How to Incorporate Security Best Practices Into Your Workflow

Page 1

How to Incorporate Security Best Practices Into Your Workflow process.st/security-best-practices April 2, 2020

This is a guest post by Sam Bocetta, a retired engineer and current freelance journalist who specializes in writing about cyber defense, data privacy, and online security. Cybersecurity is a process, not an event. Though there are some tools and systems that you can put in place to dramatically improve the security of your workflow, in reality the best way to protect yourself against hackers is to stay constantly vigilant for emerging threats. For this reason, rigorous cybersecurity practices should be built into your general workflow. They should be an integral part of building a knowledge management system, and integrated into everyday business practices. One of the most powerful ways of doing this, and one that will also ensure that you don’t miss anything important, is to use checklists to codify daily, weekly, and monthly security tasks. This system should also clearly indicate responsibility for each task, and specify mitigation steps should any issues be found. 1/8


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
How to Incorporate Security Best Practices Into Your Workflow by Liz Angelene M Verano - Issuu