• Jayden Lyons, B.S., Security+

The 20 Commandments of Cybersecurity

1 Thou shalt inventory your hardware

2 Thou shalt inventory your software

3 Thou shalt secure configurations for hardware and software

4 Though shalt engage in continuous vulnerability assessment and remediation

5 Thou shalt control use of admin privileges and monitor user behavior

6 Thou shalt maintain, monitor, and analyze security and audit logs

7 Thou shalt protect and defend email and web browsers

8 Thou shalt defend against malware

9 Thou shalt make judicious use of network ports, protocols, and services

10 Thou shalt implement data recovery and backup plans at least weekly

11 Thou shalt secure configuration of network infrastructure devices

12 Thou shalt secure network borders

13 Thou shalt maintain the integrity and confidentiality of business data

14 Thou shalt implement access control based on least privilege

15 Thou shalt secure and monitor your wireless network

16 Thou shalt manage and monitor user accounts with administrative and technical controls

17 Thou shalt provide employee security training

18 Thou shalt securely monitor and update application software

19 Thou shalt prepare an incident response plan to eradicate and restore

20 Thou shalt use secure certificates and cryptographic deployments

14 views0 comments

Recent Posts

See All