BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    Use Cases and Industries
    See All Products
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

National Cybersecurity Awareness Month: Week 1 - The Basics

October 6, 2017

  • Blog
  • Archive
National Cybersecurity Awareness Month As we reflect back on the first week of National Cybersecurity Awareness Month, all of the major news, crazy tweets, and personal dilemmas, we need to remember why this month is important. Cybersecurity Awareness Month is promoted to gain visibility, understanding, and action for the common security flaws we experience every single day – from secure passwords to applying security patches. While most security professionals understand the scope, others may be naïve to the risks. Therefore, if you have not done anything yet for Cybersecurity Awareness Month, consider starting with these recommendations and make sure to teach your family, friends, and peers to do these on a regular basis:
  • Change your email, domain, financial, and social media passwords. Make sure they are all unique and that no two passwords are the same. This helps stop the compromise of one password from being used on other websites and applications.
  • Execute Windows Update or Apple Updates on your computers. Keeping your computer up to date for security patches is critical in stopping threats. If you do not have time to execute it manually, Microsoft and Apple allow you to set preferences so these will automatically be applied – a set it and forget it approach.
  • Third party applications like Adobe Flash are notorious for allowing security breaches on assets. Just like Windows Update consider running their dedicated utilities to install the latest versions and security patches on a regular basis. In addition, just like operating system updates, these can be set to auto update as well keeping you safe and protected all the time.
  • If you have an iPhone, Android Phone, Office365, iTunes, Google Music, or Amazon Prime, you probably have some form of included cloud storage service. One of the lowest hanging fruits to protect your data and precious photos is to use any one of these included (or free) cloud services to back up your information. In the event of a device theft, fire, or ransomware – cloud storage can provide a safe haven for the data and photos we can never replace.
Cybersecurity Awareness Month is not only about electronic security. It also reminds us not to leave our devices unattended. Leaving a laptop in the car, a phone on a bar stool, or sharing accounts and passwords physically (on paper) with others are just poor cybersecurity practices. Our goal for the month is to raise awareness of the most common threats and teach everyone what to do - starting with the basics. As simple as it sounds, starting with the basics can stop the bulk of the modern threats we experience every day. Let us all get on board and make the simple changes needed to make us all more cybersecure. For more information on where to start improving your organization’s cybersecurity posture, check out this strategy guide, or contact us for a session today.
Photograph of Morey J. Haber

Morey J. Haber, Chief Technology Officer and Chief Information Security Officer at BeyondTrust

Morey J. Haber is Chief Technology Officer and Chief Information Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored four Apress books: Privileged Attack Vectors (2 Editions), Asset Attack Vectors, and Identity Attack Vectors. In 2018, Bomgar acquired BeyondTrust and retained the BeyondTrust name. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition. Morey currently oversees BeyondTrust strategy for privileged access management and remote access solutions. In 2004, he joined eEye as Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and named customer accounts. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Whitepapers

Mapping BeyondTrust Solutions to the Identity, Credential, and Access Management (ICAM) Architecture

Whitepapers

Four Key Ways Governments Can Prepare for the Growing Ransomware Threat

Whitepapers

The Operational Technology (OT) Remote Access Challenge

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.