Basic Cybersecurity Hygiene

The principles rules of Zero Trust:
- Always Verify
- Least Privilege Access
- Assume Breach

But to add:
- Context-aware authentication
- Micro-segmentation
- Strong encryption methods
- Automated threat response and remediation

/r
I like your hygiene practice sir. May I get you to expound on the "Context-aware authentication", please!
 
I like your hygiene practice sir. May I get you to expound on the "Context-aware authentication", please!
A logon that is based on factors in real-time, such as logon location + this/that device + time of day - like an aligning of the planets before you get to log on.
 
The principles rules of Zero Trust:
- Always Verify
- Least Privilege Access
- Assume Breach

But to add:
- Context-aware authentication
- Micro-segmentation
- Strong encryption methods
- Automated threat response and remediation

/r
I echo ZT - zero trust.

Don't trust emails. Scan, and don't click.
Don't trust the auth systems. Use MFA. Audit regularly.
Don't trust the devices. Update firmware, and install patches.
Don't trust the connection. Use encryption. Use VPN. Use secure connections only.
etc.