The world of cybersecurity is constantly inundated with news on the latest data breaches, cybercriminal attack trends, and security measures. And while that information is critical for adapting to the ever-changing nature of cybercrime, it\u2019s also important to pay attention to foundational measures as well. Basic security hygiene still protects against 98% of attacks.\n\nAs companies become increasingly reliant on technology and online systems to conduct their business, meeting the minimum standards for cyber hygiene is essential for protecting against cyber threats, minimizing risk, and ensuring ongoing business viability.\n\nRead on to learn what these standards are and how you can begin implementing them in your organization.\n\nIncrease your cyber hygiene in 5 steps\n\nHowever, in order for MFA to be effective, it must be frictionless. Options like device biometrics or FIDO2 compliant factors such as Feitan or Yubico security keys can help increase security without placing an additional burden on employees. Likewise, MFA should be strategically leveraged to help protect sensitive data and critical systems rather than applying it to every single interaction.\n\nFinally, MFA should be easy for end users. Conditional access policies are a great solution here, as they can trigger two-step verification based on risk detections, as well as pass-through authentication and single sign on (SSO). This helps reduce the need for end users to navigate multiple sign-on sequences to access non-critical file shares or calendars on the corporate network as long as their devices are updated. It also eliminates the need for 90-day password resets.\n\nBy adopting Zero Trust, organizations can better support remote and hybrid work, help prevent or reduce business damage from a breach, identify and help protect sensitive business data and identities, and build confidence in your security posture and programs across the enterprise.\n\nFirst are security automation and orchestration best practices. To start, we recommend moving as much work as possible to your sensors. Focus on deploying sensors that automate, correlate, and interlink findings prior to sending them to an analyst. Similarly, you can automate alert collection and prioritization to help reduce the load on your security operations analysts. We also recommend automating common, repetitive, and time-consuming administrative processes first before standardizing response procedures. Finally, focus on continuous improvement by monitoring key metrics and tuning your sensors and workflows to drive incremental changes.\n\nWhen it comes to actually preventing, detecting, and responding to threats, integrated extended detection and response (XDR) and security information and event management (SIEM) solutions can help defend against threats across all workloads. Some common risk areas that attackers target include remote access solutions, email and collaboration software, and internet-exposed endpoints. Integrated XDR and SIEM come into play by providing high-quality alerts and minimizing friction and manual steps during response.\n\nOrganizations can help circumvent this risk by following best practices such as applying software patches as soon as they\u2019re released. You should also change default passwords and SSH ports to ensure devices are robust. It\u2019s also important to gain deeper visibility into the IoT\/OT devices on your network and prioritize them by risk to the enterprise if they are compromised. You can further reduce your attack surface by eliminating unnecessary internet connections and open ports, restricting remote access by blocking ports, denying remote access, and using VPN services.\n\nIn order to implement this defense-in-depth approach, you must identify your data landscape by understanding where your data lives and how it\u2019s accessed. Along a similar vein, you\u2019ll need to protect your data when it\u2019s at rest and in transit. This is done by accurately labeling, classifying, and tracking the movement of your data.\n\nOnce this data is mapped and labeled, you\u2019ll need to manage any user risks or internal threats that can lead to potential data security incidents, and that includes internal threats. This can be done through a combination of the right people, processes, training, and tools. There\u2019s also the issue of data loss and the unauthorized use of data. An effective data loss protection solution should balance protection and productivity by ensuring proper access controls and policies to help prevent the improper saving, storing, or printing of sensitive data.\n\nFinally, as data governance shifts and business teams become the stewards of their own data, organizations must work to create a unified approach across the enterprise. Proactive data lifecycle management can lead to better data security and help ensure that data is responsibly democratized for the user, where it can drive business value.\n\n\n\nAlthough threat actors continue to evolve and grow more sophisticated, simple measures such as enabling MFA, applying Zero Trust principles, keeping systems up to date, using modern anti-malware solutions, and protecting data can help prevent 98% of attacks. To learn more about how you can enhance security within your organization and get the latest threat intelligence, visit Microsoft Security Insider.