Basic Cybersecurity Hygiene

The principles rules of Zero Trust:
- Always Verify
- Least Privilege Access
- Assume Breach

But to add:
- Context-aware authentication
- Micro-segmentation
- Strong encryption methods
- Automated threat response and remediation

/r
I like your hygiene practice sir. May I get you to expound on the "Context-aware authentication", please!
 
I like your hygiene practice sir. May I get you to expound on the "Context-aware authentication", please!
A logon that is based on factors in real-time, such as logon location + this/that device + time of day - like an aligning of the planets before you get to log on.
 
The principles rules of Zero Trust:
- Always Verify
- Least Privilege Access
- Assume Breach

But to add:
- Context-aware authentication
- Micro-segmentation
- Strong encryption methods
- Automated threat response and remediation

/r
I echo ZT - zero trust.

Don't trust emails. Scan, and don't click.
Don't trust the auth systems. Use MFA. Audit regularly.
Don't trust the devices. Update firmware, and install patches.
Don't trust the connection. Use encryption. Use VPN. Use secure connections only.
etc.
 
A logon that is based on factors in real-time, such as logon location + this/that device + time of day - like an aligning of the planets before you get to log on.
Conditional Access. But that has to be enforced by the Application Vendor. Nothing i can enforce for myself. Nor so easy in a Company Enviroment.
Use a Password Management Solution.
 
If you happen to share a workstation with family members, it may be a good idea to apply some GPOs (Group Policy Objects) to further limit the actions of these users. &;-D
Some GPO? You have a domain at home? For a single computer there is only the local Securtiy Configuration, which is like 1 GPO for all Users or this Computer with different Settings applied. But only one GPO.