SlideShare a Scribd company logo
WHILE WORKING
FROM HOME
BEST
CYBER SECURITY
PRACTICES
12.5%
39 sec
94%
$250M
Victimized organizations that
paid associated Ransoms rose
from 45% to 57.5%” in 2020.
- Cyberthreat Defense Report
The malicious
Hacking attack
occurs every 39 sec
- University Of Maryland
94% of malware is
delivered via email.
-CSO
71% of breaches are
Financially motivated. the
second most common reason
is Espionage, Accounting for
25% of Data Breaches.
- Infosec
Worldwide spending on
Cybersecurity is going to reach
$133.7 billion in 2022
- Gartner
Deep fake scams
are going to cost
the world more
than $250 million
this year
- Forrester Research
67% of enterprise
survey respondents
for 2020 Global
Encryption Trends
Study identify Data
Visibility as biggest
challenge
- Ponemon Institute
71%
FACTS AND FIGURES
$133.7
billion
67%
1.
Endpoint Security
compliance check
•
•
Ensure continuous detection and
monitoring mechanisms are in place and
functioning
Organizations should have the ability to
manage their endpoints and check its
compliance while users are not connected
to the corporate networks
• Bring your own device (BYOD) policies are
defined and security checks in place for
scanning the systems for policy checks
before permitting to connect.
2.
Data Security and Privacy
a Priority
• Employees having access to confidential
data or PI data should be trained on the
emphasis of confidentiality and secure
handling of data
• Such employees access should be
governed periodically and ensure least
privilege policy is maintained
• Adequate training to the employees on
company policies and awareness program.
Educating them on various techniques like
phishing and more used for exploits
• Engage solutions which could identify
possible data leakages like source code
leak, credentials leak
3.
User awareness training
programs
• Interactive training sessions to engage
users in understanding organizations
infosec policies and good practices to be
followed
• Simulated attack-based training has proven
effective in educating users, so it is a good
option for organizations to adopt such
training for users
• Such training should also include good
practices to be adopted by users while
working from home
4.
Multi-Factor
Authentication for
Protection
• MFA has become one of the key factors for
two-step verification and secures personal
information with special controls with VPNs
• MFA should also be extended to some
critical applications/systems adding
another layer of protection
• Ensure the device authorization check is
included as part of your VPN connectivity
5.
Privilege User
Management
• Privilege accounts are the most critical
components of access management, and
there has to be processed in place to check
if RBAC is aligned on the principle of least
privilege
• In this situation, it suggested to increase
the frequency of privilege account audits
and clean up immediately upon
identification
8.
Process Report Incident
• Reporting any security issues to the IT
Team
• Educate users on what all qualifies as a
security incident and importance of
reporting any security issues to the IT Team
• Outlook plugin will be an added advantage
to report suspicious emails.
• Ask the security monitoring teams to keep
a close look on active threats and
campaigns triggered to exploit the COVID
situation
6.
Vulnerability Assessment
and Patch Management.
• Identify critical service components like
VPN gateways, critical services contributing
to remote access and increase the
frequency of scanning and patching
• Ensure regular vulnerability assessment
process is more governed and adopt
prioritization based on risk for the
organization rather just on the risk scores
of the vulnerability
• Ensure end-user machines connected
remotely are being governed through
corporate patch management solution.
7.
Practice Cyber-Hygiene
Habits
• Educate users to avoid usage of the public
network and instead invest in a dependable
private network for internet access and
preferably through corporate VPN.
• Ensure corporate VPN/Remote access
gateways are properly configured as per
defined corporate policies and are being
patched regularly.
• Keep anti-virus definition and system
patching up to date
9.
Using Secure means of
Communication
• Any interaction related to work need to be
communicated through secure means of
communication or Security enabled tools
• Do not use freeware for any video
conferencing or data sharing related to
corporate information exchange.
www.happiestminds.com
About Happiest Minds Technologies
Happiest Minds, the Mindful IT Company, applies agile methodologies to enable digital transformation for
enterprises and technology providers by delivering seamless customer experience, business efficiency and actionable
insights. We leverage a spectrum of disruptive technologies such as: Big Data Analytics, AI & Cognitive Computing,
Internet of Things, Cloud, Security, SDN-NFV, Blockchain, Automation including RPA, etc. Positioned as “Born Digital .
Born Agile”, our capabilities spans across product engineering, digital business solutions, infrastructure management
and security services. We deliver these services across industry sectors such as retail, consumer packaged goods,
edutech, e-commerce, banking, insurance, hi-tech, engineering R&D, manufacturing, automotive and
travel/transportation/hospitality.
A Great Place to Work-Certified™ company, Happiest Minds is headquartered in Bangalore, India with operations in
the U.S., UK, The Netherlands, Australia and Middle East.
Write to us at
Business@happiestminds.com

More Related Content

PPTX
Cyber Security A Challenges For Mankind
PPTX
Information security awareness - 101
PPTX
Cybersecurity
PDF
Application Security | Application Security Tutorial | Cyber Security Certifi...
PPTX
Cyber security
PPTX
Cyber security system presentation
PPTX
Cybersecurity Audit
PPTX
Ransomware
Cyber Security A Challenges For Mankind
Information security awareness - 101
Cybersecurity
Application Security | Application Security Tutorial | Cyber Security Certifi...
Cyber security
Cyber security system presentation
Cybersecurity Audit
Ransomware

What's hot (20)

PPTX
Implementing cybersecurity best practices and new technology ppt (1).pptx
PDF
Security Awareness Training
PPTX
Cyber security Information security
PDF
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
PPTX
Information Security Awareness Training Open
PPTX
Cyber security
PPTX
cyber security
PPTX
CyberSecurity
PPTX
Cyber security
PPTX
What is Zero Trust
PDF
End-User Security Awareness
PPTX
Cybercrime and Security
PPTX
Cyber Security Best Practices
PPT
Employee Security Training[1]@
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
PDF
Introduction to Cybersecurity
PDF
Cybersecurity Awareness Training Presentation v1.0
PDF
Cybersecurity Employee Training
PDF
Mobile Security
Implementing cybersecurity best practices and new technology ppt (1).pptx
Security Awareness Training
Cyber security Information security
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Information Security Awareness Training Open
Cyber security
cyber security
CyberSecurity
Cyber security
What is Zero Trust
End-User Security Awareness
Cybercrime and Security
Cyber Security Best Practices
Employee Security Training[1]@
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Introduction to Cybersecurity
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Employee Training
Mobile Security
Ad

Similar to BEST CYBER SECURITY PRACTICES (20)

PPTX
IBM Messaging Security - Why securing your environment is important : IBM Int...
PPTX
3433 IBM messaging security why securing your environment is important-feb2...
PDF
2024-Cybersecurity-Outlook for all engineering students
PPTX
Zero Trust: Redefining Security in the Digital Age
PDF
Authentication_Best_Practices_WP(EN)_web
PDF
Insights into cyber security and risk
 
PDF
What Is Network Security Definition, Types, and Best Practices in 2024
PPTX
Embracing secure, scalable BYOD with Sencha and Centrify
PDF
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
PPTX
SAM05_Barber PW (7-9-15)
DOCX
Project Quality-SIPOCSelect a process of your choice and creat.docx
PPT
How to Raise Cyber Risk Awareness and Management to the C-Suite
PDF
CYB 102 – Fundamentals of Cyber Security .pdf
PDF
Fortifying Cybersecurity. Strategic Measures for Fintech and Business Leaders...
PDF
Securing Your Network with Innovative Technologies
PDF
Steps to Prevent a Ransomware Attack.pdf
PDF
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
PDF
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
DOCX
“Verify and never trust”: The Zero Trust Model of information security
PDF
Top Cybersecurity Trends for 2024: Stay Ahead of Emerging Threats
IBM Messaging Security - Why securing your environment is important : IBM Int...
3433 IBM messaging security why securing your environment is important-feb2...
2024-Cybersecurity-Outlook for all engineering students
Zero Trust: Redefining Security in the Digital Age
Authentication_Best_Practices_WP(EN)_web
Insights into cyber security and risk
 
What Is Network Security Definition, Types, and Best Practices in 2024
Embracing secure, scalable BYOD with Sencha and Centrify
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
SAM05_Barber PW (7-9-15)
Project Quality-SIPOCSelect a process of your choice and creat.docx
How to Raise Cyber Risk Awareness and Management to the C-Suite
CYB 102 – Fundamentals of Cyber Security .pdf
Fortifying Cybersecurity. Strategic Measures for Fintech and Business Leaders...
Securing Your Network with Innovative Technologies
Steps to Prevent a Ransomware Attack.pdf
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
“Verify and never trust”: The Zero Trust Model of information security
Top Cybersecurity Trends for 2024: Stay Ahead of Emerging Threats
Ad

More from Happiest Minds Technologies (20)

PDF
Happiest MInds - Pimcore PIM Expertise.pdf
PDF
A Quick Guide to Product Information Management (PIM)
PDF
Largest Electricity provider in the US- Case Study
PDF
BFSI GLOBAL TRENDS FY 24
PDF
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
PDF
DIGITAL MANUFACTURING
PDF
Exploring the Potential of ChatGPT in Banking, Financial SERVICES & Insurance
PDF
AN OVERVIEW OF THE METAVERSE
PDF
VMware to AWS Cloud Migration
PDF
Digital-Content-Monetization-DCM-Platform-2.pdf
PDF
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
PDF
Cloud Reshaping Banking
PDF
Automating SOC1/2 Compliance- For a leading Software solution company in UK
PDF
PAMaaS- Powered by CyberArk
PDF
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
PDF
SECURING THE CLOUD DATA LAKES
PDF
Complete Guide to General Data Protection Regulation (GDPR)
PDF
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
PDF
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
PDF
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
Happiest MInds - Pimcore PIM Expertise.pdf
A Quick Guide to Product Information Management (PIM)
Largest Electricity provider in the US- Case Study
BFSI GLOBAL TRENDS FY 24
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
DIGITAL MANUFACTURING
Exploring the Potential of ChatGPT in Banking, Financial SERVICES & Insurance
AN OVERVIEW OF THE METAVERSE
VMware to AWS Cloud Migration
Digital-Content-Monetization-DCM-Platform-2.pdf
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
Cloud Reshaping Banking
Automating SOC1/2 Compliance- For a leading Software solution company in UK
PAMaaS- Powered by CyberArk
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
SECURING THE CLOUD DATA LAKES
Complete Guide to General Data Protection Regulation (GDPR)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT

Recently uploaded (20)

PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Electronic commerce courselecture one. Pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Approach and Philosophy of On baking technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
MYSQL Presentation for SQL database connectivity
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Cloud computing and distributed systems.
PDF
Encapsulation theory and applications.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Electronic commerce courselecture one. Pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
NewMind AI Weekly Chronicles - August'25 Week I
Approach and Philosophy of On baking technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Machine learning based COVID-19 study performance prediction
Understanding_Digital_Forensics_Presentation.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
MYSQL Presentation for SQL database connectivity
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Cloud computing and distributed systems.
Encapsulation theory and applications.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Advanced methodologies resolving dimensionality complications for autism neur...

BEST CYBER SECURITY PRACTICES

  • 1. WHILE WORKING FROM HOME BEST CYBER SECURITY PRACTICES 12.5% 39 sec 94% $250M Victimized organizations that paid associated Ransoms rose from 45% to 57.5%” in 2020. - Cyberthreat Defense Report The malicious Hacking attack occurs every 39 sec - University Of Maryland 94% of malware is delivered via email. -CSO 71% of breaches are Financially motivated. the second most common reason is Espionage, Accounting for 25% of Data Breaches. - Infosec Worldwide spending on Cybersecurity is going to reach $133.7 billion in 2022 - Gartner Deep fake scams are going to cost the world more than $250 million this year - Forrester Research 67% of enterprise survey respondents for 2020 Global Encryption Trends Study identify Data Visibility as biggest challenge - Ponemon Institute 71% FACTS AND FIGURES $133.7 billion 67% 1. Endpoint Security compliance check • • Ensure continuous detection and monitoring mechanisms are in place and functioning Organizations should have the ability to manage their endpoints and check its compliance while users are not connected to the corporate networks • Bring your own device (BYOD) policies are defined and security checks in place for scanning the systems for policy checks before permitting to connect. 2. Data Security and Privacy a Priority • Employees having access to confidential data or PI data should be trained on the emphasis of confidentiality and secure handling of data • Such employees access should be governed periodically and ensure least privilege policy is maintained • Adequate training to the employees on company policies and awareness program. Educating them on various techniques like phishing and more used for exploits • Engage solutions which could identify possible data leakages like source code leak, credentials leak 3. User awareness training programs • Interactive training sessions to engage users in understanding organizations infosec policies and good practices to be followed • Simulated attack-based training has proven effective in educating users, so it is a good option for organizations to adopt such training for users • Such training should also include good practices to be adopted by users while working from home 4. Multi-Factor Authentication for Protection • MFA has become one of the key factors for two-step verification and secures personal information with special controls with VPNs • MFA should also be extended to some critical applications/systems adding another layer of protection • Ensure the device authorization check is included as part of your VPN connectivity 5. Privilege User Management • Privilege accounts are the most critical components of access management, and there has to be processed in place to check if RBAC is aligned on the principle of least privilege • In this situation, it suggested to increase the frequency of privilege account audits and clean up immediately upon identification 8. Process Report Incident • Reporting any security issues to the IT Team • Educate users on what all qualifies as a security incident and importance of reporting any security issues to the IT Team • Outlook plugin will be an added advantage to report suspicious emails. • Ask the security monitoring teams to keep a close look on active threats and campaigns triggered to exploit the COVID situation 6. Vulnerability Assessment and Patch Management. • Identify critical service components like VPN gateways, critical services contributing to remote access and increase the frequency of scanning and patching • Ensure regular vulnerability assessment process is more governed and adopt prioritization based on risk for the organization rather just on the risk scores of the vulnerability • Ensure end-user machines connected remotely are being governed through corporate patch management solution. 7. Practice Cyber-Hygiene Habits • Educate users to avoid usage of the public network and instead invest in a dependable private network for internet access and preferably through corporate VPN. • Ensure corporate VPN/Remote access gateways are properly configured as per defined corporate policies and are being patched regularly. • Keep anti-virus definition and system patching up to date 9. Using Secure means of Communication • Any interaction related to work need to be communicated through secure means of communication or Security enabled tools • Do not use freeware for any video conferencing or data sharing related to corporate information exchange. www.happiestminds.com About Happiest Minds Technologies Happiest Minds, the Mindful IT Company, applies agile methodologies to enable digital transformation for enterprises and technology providers by delivering seamless customer experience, business efficiency and actionable insights. We leverage a spectrum of disruptive technologies such as: Big Data Analytics, AI & Cognitive Computing, Internet of Things, Cloud, Security, SDN-NFV, Blockchain, Automation including RPA, etc. Positioned as “Born Digital . Born Agile”, our capabilities spans across product engineering, digital business solutions, infrastructure management and security services. We deliver these services across industry sectors such as retail, consumer packaged goods, edutech, e-commerce, banking, insurance, hi-tech, engineering R&D, manufacturing, automotive and travel/transportation/hospitality. A Great Place to Work-Certified™ company, Happiest Minds is headquartered in Bangalore, India with operations in the U.S., UK, The Netherlands, Australia and Middle East. Write to us at Business@happiestminds.com