’re potentially compromising
sensitive information with un-hygienic cyber
behavior, so it’s important to emphasize this
throughout all levels of the organization.
An educated workforce is a core part of
the CNAP initiatives, and $62 million will
be dedicated to help attract cybersecurity
talent to the public sector.
STEP 05 Teach good hygiene
at all levels
Sensitive information and certificates
need to be protected at all times. Secure
transport protocols such as IPsec and
SSL/TLS can be enabled between devices,
VPNs, virtual machines and datacenters.
Government organizations can encrypt
keys with the high-level protection of
compliant hardware security modules.
For data at rest, FIPS 140-2–compliant
AES 256 symmetric SQL transparent data
encryption and other options are available,
depending on organizational needs.
STEP 06
Encrypt data at rest
and in motion
Simulating a breach when there
are significant changes to the IT
environment means you’ll discover where
you need stronger defenses and where
your organization is well protected from
attackers. As a part of CNAP, the Obama
administration will draw up a new Cyber
Incident Response Framework by spring
2016 to change the way government
agencies respond to cyber incidents.
Employing trustworthy technology
and mandatory software development
is a critical step towards ensuring your
organization’s security technology
evolves as cyber technology does.
STEP 07
Perform real world
breach simulations
These steps are just the beginning of
best practices cybersecurity that keep
government agencies secure. There
are more considerations beyond basic
hygiene that need to be considered,
including compliance.
How does your agency measure up?
Read The Insider’s Guide to Cybersecurity
for Government to find out.
http://aka.ms/govcybersecurityguide
Get the eBook
The Insider's Guide to
Cybersecurity
For Government
All rights reserved. This document is for informational purposes only. MICROSOFT
MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. This document
is provided “as-is.” Information and views expressed in this document, including URL
and other Internet website references, may change without notice.
This document does not provide you with any legal rights to any intellectual property
in any Microsoft product. You may copy and use this document for your internal,
reference purposes. ©2016 Microsoft Corporation.
microsoft.com

Más contenido relacionado

La actualidad más candente

SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1Priyanka Aash
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)Gopal Choudhary
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookMargarete McGrath
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityPriyanshu Ratnakar
 
Cyber Security & Hygine
Cyber Security & HygineCyber Security & Hygine
Cyber Security & HygineAmit Arya
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehReZa AdineH
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)WAJAHAT IQBAL
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
The Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationNUS-ISS
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security PresentationAjay p
 

La actualidad más candente (20)

SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Emerging Technologies 3.0.pdf
Emerging Technologies 3.0.pdfEmerging Technologies 3.0.pdf
Emerging Technologies 3.0.pdf
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber Security
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
Cyber Security & Hygine
Cyber Security & HygineCyber Security & Hygine
Cyber Security & Hygine
 
Threat landscape 4.0
Threat landscape 4.0Threat landscape 4.0
Threat landscape 4.0
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
The Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 

Destacado

Office365 Security Task Force
Office365 Security Task ForceOffice365 Security Task Force
Office365 Security Task ForceMicrosoft
 
Total Economic Impact of Microsoft Office 365 Forrester Study
Total Economic Impact of Microsoft Office 365 Forrester StudyTotal Economic Impact of Microsoft Office 365 Forrester Study
Total Economic Impact of Microsoft Office 365 Forrester StudyMicrosoft
 
Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...
Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...
Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...Microsoft
 
Understanding the Business Value of Migrating to Windows Server 2012
Understanding the Business Value of Migrating to Windows Server 2012Understanding the Business Value of Migrating to Windows Server 2012
Understanding the Business Value of Migrating to Windows Server 2012Microsoft
 
Office Ergonomics: Dos and Don'ts
Office Ergonomics: Dos and Don'tsOffice Ergonomics: Dos and Don'ts
Office Ergonomics: Dos and Don'tsMicrosoft
 
Bring Your Own Device
Bring Your Own DeviceBring Your Own Device
Bring Your Own DeviceMicrosoft
 
Cross-Platform Barcode Scanning with ZXing, Jonathan Dick
Cross-Platform Barcode Scanning with ZXing, Jonathan DickCross-Platform Barcode Scanning with ZXing, Jonathan Dick
Cross-Platform Barcode Scanning with ZXing, Jonathan DickXamarin
 
2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study2016 Future of Cloud Computing Study
2016 Future of Cloud Computing StudyNorth Bridge
 
Millennials and the Next Generation of IT
Millennials and the Next Generation of ITMillennials and the Next Generation of IT
Millennials and the Next Generation of ITMicrosoft
 
5 Ways Affordable Innovation Can Revolutionize your Business
5 Ways Affordable Innovation Can Revolutionize your Business5 Ways Affordable Innovation Can Revolutionize your Business
5 Ways Affordable Innovation Can Revolutionize your BusinessMicrosoft
 
Build Better Games with Unity and Microsoft Azure
Build Better Games with Unity and Microsoft AzureBuild Better Games with Unity and Microsoft Azure
Build Better Games with Unity and Microsoft AzureXamarin
 
This is the Microsoft Cloud
This is the Microsoft CloudThis is the Microsoft Cloud
This is the Microsoft CloudMicrosoft
 
Microsoft to Acquire LinkedIn: Overview for Investors
Microsoft to Acquire LinkedIn: Overview for InvestorsMicrosoft to Acquire LinkedIn: Overview for Investors
Microsoft to Acquire LinkedIn: Overview for InvestorsMicrosoft
 
PPT on Microsoft Corporation
PPT on Microsoft CorporationPPT on Microsoft Corporation
PPT on Microsoft CorporationVijaykumar Nishad
 
Top 5 Deep Learning and AI Stories - October 6, 2017
Top 5 Deep Learning and AI Stories - October 6, 2017Top 5 Deep Learning and AI Stories - October 6, 2017
Top 5 Deep Learning and AI Stories - October 6, 2017NVIDIA
 

Destacado (15)

Office365 Security Task Force
Office365 Security Task ForceOffice365 Security Task Force
Office365 Security Task Force
 
Total Economic Impact of Microsoft Office 365 Forrester Study
Total Economic Impact of Microsoft Office 365 Forrester StudyTotal Economic Impact of Microsoft Office 365 Forrester Study
Total Economic Impact of Microsoft Office 365 Forrester Study
 
Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...
Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...
Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...
 
Understanding the Business Value of Migrating to Windows Server 2012
Understanding the Business Value of Migrating to Windows Server 2012Understanding the Business Value of Migrating to Windows Server 2012
Understanding the Business Value of Migrating to Windows Server 2012
 
Office Ergonomics: Dos and Don'ts
Office Ergonomics: Dos and Don'tsOffice Ergonomics: Dos and Don'ts
Office Ergonomics: Dos and Don'ts
 
Bring Your Own Device
Bring Your Own DeviceBring Your Own Device
Bring Your Own Device
 
Cross-Platform Barcode Scanning with ZXing, Jonathan Dick
Cross-Platform Barcode Scanning with ZXing, Jonathan DickCross-Platform Barcode Scanning with ZXing, Jonathan Dick
Cross-Platform Barcode Scanning with ZXing, Jonathan Dick
 
2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study
 
Millennials and the Next Generation of IT
Millennials and the Next Generation of ITMillennials and the Next Generation of IT
Millennials and the Next Generation of IT
 
5 Ways Affordable Innovation Can Revolutionize your Business
5 Ways Affordable Innovation Can Revolutionize your Business5 Ways Affordable Innovation Can Revolutionize your Business
5 Ways Affordable Innovation Can Revolutionize your Business
 
Build Better Games with Unity and Microsoft Azure
Build Better Games with Unity and Microsoft AzureBuild Better Games with Unity and Microsoft Azure
Build Better Games with Unity and Microsoft Azure
 
This is the Microsoft Cloud
This is the Microsoft CloudThis is the Microsoft Cloud
This is the Microsoft Cloud
 
Microsoft to Acquire LinkedIn: Overview for Investors
Microsoft to Acquire LinkedIn: Overview for InvestorsMicrosoft to Acquire LinkedIn: Overview for Investors
Microsoft to Acquire LinkedIn: Overview for Investors
 
PPT on Microsoft Corporation
PPT on Microsoft CorporationPPT on Microsoft Corporation
PPT on Microsoft Corporation
 
Top 5 Deep Learning and AI Stories - October 6, 2017
Top 5 Deep Learning and AI Stories - October 6, 2017Top 5 Deep Learning and AI Stories - October 6, 2017
Top 5 Deep Learning and AI Stories - October 6, 2017
 

Similar a 7 Steps to Better Cybersecurity Hygiene

Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software developmentMuhammadArif823
 
Cyber Security And Technology Essay
Cyber Security And Technology EssayCyber Security And Technology Essay
Cyber Security And Technology EssayAngela Garcia
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Walmart Security Policy Summary
Walmart Security Policy SummaryWalmart Security Policy Summary
Walmart Security Policy SummaryAlyssa Jones
 
Fdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsFdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsKen M. Shaurette
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guideAdilsonSuende
 
clearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochureclearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochureLee Dalton
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFLaurie Mosca-Cocca
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityRahul Tyagi
 
The Three Pitfalls of Data Security
The Three Pitfalls of Data SecurityThe Three Pitfalls of Data Security
The Three Pitfalls of Data SecurityMarkLogic
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementDaren Dunkel
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
Organizational Philosophies And Technology Analysis
Organizational Philosophies And Technology AnalysisOrganizational Philosophies And Technology Analysis
Organizational Philosophies And Technology AnalysisDebbie Beason
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementVelrada
 
IT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligenceIT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligencethinkASG
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991Jim Romeo
 

Similar a 7 Steps to Better Cybersecurity Hygiene (20)

Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 
Cyber Security And Technology Essay
Cyber Security And Technology EssayCyber Security And Technology Essay
Cyber Security And Technology Essay
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Walmart Security Policy Summary
Walmart Security Policy SummaryWalmart Security Policy Summary
Walmart Security Policy Summary
 
Fdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsFdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessments
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
clearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochureclearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochure
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
 
The Three Pitfalls of Data Security
The Three Pitfalls of Data SecurityThe Three Pitfalls of Data Security
The Three Pitfalls of Data Security
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
 
Organizational Philosophies And Technology Analysis
Organizational Philosophies And Technology AnalysisOrganizational Philosophies And Technology Analysis
Organizational Philosophies And Technology Analysis
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information Management
 
IT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligenceIT Executive Guide to Security Intelligence
IT Executive Guide to Security Intelligence
 
Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991
 

Más de Microsoft

Modern Finance at Microsoft US
Modern Finance at Microsoft USModern Finance at Microsoft US
Modern Finance at Microsoft USMicrosoft
 
Modern Marketing: The Case of Microsoft US
Modern Marketing: The Case of Microsoft USModern Marketing: The Case of Microsoft US
Modern Marketing: The Case of Microsoft USMicrosoft
 
Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018Microsoft
 
Norwegian Refugee Council
Norwegian Refugee CouncilNorwegian Refugee Council
Norwegian Refugee CouncilMicrosoft
 
Reimagining Business Operations
Reimagining Business OperationsReimagining Business Operations
Reimagining Business OperationsMicrosoft
 
Top 5 Note Taking Tips from Future Innovators
Top 5 Note Taking Tips from Future InnovatorsTop 5 Note Taking Tips from Future Innovators
Top 5 Note Taking Tips from Future InnovatorsMicrosoft
 
Media in Transformation: A Technology Perspective
Media in Transformation: A Technology PerspectiveMedia in Transformation: A Technology Perspective
Media in Transformation: A Technology PerspectiveMicrosoft
 
Integrated Customer Service Maximization Experience Vision Demonstrator
Integrated Customer Service Maximization Experience Vision DemonstratorIntegrated Customer Service Maximization Experience Vision Demonstrator
Integrated Customer Service Maximization Experience Vision DemonstratorMicrosoft
 
Ignite Theater: Microsoft Enterprise Services Connected Collaboration Approach
Ignite Theater: Microsoft Enterprise Services Connected Collaboration ApproachIgnite Theater: Microsoft Enterprise Services Connected Collaboration Approach
Ignite Theater: Microsoft Enterprise Services Connected Collaboration ApproachMicrosoft
 
The Digital Airline
The Digital AirlineThe Digital Airline
The Digital AirlineMicrosoft
 
Driving results through a connected omni-channel retail sales experience
Driving results through a connected omni-channel retail sales experienceDriving results through a connected omni-channel retail sales experience
Driving results through a connected omni-channel retail sales experienceMicrosoft
 
Making Your Marketing More Effective
Making Your Marketing More Effective Making Your Marketing More Effective
Making Your Marketing More Effective Microsoft
 
10 real-world tips for building relationships and closing more on LinkedIn
10 real-world tips for building relationships and closing more on LinkedIn10 real-world tips for building relationships and closing more on LinkedIn
10 real-world tips for building relationships and closing more on LinkedInMicrosoft
 
Why Microsoft Dynamics AX
Why Microsoft Dynamics AXWhy Microsoft Dynamics AX
Why Microsoft Dynamics AXMicrosoft
 
Top Reasons to Buy
Top Reasons to BuyTop Reasons to Buy
Top Reasons to BuyMicrosoft
 
5 Steps to Help Your Organization Succeed This Year
5 Steps to Help Your Organization Succeed This Year5 Steps to Help Your Organization Succeed This Year
5 Steps to Help Your Organization Succeed This YearMicrosoft
 
5 Steps to Help Your Organization Succeed This Year
5 Steps to Help Your Organization Succeed This Year5 Steps to Help Your Organization Succeed This Year
5 Steps to Help Your Organization Succeed This YearMicrosoft
 
Enterprise social how to WLAN
Enterprise social how to WLANEnterprise social how to WLAN
Enterprise social how to WLANMicrosoft
 
3 reasons your biz needs ES
3 reasons your biz needs ES3 reasons your biz needs ES
3 reasons your biz needs ESMicrosoft
 
Why today’s businesses need enterprise social
Why today’s businesses need enterprise socialWhy today’s businesses need enterprise social
Why today’s businesses need enterprise socialMicrosoft
 

Más de Microsoft (20)

Modern Finance at Microsoft US
Modern Finance at Microsoft USModern Finance at Microsoft US
Modern Finance at Microsoft US
 
Modern Marketing: The Case of Microsoft US
Modern Marketing: The Case of Microsoft USModern Marketing: The Case of Microsoft US
Modern Marketing: The Case of Microsoft US
 
Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018
 
Norwegian Refugee Council
Norwegian Refugee CouncilNorwegian Refugee Council
Norwegian Refugee Council
 
Reimagining Business Operations
Reimagining Business OperationsReimagining Business Operations
Reimagining Business Operations
 
Top 5 Note Taking Tips from Future Innovators
Top 5 Note Taking Tips from Future InnovatorsTop 5 Note Taking Tips from Future Innovators
Top 5 Note Taking Tips from Future Innovators
 
Media in Transformation: A Technology Perspective
Media in Transformation: A Technology PerspectiveMedia in Transformation: A Technology Perspective
Media in Transformation: A Technology Perspective
 
Integrated Customer Service Maximization Experience Vision Demonstrator
Integrated Customer Service Maximization Experience Vision DemonstratorIntegrated Customer Service Maximization Experience Vision Demonstrator
Integrated Customer Service Maximization Experience Vision Demonstrator
 
Ignite Theater: Microsoft Enterprise Services Connected Collaboration Approach
Ignite Theater: Microsoft Enterprise Services Connected Collaboration ApproachIgnite Theater: Microsoft Enterprise Services Connected Collaboration Approach
Ignite Theater: Microsoft Enterprise Services Connected Collaboration Approach
 
The Digital Airline
The Digital AirlineThe Digital Airline
The Digital Airline
 
Driving results through a connected omni-channel retail sales experience
Driving results through a connected omni-channel retail sales experienceDriving results through a connected omni-channel retail sales experience
Driving results through a connected omni-channel retail sales experience
 
Making Your Marketing More Effective
Making Your Marketing More Effective Making Your Marketing More Effective
Making Your Marketing More Effective
 
10 real-world tips for building relationships and closing more on LinkedIn
10 real-world tips for building relationships and closing more on LinkedIn10 real-world tips for building relationships and closing more on LinkedIn
10 real-world tips for building relationships and closing more on LinkedIn
 
Why Microsoft Dynamics AX
Why Microsoft Dynamics AXWhy Microsoft Dynamics AX
Why Microsoft Dynamics AX
 
Top Reasons to Buy
Top Reasons to BuyTop Reasons to Buy
Top Reasons to Buy
 
5 Steps to Help Your Organization Succeed This Year
5 Steps to Help Your Organization Succeed This Year5 Steps to Help Your Organization Succeed This Year
5 Steps to Help Your Organization Succeed This Year
 
5 Steps to Help Your Organization Succeed This Year
5 Steps to Help Your Organization Succeed This Year5 Steps to Help Your Organization Succeed This Year
5 Steps to Help Your Organization Succeed This Year
 
Enterprise social how to WLAN
Enterprise social how to WLANEnterprise social how to WLAN
Enterprise social how to WLAN
 
3 reasons your biz needs ES
3 reasons your biz needs ES3 reasons your biz needs ES
3 reasons your biz needs ES
 
Why today’s businesses need enterprise social
Why today’s businesses need enterprise socialWhy today’s businesses need enterprise social
Why today’s businesses need enterprise social
 

Último

Intellectual Property Licensing Examples
Intellectual Property Licensing ExamplesIntellectual Property Licensing Examples
Intellectual Property Licensing Examplesamberjiles31
 
Mihir Menda - Member of Supervisory Board at RMZ
Mihir Menda - Member of Supervisory Board at RMZMihir Menda - Member of Supervisory Board at RMZ
Mihir Menda - Member of Supervisory Board at RMZKanakChauhan5
 
Data skills for Agile Teams- Killing story points
Data skills for Agile Teams- Killing story pointsData skills for Agile Teams- Killing story points
Data skills for Agile Teams- Killing story pointsyasinnathani
 
Chicago Medical Malpractice Lawyer Chicago Medical Malpractice Lawyer.pdf
Chicago Medical Malpractice Lawyer Chicago Medical Malpractice Lawyer.pdfChicago Medical Malpractice Lawyer Chicago Medical Malpractice Lawyer.pdf
Chicago Medical Malpractice Lawyer Chicago Medical Malpractice Lawyer.pdfSourav Sikder
 
Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdf
Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdfTalent Management research intelligence_13 paradigm shifts_20 March 2024.pdf
Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdfCharles Cotter, PhD
 
Ethical stalking by Mark Williams. UpliftLive 2024
Ethical stalking by Mark Williams. UpliftLive 2024Ethical stalking by Mark Williams. UpliftLive 2024
Ethical stalking by Mark Williams. UpliftLive 2024Winbusinessin
 
HELENE HECKROTTE'S PROFESSIONAL PORTFOLIO.pptx
HELENE HECKROTTE'S PROFESSIONAL PORTFOLIO.pptxHELENE HECKROTTE'S PROFESSIONAL PORTFOLIO.pptx
HELENE HECKROTTE'S PROFESSIONAL PORTFOLIO.pptxHelene Heckrotte
 
MoneyBridge Pitch Deck - Investor Presentation
MoneyBridge Pitch Deck - Investor PresentationMoneyBridge Pitch Deck - Investor Presentation
MoneyBridge Pitch Deck - Investor Presentationbaron83
 
UNLEASHING THE POWER OF PROGRAMMATIC ADVERTISING
UNLEASHING THE POWER OF PROGRAMMATIC ADVERTISINGUNLEASHING THE POWER OF PROGRAMMATIC ADVERTISING
UNLEASHING THE POWER OF PROGRAMMATIC ADVERTISINGlokeshwarmaha
 
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...IMARC Group
 
Developing Coaching Skills: Mine, Yours, Ours
Developing Coaching Skills: Mine, Yours, OursDeveloping Coaching Skills: Mine, Yours, Ours
Developing Coaching Skills: Mine, Yours, OursKaiNexus
 
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John MeulemansBCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John MeulemansBBPMedia1
 
Team B Mind Map for Organizational Chg..
Team B Mind Map for Organizational Chg..Team B Mind Map for Organizational Chg..
Team B Mind Map for Organizational Chg..dlewis191
 
Introduction to The overview of GAAP LO 1-5.pptx
Introduction to The overview of GAAP LO 1-5.pptxIntroduction to The overview of GAAP LO 1-5.pptx
Introduction to The overview of GAAP LO 1-5.pptxJemalSeid25
 
To Create Your Own Wig Online To Create Your Own Wig Online
To Create Your Own Wig Online  To Create Your Own Wig OnlineTo Create Your Own Wig Online  To Create Your Own Wig Online
To Create Your Own Wig Online To Create Your Own Wig Onlinelng ths
 
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...TalentView
 
7movierulz.uk
7movierulz.uk7movierulz.uk
7movierulz.ukaroemirsr
 
MC Heights construction company in Jhang
MC Heights construction company in JhangMC Heights construction company in Jhang
MC Heights construction company in Jhangmcgroupjeya
 
Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access
 
Entrepreneurship & organisations: influences and organizations
Entrepreneurship & organisations: influences and organizationsEntrepreneurship & organisations: influences and organizations
Entrepreneurship & organisations: influences and organizationsP&CO
 

Último (20)

Intellectual Property Licensing Examples
Intellectual Property Licensing ExamplesIntellectual Property Licensing Examples
Intellectual Property Licensing Examples
 
Mihir Menda - Member of Supervisory Board at RMZ
Mihir Menda - Member of Supervisory Board at RMZMihir Menda - Member of Supervisory Board at RMZ
Mihir Menda - Member of Supervisory Board at RMZ
 
Data skills for Agile Teams- Killing story points
Data skills for Agile Teams- Killing story pointsData skills for Agile Teams- Killing story points
Data skills for Agile Teams- Killing story points
 
Chicago Medical Malpractice Lawyer Chicago Medical Malpractice Lawyer.pdf
Chicago Medical Malpractice Lawyer Chicago Medical Malpractice Lawyer.pdfChicago Medical Malpractice Lawyer Chicago Medical Malpractice Lawyer.pdf
Chicago Medical Malpractice Lawyer Chicago Medical Malpractice Lawyer.pdf
 
Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdf
Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdfTalent Management research intelligence_13 paradigm shifts_20 March 2024.pdf
Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdf
 
Ethical stalking by Mark Williams. UpliftLive 2024
Ethical stalking by Mark Williams. UpliftLive 2024Ethical stalking by Mark Williams. UpliftLive 2024
Ethical stalking by Mark Williams. UpliftLive 2024
 
HELENE HECKROTTE'S PROFESSIONAL PORTFOLIO.pptx
HELENE HECKROTTE'S PROFESSIONAL PORTFOLIO.pptxHELENE HECKROTTE'S PROFESSIONAL PORTFOLIO.pptx
HELENE HECKROTTE'S PROFESSIONAL PORTFOLIO.pptx
 
MoneyBridge Pitch Deck - Investor Presentation
MoneyBridge Pitch Deck - Investor PresentationMoneyBridge Pitch Deck - Investor Presentation
MoneyBridge Pitch Deck - Investor Presentation
 
UNLEASHING THE POWER OF PROGRAMMATIC ADVERTISING
UNLEASHING THE POWER OF PROGRAMMATIC ADVERTISINGUNLEASHING THE POWER OF PROGRAMMATIC ADVERTISING
UNLEASHING THE POWER OF PROGRAMMATIC ADVERTISING
 
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
 
Developing Coaching Skills: Mine, Yours, Ours
Developing Coaching Skills: Mine, Yours, OursDeveloping Coaching Skills: Mine, Yours, Ours
Developing Coaching Skills: Mine, Yours, Ours
 
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John MeulemansBCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
 
Team B Mind Map for Organizational Chg..
Team B Mind Map for Organizational Chg..Team B Mind Map for Organizational Chg..
Team B Mind Map for Organizational Chg..
 
Introduction to The overview of GAAP LO 1-5.pptx
Introduction to The overview of GAAP LO 1-5.pptxIntroduction to The overview of GAAP LO 1-5.pptx
Introduction to The overview of GAAP LO 1-5.pptx
 
To Create Your Own Wig Online To Create Your Own Wig Online
To Create Your Own Wig Online  To Create Your Own Wig OnlineTo Create Your Own Wig Online  To Create Your Own Wig Online
To Create Your Own Wig Online To Create Your Own Wig Online
 
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...
 
7movierulz.uk
7movierulz.uk7movierulz.uk
7movierulz.uk
 
MC Heights construction company in Jhang
MC Heights construction company in JhangMC Heights construction company in Jhang
MC Heights construction company in Jhang
 
Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024
 
Entrepreneurship & organisations: influences and organizations
Entrepreneurship & organisations: influences and organizationsEntrepreneurship & organisations: influences and organizations
Entrepreneurship & organisations: influences and organizations
 

7 Steps to Better Cybersecurity Hygiene

  • 1. 7 Steps to Basic Cybersecurity Hygiene for Government
  • 2. 1 THE INSIDER’S GUIDE TO CYBERSECURITY FOR GOVERNMENT Recently, the White House announced the Cyber National Action Plan (CNAP), a $19 billion commitment to enhance cybersecurity awareness and protections throughout the public sector. To reflect this urgent shift towards more secure government information and systems, there are a number of basic hygiene strategies that government organizations can employ now. These seven steps are a starting point to enabling strong cyber hygiene and up-to-date cybersecurity practices for the entire organization.
  • 3. Understanding what data needs to be protected allows your organization to plan for stronger security measures and access controls for certain types of information. This is part of a larger data security strategy that outlines tiered access and manages user rights as well. Proper data classification determines the criticality of data sets and helps to align proper processes for handling. Identify critical dataSTEP 01
  • 4. President Obama’s recent CNAP announcements emphasized the need to shift away from vulnerable cybersecurity basics like passwords towards more secure forms of identification such as multi-factor authentication. Today, new methods are being developed to leverage more flexible derived credentials. In these new models, asymmetric key pairs—rather than string comparisons, like passwords—are used, and hardware can secure key material even further.STEP 02 Emphasize multi-factor, strong identification
  • 5. Patching critical systems and maintaining their health is vital to protecting agency information, as newer patched systems are more secure. And, whenever possible, agencies should move toward more standardized and automated processes to decrease the time necessary to manage incidents. STEP 03 Patch systems and automated processes
  • 6. The right security policies can go a long way to keeping data safe. Establishing information rights management rules and data loss protection procedures are two basic hygiene measures that are critical for government agencies. In addition, agency data should be fundamentally segmented from employees’ personal information to prevent vulnerability and leaks. Prevent data leakageSTEP 04
  • 7. Part of preventing leaks requires instructing employees on the best practices to follow when working in email, on social media, or with outside systems. Often, employees (at all levels) in the public sector don’t recognize that they’re potentially compromising sensitive information with un-hygienic cyber behavior, so it’s important to emphasize this throughout all levels of the organization. An educated workforce is a core part of the CNAP initiatives, and $62 million will be dedicated to help attract cybersecurity talent to the public sector. STEP 05 Teach good hygiene at all levels
  • 8. Sensitive information and certificates need to be protected at all times. Secure transport protocols such as IPsec and SSL/TLS can be enabled between devices, VPNs, virtual machines and datacenters. Government organizations can encrypt keys with the high-level protection of compliant hardware security modules. For data at rest, FIPS 140-2–compliant AES 256 symmetric SQL transparent data encryption and other options are available, depending on organizational needs. STEP 06 Encrypt data at rest and in motion
  • 9. Simulating a breach when there are significant changes to the IT environment means you’ll discover where you need stronger defenses and where your organization is well protected from attackers. As a part of CNAP, the Obama administration will draw up a new Cyber Incident Response Framework by spring 2016 to change the way government agencies respond to cyber incidents. Employing trustworthy technology and mandatory software development is a critical step towards ensuring your organization’s security technology evolves as cyber technology does. STEP 07 Perform real world breach simulations
  • 10. These steps are just the beginning of best practices cybersecurity that keep government agencies secure. There are more considerations beyond basic hygiene that need to be considered, including compliance. How does your agency measure up? Read The Insider’s Guide to Cybersecurity for Government to find out. http://aka.ms/govcybersecurityguide Get the eBook The Insider's Guide to Cybersecurity For Government
  • 11. All rights reserved. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. This document is provided “as-is.” Information and views expressed in this document, including URL and other Internet website references, may change without notice. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes. ©2016 Microsoft Corporation. microsoft.com