{"id":21190,"date":"2018-12-06T17:00:16","date_gmt":"2018-12-06T17:00:16","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\/"},"modified":"2018-12-06T17:00:16","modified_gmt":"2018-12-06T17:00:16","slug":"ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\/","title":{"rendered":"CISO series: Strengthen your organizational immune system with cybersecurity hygiene"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/wp-content\/themes\/cloudperspectives\/dist\/images\/MSFT_logo_rgb_C-Gray_1200_x_627.png\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>One of the things I love about my job is the time I get to spend with security professionals, learning firsthand about the challenges of managing security strategy and implementation day to day. There are certain themes that come up over and over in these conversations. My colleague Ken Malcolmson and I discussed a few of them on the inaugural episode of the <a target=\"_blank\" href=\"https:\/\/info.microsoft.com\/ww-thankyou-Microsoft-Webcast-CISO-Spotlight-Series-101-video.html?LCID=EN-US\" rel=\"noopener\">Microsoft CISO Spotlight Series: CISO Lessons Learned<\/a>. Specifically, we talked about the challenges CISOs face migrating to the cloud and protecting your organization\u2019s data. In this blog, I dig into one of the core concepts we talked about: practicing cybersecurity hygiene.<\/p>\n<p>Hygiene means conditions or <a target=\"_blank\" href=\"https:\/\/en.oxforddictionaries.com\/definition\/hygiene\" rel=\"noopener\">practices conducive to maintaining health<\/a>. Cybersecurity hygiene is about maintaining cyberhealth by developing and implementing a set of tools, policies, and practices to increase your organization\u2019s resiliency in the face of attacks and exploits. Healthy habits like drinking lots of water, walking every day, and eating a rainbow of vegetables build up the immune system, so our bodies can fight off viruses with minimal downtime. Most of the time we don\u2019t even realize how powerful the protection of these behaviors are until that day deep in January when you look around your office and realize you are one of the only people who isn\u2019t sick. That\u2019s what cybersecurity hygiene does; it strengthens your organizational immune system. It\u2019s a simple concept until you start thinking about the last time you resolved to start practicing healthy habits but were skipping the salad by day three because big salads make your stomach bloat and you\u2019d rather have a candy bar anyway.<\/p>\n<h2>Success starts with strategy<\/h2>\n<p>No matter where in the world I am, CSOs and CISOs tell me their days are filled with fire drills and crises that consume attention and resources but don\u2019t help advance a strategic agenda. A little like that candy bar\u2014drawing focus in the present but diverting energy from long-term goals. In the precious moments of downtime, when cyber executives can turn attention to long-term strategy and proactive security measures, it\u2019s not uncommon to have those goals diverted in a different way\u2014chasing the latest trend that the board is excited about or having to react to failure or a finding from a recent security assessment.<\/p>\n<h2>Consistent change changes systems<\/h2>\n<p>Our bodies are systems\u2014when we eat more vegetables our microbiome changes, it becomes easier to digest those veggies and can actually begin craving them. But if you stock the pantry with candy instead of leafy greens, it\u2019s hard to make a consistent change. For cyberhealth, you need a strategy that works with the strengths of your organization and mitigates its weakness. It\u2019s a little like planning to be healthy. If you are social, it can help to enlist a friend in your exercise routine. If you work late, you can buy prepared, healthy food, so you aren\u2019t as tempted to grab that candy bar after a long day.<\/p>\n<p>To implement good security practices, take some time to understand your budget, your priorities, and your greatest vulnerabilities and allocate your money appropriately. Create strategic cybersecurity targets and goals for the next one, three, and five years and engage the C-Suite and board in the approvals. You will feel more empowered in conversations with the C-Suite when you have a good rationale and a solid plan and when cybersecurity hygiene becomes a systemic part of the organization, the healthy system will start to crave it.<\/p>\n<h2>Practice good cybersecurity hygiene<\/h2>\n<p>Once you have a strategy, you are ready to institute some best practices. We recommend getting started with the following to all our clients, big and small:<\/p>\n<ul>\n<li><strong>Back up data<\/strong>: Make sure you have a regular process to back up your data to a location separate from your production data and encrypt it in transit and at rest.<\/li>\n<li><strong>Implement identities<\/strong>: A good identity and access management solution allows you to enable a single common identity across on-premises and cloud resources with added safeguards to protect your most privileged accounts.<\/li>\n<li><strong>Deploy conditional access<\/strong>: Use conditional access to control access based on location, device, or other risk factors.<\/li>\n<li><strong>Use Multi-Factor Authentication<\/strong>: Multi-Factor Authentication works on its own or in conjunction with conditional access to verify that users trying to access your resources are who they say they are.<\/li>\n<li><strong>Patching<\/strong>: A strategy to ensure all of your software and hardware is regularly patched and updated is important to reduce the number of security vulnerabilities that a hacker can exploit.<\/li>\n<\/ul>\n<h2>Develop cybersecurity hygiene with industry security frameworks<\/h2>\n<p>Excited to build healthy cyber habits but not sure where to start? The National Institute of Standards and Technology (NIST) <a target=\"_blank\" href=\"https:\/\/www.nist.gov\/cyberframework\" rel=\"noopener\">Cybersecurity Framework<\/a> is a great place to start. You can also <a target=\"_blank\" href=\"https:\/\/servicetrust.microsoft.com\/ViewPage\/Blueprint?command=Download&amp;downloadType=Document&amp;downloadId=11e61716-11ab-4b11-9a9a-434b33a62ff9&amp;docTab=fc060920-cdb8-11e7-bacf-0bf52b09d912_NIST_CSF_Blueprint\" rel=\"noopener\">download blueprints<\/a> that will help you implement Microsoft Azure according to NIST standards.<\/p>\n<p>The Center for Information Security (CIS) is a non-profit organization that helps organizations protect themselves from cybercrime. Review the <a target=\"_blank\" href=\"https:\/\/azure.microsoft.com\/mediahandler\/files\/resourcefiles\/cis-microsoft-azure-foundations-security-benchmark\/CIS_Microsoft_Azure_Foundations_Benchmark_v1.0.0.pdf\" rel=\"noopener\">CIS Microsoft Azure Foundations<\/a> benchmark, which provides recommended steps to securely implement Azure.<\/p>\n<p>Stay healthy, eat your cyber vegetables, and stay up to date by watching our <a target=\"_blank\" href=\"https:\/\/info.microsoft.com\/ww-thankyou-Microsoft-Webcast-CISO-Spotlight-Series-101-video.html?LCID=EN-US\" rel=\"noopener\">Microsoft CISO Spotlight Series: CISO Lessons Learned<\/a>, and your organization can build the resiliency to take on any threat.<\/p>\n<p>READ MORE <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/12\/06\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity hygiene is about maintaining cyberhealth by developing and implementing a set of tools, policies, and practices to increase your organization&#8217;s resiliency in the face of attacks and exploits.<br \/>\nThe post CISO series: Strengthen your organizational immune system with cybersecurity hygiene appeared first on Microsoft Secure. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":21191,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347],"class_list":["post-21190","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISO series: Strengthen your organizational immune system with cybersecurity hygiene 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISO series: Strengthen your organizational immune system with cybersecurity hygiene 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-06T17:00:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"CISO series: Strengthen your organizational immune system with cybersecurity hygiene\",\"datePublished\":\"2018-12-06T17:00:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\\\/\"},\"wordCount\":885,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene.png\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\\\/\",\"name\":\"CISO series: Strengthen your organizational immune system with cybersecurity hygiene 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene.png\",\"datePublished\":\"2018-12-06T17:00:16+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene.png\",\"width\":1200,\"height\":627},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"CISO series: Strengthen your organizational immune system with cybersecurity hygiene\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CISO series: Strengthen your organizational immune system with cybersecurity hygiene 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\/","og_locale":"en_US","og_type":"article","og_title":"CISO series: Strengthen your organizational immune system with cybersecurity hygiene 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-12-06T17:00:16+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"CISO series: Strengthen your organizational immune system with cybersecurity hygiene","datePublished":"2018-12-06T17:00:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\/"},"wordCount":885,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene.png","keywords":["Cybersecurity"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\/","url":"https:\/\/www.threatshub.org\/blog\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\/","name":"CISO series: Strengthen your organizational immune system with cybersecurity hygiene 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene.png","datePublished":"2018-12-06T17:00:16+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene.png","width":1200,"height":627},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"CISO series: Strengthen your organizational immune system with cybersecurity hygiene"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/21190","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=21190"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/21190\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/21191"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=21190"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=21190"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=21190"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}