• Home
  • About 404TS
  • Contact

404 Tech Support

Where IT Help is Found

  • Articles
    • Code
    • Entertainment
    • Going Green
    • Hardware, Gadgets, and Products
    • Management
    • Network
    • News
    • Operating Systems
    • Security and Privacy
    • Software
    • System Administration
    • Talking Points
    • Tech Solutions
    • Web
    • Webmaster
  • Reviews
  • Media
    • Infographics
    • Videos
  • Tech Events
  • Tools
    • How do I find my IP address?
    • Browser and plugin tests
  • Get a Technical Consultation
You are here: Home / Articles / Security and Privacy / Practicing good hygiene when it comes to IT security

Practicing good hygiene when it comes to IT security

2015-03-05 by Jason

Hygiene is the practice of maintaining good health and preventing disease, especially through cleanliness. When it comes to human beings, hygiene can refer to many things including brushing your teeth, flossing, showering, and other good practices.

The habit part of practicing good hygiene is the part that interests practical IT security. Good hygiene in IT would consist of establishing similar routines for updating software and the operating system, ensuring the antivirus and other security software is updating and running properly.

IT hygiene can be carried out by the end user or the administrator of the computers. Working on a larger scale, the administrator might use tools like WSUS to monitor computers in need of Windows Updates or vulnerability scanners to identify computers in need of third-party software updates. These might also detect devices on your network, unsupported operating systems, open ports, disabled firewalls, and other configurations that need attention.

Just like you should be brushing your teeth regularly, good IT hygiene would involve a routine and regular oversight to ensure everything is maintained. Good hygiene prevents disease, good IT hygiene prevents vulnerabilities and malware infections.

Filed Under: Security and Privacy

Trending

  • Latest Global Phishing Survey released from Anti-Phishing Working Group
    In Security and Privacy
  • Review of Samsung Epic 4G Official Accessories
    In Hardware, Gadgets, and Products
  • Adobe Flash and Acrobat Vulnerabilities In The Wild and a 64-Bit Flash Player
    In Security and Privacy, Software

Latest Media Posts

Find Out Where To Download SNES ROMs

Find Out Where To Download SNES ROMs

Multifunctional Video Conversion Tools – Wondershare Video Converter

Multifunctional Video Conversion Tools – Wondershare Video Converter

  • Popular
  • Latest
  • Today Week Month All
  • How to ‘Unblock’ multiple files at a time with PowerShell How to 'Unblock' multiple files at a time with PowerShell
  • Command line to take ownership and change permissions Command line to take ownership and change permissions
  • Increase IIS Private Memory Limit to improve WSUS availability Increase IIS Private Memory Limit to improve WSUS availability
  • SOLVED: “This modification is not allowed because the selection is locked.” SOLVED: "This modification is not allowed because the selection is locked."
  • Creating and editing views in phpMyAdmin Creating and editing views in phpMyAdmin
  • customer contactless payment for drink with mobile phon at cafe counter bar,seller coffee shop accept payment by mobile.new normal lifestyle concept The Latest Innovations In Payment Technology
  • How Digital Technology Brought the Rise of the CMO   How Digital Technology Brought the Rise of the CMO  
  • How to Purchase Cryptocurrencies? How to Purchase Cryptocurrencies?
  • Top 6 necessary aspects to consider when hiring Angular developers Top 6 necessary aspects to consider when hiring Angular developers
  • Full guide on drawbacks and benefits of Node.js for making the perfect choice for your business Full guide on drawbacks and benefits of Node.js for making the perfect choice for your business
Ajax spinner

Elevator Pitch

404 Tech Support documents solutions to IT problems, shares worthwhile software and websites, and reviews hardware, consumer electronics, and technology-related books.

Subscribe to 404TS articles by email.

Recent Posts

  • The Latest Innovations In Payment Technology
  • How Digital Technology Brought the Rise of the CMO  
  • How to Purchase Cryptocurrencies?

Search

FTC Disclaimer

404TechSupport is an Amazon.com affiliate; when you click on an Amazon link from 404TS, the site gets a cut of the proceeds from whatever you buy. This site also uses Skimlinks for smart monetization of other affiliate links.
Use of this site requires displaying and viewing ads as they are presented.

Copyright © 2023 · Magazine Pro Theme on Genesis Framework · WordPress · Log in