Cyber Hygiene is a set of best practices users should follow to improve the safety and security of their devices.
For detailed information on minimum security standards for Servers, Endpoint, and Multi-Function Devices based on UH Institutional Data Category type (Public, Restricted, Sensitive, and Regulated), please visit the following page: https://www.hawaii.edu/infosec/minimum-standards/
When working with Regulated Data, please refer to the applicable Standard, Act, or Policy (e.g., CMMC, PCI DSS, HIPAA, FERPA, NIST SP800-171, etc.) for specific details on any additional controls needed.
Best Practice | Description | References | |
---|---|---|---|
1 | Anti-Malware Software and Host Based Firewalls |
Install Anti-Malware software and ensure its signatures are regularly updated. Anti-Malware software is a key protective measure to detect, quarantine, and remove various types of malware. Trellix (formerly McAfee) antivirus software is licensed by the University of Hawaiʻi (UH), Information Technology Services (ITS) site license for use by active UH faculty, staff, and students: https://www.hawaii.edu/askus/1254 In addition to Anti-Malware software, most modern operating systems have built-in Host-Based Firewalls. These firewalls run directly on your device, offering an extra layer of defense against network-based cyberattacks. Ensure your firewall is always active and properly configured to enhance your overall security. |
|
2 | Regularly Update Software | Regular software updates are among the most effective steps to strengthen your cybersecurity. This includes updates for operating systems, firmware, patches, and security fixes. Most software now automatically checks for updates, so ensure this feature is enabled to keep your systems protected. |
|
3 | Multi-Factor Authentication |
Multi-Factor Authentication (MFA) is required for all UH users when accessing UH resources. MFA adds an extra layer of security beyond just a username and password, requiring a second factor—like your smartphone—to log in. This significantly reduces the risk of unauthorized access, as attackers would need both your password and the second factor to succeed. ITS supports the use of MFA. Please visit the following sites for further information on MFA and how to set it up: |
|
4 | Set Strong Passwords |
If your password has been compromised or exposed in a data breach, NEVER reuse it on any other account. Reusing compromised passwords significantly increases the risk of further security breaches. Strong passwords are key to protecting unauthorized access. Best practices include: With the use of Multi-Factor Authentication:
Without Multi-Factor Authentication:
Additional best practices include:
Password Managers:
|
|
5 | Use Encryption |
Data is stored across various devices, including desktops, laptops, and removable storage media like USB drives, external hard drives, and CDs/DVDs. Sensitive information requires extra care. Encryption is a critical method for safeguarding this data, ensuring that the information remains secure even if accessed by unauthorized individuals. The following article discusses the encryption options available: https://www.hawaii.edu/infosec/resources-tips/encryption/ When sending files, consider using the UH File Drop service: https://www.hawaii.edu/filedrop/ |
|
6 | Back Up Your Data | Regularly back up your data to removable media or a cloud-based service like Google Drive. Ensure that your backups are encrypted to protect your information. Regular backups are essential to recover your data in case of corruption, loss, theft, or other failures. |
|
7 | Lock your Devices | Always lock your device when stepping away, requiring a password to regain access and preventing unauthorized access. Configure your device to automatically lock after 10 minutes or less of inactivity. When you’re finished working for the day, consider shutting down your workstation or, at a minimum, log out. |
|
8 | Limit the use of Administrative Accounts |
Administrative accounts have elevated privileges, allowing actions that standard user accounts cannot perform, such as installing software, disabling anti-malware programs, managing user accounts, and controlling services. If a standard (non-privileged) account is compromised, the potential damage is usually limited. The best practice is to use a non-privileged account for everyday activities like browsing the internet and checking email. When you need to perform administrative tasks, log in with an administrative account and log out immediately after completing the task. |
|
9 | Recognize Phishing |
Phishing is one of the most common and straightforward methods attackers use to compromise your device and steal sensitive information. Follow these best practices to reduce your risk:
For more details, please visit the following:
|
|
10 | Mobile Device Security |
Mobile devices require strong cyber hygiene practices due to their portability and everyday use. In addition to general best practices:
|
|
11 | Internet of Things (IoT) Devices |
CISA.gov refers to the Internet of Things (IoT) as any “object or device that sends and receives data automatically through the Internet. This rapidly expanding set of “things” includes tags (also known as labels or chips that automatically track objects), sensors, and devices that interact with people and share information machine to machine.” Common IoT devices include Network Attached Storage (NAS), sensors like temperature readers, Universal Plug and Play (UPnP) devices, and IP-based devices such as routers, cameras, and printers. Given the increasing prevalence of IoT devices in both work and home environments, this section will explore the associated risks, best practices, and how various Cyber Hygiene Best Practices (CHBP) can work together to reduce the risk exposure of these devices. Risks
Best Practices When considering IoT devices for work or home, lacking these basic security features significantly increases the risk of compromise:
|
|