{"type":"document","data":{"id":"5f89bfbf-ae38-483e-acc6-f19681216c98","localeString":"en-GB","publishDate":"2024-06-11T16:24:18.415+02:00","contentType":"onecms:editorialPage","hasMacro":false,"flexPageMetadata":{"afmBanner":false,"robotInstruction":{"noIndex":false,"noFollow":false},"description":"Cyber hygiene is a set of practices and measures put in place to provide IT security to the organisation."},"mainHeaderZone":{"componentType":"editorialHeader","coreHeader":{"title":"Corporate cyber hygiene","body":"Cyber hygiene is a set of practices and measures put in place to provide IT security to the organisation. These are explained to employees and observed by them in the course of their work."},"backLink":{"textLink":{"url":"/en/business/news/secure-business","text":"secure business"}},"date":"2023-08-09","readingTime":3},"flexZone":{"flexComponents":[{"componentType":"paragraph","richBody":{"value":"<p></p>"},"alignedImage":{"position":"top","transformBaseUrl":"https://assets.ing.com/transform/0443f2bf-bf50-4e13-b816-c139ff25ed6c/Keys-on-a-board","original":"https://assets.ing.com/m/4f0a0c82c1ad42b1/original/Keys-on-a-board.jpg","extension":"jpg"}},{"componentType":"sectionTitle","title":"Cyber hygiene and corporate culture"},{"componentType":"paragraph","richBody":{"value":"<p>Cyber hygiene is (or should become) a natural component of corporate security.</p><p>It often happens that implementing cyber hygiene practices does not have the desired effect because it lacks one of its most important components, namely getting all employees on board. They need to know the security rules, understand how useful they are and finally apply them in their daily lives.  </p><p>That&apos;s why it&apos;s a good idea to make cyber hygiene part of the company&apos;s culture:</p><blockquote><p>In our company, we take care of our online security and that of our customers</p></blockquote><p>By focusing on awareness, best practices and risk management, this training course will help companies strengthen their security and protect themselves against cyber attacks. </p>"}},{"componentType":"sectionTitle","title":"The key elements of cyber hygiene"},{"componentType":"paragraph","richBody":{"value":"<p>Here are some important elements of cyber hygiene in the workplace: </p><ol><li><strong>Password management: </strong>Encourage the use of strong, unique passwords for each account, and implement a policy of regular password changes. </li><li><strong>Regular updates: </strong>Apply security patches and updates to the systems and software used in the company to remedy known vulnerabilities. </li><li><strong>Malware protection: </strong>Use anti-virus software and firewalls to detect and prevent malware infections. </li><li><strong>Network security: </strong>Configure and secure the company&apos;s internal and external networks to prevent unauthorised access and attacks.</li><li><strong>Employee awareness: </strong>Regularly train employees on IT security best practices, how to detect phishing attempts and the procedures to follow in the event of a security breach. </li><li><strong>Data backup: </strong>Carry out regular back-ups of critical company data and store them in secure (and disconnected) locations to minimise the risk of loss in the event of a breakdown or cyber-attack. </li><li><strong>Access management:</strong> Implement access and authorisation management policies to restrict access to systems and data to authorised persons only. </li><li><strong>Multi-factor identification: </strong>It is one of the most important elements in the organisation&apos;s security. Introducing a second factor for employee identification (mobile app such as Google or Microsoft Authenticator, temporary code generator, physical security key) makes it virtually impossible for a cybercriminal to enter the company&apos;s IT network posing as an employee. The introduction of this protection must be accompanied by training for employees on how it works. </li></ol>"}}]},"complementaryZone":{"flexComponents":[{"componentType":"sectionTitle","title":"Also interesting!"},{"componentType":"cards","cards":[{"componentType":"articleCard","cardType":"article","cardSize":"medium","title":"Protect your company against cybercriminals? Yes, you can!","body":"Follow our cybersecurity trainings and close the door to cybercriminals","image":{"transformBaseUrl":"https://assets.ing.com/transform/9b6efb10-8f60-41f5-bac3-5e4e15706ac1/Silhouette-of-a-business-man-walking-along-a-passage-with-green-trees-reflecting-in-the-glass","type":"image","width":5200,"altTextEN":"\"\"","altTextNL":"\"\"","altTextFR":"\"\"","altTextDE":"\"\"","original":"https://assets.ing.com/m/6dbf2299c845b8ad/original/Silhouette-of-a-business-man-walking-along-a-passage-with-green-trees-reflecting-in-the-glass.jpg","extension":"jpg"},"date":"2024-03-20","link":{"url":"/en/business/news/secure-business/business-trainings"}},{"componentType":"articleCard","cardType":"article","cardSize":"medium","title":"Cybersecurity awareness for business employees","body":"Reduce risks and protect confidential company data","image":{"transformBaseUrl":"https://assets.ing.com/transform/cadf3a99-6d76-4dba-97c4-f983a535a2e8/Startups-presentatie_Private_Banking","type":"image","width":640,"original":"https://assets.ing.com/m/6476ed146ead66f5/original/Startups-presentatie_Private_Banking.jpg","extension":"jpg"},"date":"2023-08-09","link":{"url":"/en/business/news/secure-business/cyber-awareness-employees"}},{"componentType":"articleCard","cardType":"article","cardSize":"medium","title":"Cybersecurity reaction plan","body":"Limit the impact of a cyber-attack","image":{"transformBaseUrl":"https://assets.ing.com/transform/7997b036-5928-410a-ac3b-0469bec6d9ae/SIDE-VIEW-OF-A-MAN-WORKING-IN-THE-MIRROR","type":"image","width":6602,"altTextNL":"\"\"","original":"https://assets.ing.com/m/5ea7bb912077e52a/original/SIDE-VIEW-OF-A-MAN-WORKING-IN-THE-MIRROR.jpg","extension":"jpg"},"date":"2023-08-10","link":{"url":"/en/business/news/secure-business/business-reaction-plan"}},{"componentType":"articleCard","cardType":"article","cardSize":"medium","title":"Protect your company against cyber criminals","body":"Discover all government advice and tools","image":{"transformBaseUrl":"https://assets.ing.com/transform/c3ae90d5-0022-4227-b45a-3e997afe8006/CLOSE-UP-OF-SCULPTURE-AGAINST-METAL","type":"image","width":6543,"original":"https://assets.ing.com/m/243efa8799f32897/original/CLOSE-UP-OF-SCULPTURE-AGAINST-METAL.jpg","extension":"jpg"},"date":"2024-06-10","link":{"url":"/en/business/news/secure-business/protect-your-company-with-safeonwebatwork"}}]}]}}}