Photo 96212463 | Network © Daniil Peshkov | Dreamstime
Dreamstime M 96212463 65366b1001c68

Clark: Cybersecurity starts with cyber hygiene

Oct. 23, 2023
The best cybersecurity team can't function properly if the rest of an organization's employees are not trained on best security practices.

I learned a new term recentlycyber hygiene. O’Dell Hobson, an information security manager, gave a presentation about it at a recent NationaLease meeting.

I am sure most of us are familiar with the term cyber security, but cyber hygiene might be a new term for many of you.

Let’s start by defining what is meant by cyber security. Hobson defined it as “The art of protecting networks, devices, and data from unauthorized access or criminal use, and the practice of ensuring confidentiality, integrity, and availability of information.”

He went on to explain that cyber hygiene, “encompassed the steps and processes necessary to maintain cyber health of devices, networks, and information.”

When we talk about cyber security, Hobson says we are talking about the following three things:

  • Confidentiality: Protecting authorized restrictions on access and disclosure. This includes protecting personal privacy and your company’s proprietary information.
  • Integrity: This focuses on guarding against the improper modification of information or the destruction of information. It includes ensuring the authenticity of your information.
  • Availability: This ensures having timely and reliable access to information and the use of that information.

A significant part of protecting your company’s information is training and educating your employees.

See also: Cybersecurity best practices help industry leaders secure their business

Hobson says you need a robust training regimen that includes information on safe internet browsing, email security phishing and social engineering, the significance of a complex password, and proper corporate network etiquette and use.

A key element of cyber hygiene is access control. Hobson defines it as “a set of procedures and/or processes, normally automated, which allow access to a controlled area or to information to be controlled, in accordance with pre-established policies and rules.”

He also shared information on zero trust security, which is an IT security model that requires strict identity verification for every person and device trying to access resources on a private network.

He encouraged meeting attendees to identify what information they considered to be most important. He calls this information the crown jewels of an organization. Companies need to develop robust contingency plans that include backup and recovery strategies and incident reporting guidelines.

Hobson believes that cyber hygiene is foundational to organizations because ransomware, phishing, and social engineering are rampant. He says that threats can come from corporate adversaries that “find new and inventive ways to get to your assets.” However, companies also need to be aware of attacks from disgruntled employees or even because of actions by employees who did not realize they were compromising security.

There are many solutions for protecting your data but without good cyber hygiene practices all are doomed to fail.

Jane Clark is vice president of member services for NationaLease. In this position, she is focused on managing the member services operation as well as working to strengthen member relationships, reduce member costs, and improve collaboration within the NationaLease supporting groups. Prior to joining NationaLease, Clark served as area vice president for Randstad, one of the nation's largest recruitment agencies, and before that, she served in management posts with QPS Cos., Pro Staff, and Manpower Inc.

About the Author

Jane Clark | Senior VP of Operations

Jane Clark is the senior vice president of operations for NationaLease. Prior to joining NationaLease, Jane served as the area vice president for Randstad, one of the nation’s largest recruitment agencies, and before that, she served in management posts with QPS Companies, Pro Staff, and Manpower, Inc.

Voice your opinion!

To join the conversation, and become an exclusive member of FleetOwner, create an account today!

Sponsored Recommendations

Optimizing your fleet safety program using AI

Learn how AI supports fleet safety programs with tools for compliance monitoring, driver coaching and incident analysis to reduce risks and improve efficiency.

Mitigate Risk with Data from Route Scores

Route Scores help fleets navigate the risk factors they encounter in the lanes they travel, helping to keep costs down.

Uniting for Bold Solutions to Tackle Transportation’s Biggest Challenges

Over 300 leaders in transportation, logistics, and distribution gathered at Ignite 2024. From new products to innovative solutions, Ignite highlighted the importance of strong...

Seasonal Strategies for Maintaining a Safe & Efficient Fleet Year-Round

Prepare your fleet for every season! From winterizing vehicles to summer heat safety, our eBook covers essential strategies for year-round fleet safety. Download now to reduce...