Skip to content
    Request A Free Trial
    cyber hygiene

    What is Cyber Hygiene Training?

    A form of security awareness training that teaches users how to maintain a secure digital environment. It includes topics such as identifying phishing attacks, using strong passwords, protecting personal information, and understanding basic concepts of computer security.

    Cyber hygiene checklist

    Cyber hygiene training is for both employees and cybersecurity teams. Consider the following practices as the basis of a comprehensive cyber hygiene checklist:

    • Keep current on software and operating system patches
    • Require strong passwords and multi-factor authentication
    • Follow the principle of least privilege
    • Stay current with asset discovery by implementing systems to continually identify, catalog, and monitor IT assets
    • Maintain an up-to-date asset inventory list of all IT assets that belong to your organization that support business processes
    • Ensure employees are properly trained on how they can help minimize the organization's cyber attack surface
    • Encrypt storage drives and devices
    • Install firewalls and anti-malware software
    • Don’t share login credentials for any systems

    See the Platform

    See the Axonius Platform for yourself with an interactive product tour, where we'll guide you through key applications of our Cybersecurity Asset Management and SaaS Management solutions.

    Get a Free Trial

    Sign-up for a free full-access 30 day trial to learn how Axonius gives IT and security teams a comprehensive understanding of all assets, their relationships, and business-level context including devices, identities, software, SaaS applications, vulnerabilities and security controls, and more.

    Book a Demo

    Request a demo to learn how the Axonius Platform provides a system of record for all digital infrastructure helping IT and security teams manage an always-expanding sprawl of devices, users, software, SaaS applications, cloud services, and the tools used to manage and secure them.