No results found

Your search did not match any results.

We suggest you try the following to help find what you're looking for:

  • Check the spelling of your keyword search.
  • Use synonyms for the keyword you typed, for example, try “application” instead of “software.”
  • Try one of the popular searches shown below.
  • Start a new search.
Contact Us Sign in to Oracle Cloud

Cyber Hygiene Fundamentals

Security Hygiene: The First Line of Security

Understand why security hygiene is critical for protection, how to properly fix vulnerabilities, and how to achieve and maintain success through organizational alignment.

Watch the webcast (19:48)

The importance of cyber hygiene and consistent maintenance

It’s fundamental. Protecting your organization from cyberattacks comes down to a solid security program, the basics—and executing these well. Securosis’ research reinforces the importance of completing the seemingly simple, perhaps even boring tasks first, to reduce the risk of exposing critical IT systems to known vulnerabilities. The report covers strategies to ensure visibility of IT assets, and to achieve and maintain a strong and consistent security posture across those assets.

Keys to success

Fixing vulnerabilities by patching

Given the ease with which adversaries can change their attack signature to evade detection and temporary virtual patches, the fact that it’s impossible to come up with a perfect detection signature, and the difficulty in ensuring that all traffic goes through an inspection point, deploying a vendor patch is the only long-term solution.1

Fix vulnerabilities fast and completely with vendor-issued updates. It’s important to have a robust high-priority patching process in place that ensures patches address high-risk vulnerabilities quickly and correctly. Organizations need to establish and agree on criteria to trigger these high-priority (out-of-cycle) patching efforts. Hackers too often quickly exploit publicly known security vulnerabilities. Don’t give hackers an easy way in.

Fixing vulnerabilities by patching

Sharing the responsibilities

Over the long term, strategically using PaaS services is one of the better ways to reduce technology stack risk.1

Work with a known, reliable, trusted vendor who can offer validated support. Relying on third parties can even grow the potential attack surface area, increasing rather than mitigating risk. In addition, cloud services help take the security responsibility off the customer, leading to a safer and more future-proof IT strategy.

Sharing the responsibilities

Aligning your organization

The best long-term solution will always involve patches provided directly from the vendor…1

To work together effectively, all teams need to be aligned on cyber hygiene. It’s critical to have a patching strategy in place to move quickly and immediately apply any high-priority patch that fixes a known vulnerability.

Aligning your organization

Learn more about cyber hygiene fundamentals

1 Securosis Report, “Security Hygiene: The First Line of Security,” May 2021.