This Cybersecurity Guide provides a framework for integrating cybersecurity activities, and a quick overview of security controls that should also be used.

Cybercrime has become a major concern in today’s digital world. Cybercriminals who are looking for financial or business benefits will likely target smaller businesses that do not have cyber security personnel.

This Guide to Types of Cybersecurity outlines the various types of cybersecurity as well as their safeguards. We have created a list with 12 cybersecurity themes and basic and advanced recommendations to help you protect yourself against cyber-attacks and data breaches.

12 Cybersecurity Types / Cybersecurity Themes


To create a lasting training strategy throughout your organization, it is important to involve top management.

  • Designate an information security officer.
  • Find your ICT risks and protect your business’s future.
  • Conform to all legal and regulatory requirements concerning privacy, data processing, security and security.
  • You must be aware about cyber threats and vulnerabilities in your network.
  • Make certain that the information security officer (information security officer) is an independent agent and not part of the IT department.
  • Define the goals of network and system monitoring.
  • Find the legal consequences of data leaks, network failures, and other incidents.
  • Conduct periodic security and risk audits. The results and the action plan should be communicated to the management.


These are rules, laws, and practices that must be observed in the workplace. It is based upon existing risks and is intended to make employees and managers more responsible for preventing security incidents.

  • Use procedures to allow users (staff, trainees etc.) to arrive and depart. ).
  • Define security roles and responsibilities (physical, personnel).
  • Create and distribute a code for the responsible use of computing resources.
  • Schedule and run security audits.
  • Create a class scheme and traceability for sensitive information.
  • Incorporate notions such as “need to be informed”, “least privilege”, and “segregationof duties” into your corporate processes and policies.
  • Publish a responsible disclosure policy.
  • Keep sensitive documents locked in cabinets
  • Use a shredder to destroy sensitive documents.
  • Delete all documents that have been printed after the end of the working day.
  • Apply Locked Printer if possible.
  • Create a plan and concept for cybersecurity.


Workers are the weakest link of the information security chain. Inform your employees, both internal and externe, about information security risks. Check their understanding of your messages and make sure they test it. They will be your first line defense in the event of an attack.

  • Inform users about your code of conduct. Remind users regularly about the importance of safe behavior.
  • Remind users regularly that personal information should not be treated as confidential and that they must adhere to privacy protection rules.
  • Provide information to users on how to recognize Phishing (email fraud) and what to do.
  • Inform accounting personnel about “CEO fraud” to establish control procedures for payment execution.
  • Incorporate respect for the code of conduct and knowledge into staff evaluation.
  • Assess user responsiveness and awareness regularly.


Securing data is an essential concern for every business today. Information systems are vulnerable to multiple attacks, and many company systems contain sensitive private information.

  • Inform on the importance of software and equipment licenses.
  • Maintain an up-to-date and detailed map of all interconnections and networks.
  • Use as a configuration management tool, or at least one tool like Microsoft MMC, etc. ).
  • Definition of basic security configuration.
  • Make sure Service Level Agreements (and other Agreements) have security clauses.
  • Implement a change control process.
  • Use to ensure a consistent level of security across all your networks.
  • Conduct a regular audit of all configurations (including servers and firewalls as well as network components).


Your devices’ security is important as updates can correct errors and fix security flaws. You also have access to the most recent software features and design enhancements.

Consider the anti virus. An antivirus software is designed to protect your computer from malware and ensure that it remains secure. Because new computer viruses are constantly emerging, this software needs to be updated regularly.

  • Create an internal culture for the “patch”, which includes workstations, mobile devices and servers, as well as network components. ).
  • Install security patches on all software as soon possible.
  • Monitor its effectiveness and automate it.
  • Create a reference and test environment for new patches.
  • Update All third-party software such as browsers or plugins.
  • Create an emergency repair disk after the update, and make a complete backup of your servers before you do the update.


This is an important step in protecting your personal data.

There are many files and data on your computer or device. These files include photos and text documents (pay slips. taxes. scans. etc.). It also includes browsing data.

These data could be used to gain access to sensitive data which could result in the theft of your digital identities. This could include spoofing of your identity using private information such as your phone number, email address, photos, and so on. This may cause financial damage or damage to your reputation.

Viruses can spread to smartphones and computers (iOS and Android). They can also affect tablets and other devices.

It is important to make sure that your devices are all protected by antivirus software.

  • Antivirus software has been installed on all servers and workstations.
  • Antivirus Updates are done automatically.
  • Users are aware of how antivirus software warns you about a virus infection.
  • All viruses alerts have been analyzed and reported to an ICT specialist.
  • Antivirus software has been installed to all mobile devices.
  • Antivirus regularly tested with the EICAR test.


Employees from your company exchange confidential documents on a daily basis. Your data must be regularly backed-up for security, legal and strategic reasons. A solution provider is a good choice for your backup strategy. Trusted providers can help you restore data and ensure your data is safe.

Data security does not mean just having a backup solution. It is important to establish a policy for data backup within your company and procedures that all employees must follow.

  • Backups can be stored in a vault, or in a secure storage facility.
  • Tests of periodic restore are used to assess the quality and reliability of backups.
  • Data stored in the cloud encrypted


All computers that are connected to a server in the workplace can be considered part of the network. This vast network is your responsibility and you are responsible for its security. It is also your responsibility to ensure that data on computers within the network remains intact.

Protecting your systems requires that you ensure the security of your computing environment. Unauthorized access to any system connected is possible if it is not monitored.

Protect the areas around the computer, as well as the hardware, from intruders.

A password or connection control must be used to prevent unauthorised connections to the system. Password protection must be applied to all accounts within a system. Although a password acts as an authentication mechanism, it also protects the network from outsiders. Brute force attacks can be prevented by using a strong password.

  • Change all default passwords.
  • No has administrator privileges to perform daily tasks.
  • Maintain an up-to-date and limited list of system administrator accounts.
  • Passwords must contain at least 10 characters (a combination of different character types), and must be updated periodically or whenever suspicions of compromise are raised.
  • Only use one account and never share passwords.
  • Disable unused account immediately.
  • Make password and authentication rules mandatory.
  • Users manage rights and privileges .
  • Users have limited access to in order to complete their missions.
  • Block unused accounts. Use multi-factor authentication.
  • Block Internet access from accounts with administrator rights
  • Find irregular access information and systems (delays or applications, data, etc. ).
  • Frequently audit The central directory (Active Directory, LDAP directory)
  • Create multiple security zones and limit worker access to workers with a badge system
  • Save all visits.
  • Office cleaning under supervision or during work hours.


Smartphone threats continue to increase. Hackers are particularly interested in Android devices. Hackers are able to target all users, including business users.

Computer attacks are also common on business workstations. It is important to take simple steps to protect your employees’ workstations.

Hackers look for vulnerabilities to steal personal data from poorly protected workstations. It is possible for workstations to be used as a gateway for hackers to access more sensitive company systems. These risks can be prevented by taking a few simple steps.

  • Locking mobile devices and workstations automatically takes place.
  • Never leave your smartphone, tablet or laptop unattended.
  • Disable external media’s “Autorun” function.
  • Copy or store all data on a computer or NAS (Network Area Storage).
  • Physically destroyed hard drives, media, and printers containing data.
  • Block personal devices from being connected to an organization’s information system.
  • Encrypt Hard drives on laptops
  • Only encrypted data can be transmitted with sensitive or confidential information.
  • Technically prohibit the connecting of unregistered mobile media.
  • All data stored in the cloud are encrypted (eg BoxCryptor).
  • The criticality level of the stored data determines the guarantee offered by the cloud provider.
  • Before they can be connected to a computer, external media players like USB sticks are scanned for viruses.


Security measures that are taken to protect a server will depend on its services, data confidentiality, and risks.

Network administrators, also known as system administrators, are responsible for maintaining servers. A system administrator’s role does not end with configuration and installation of the machines. The system administrator also plays a crucial role in long-term network security.

The more connected a company, the more vulnerable it will be. The internet, mobile, video conferencing and online tools have all become part of our everyday lives. These technologies present new security challenges to your business.

  • Disable unused accounts and change default passwords
  • Protect Wi Fi with WPA2 encryption.
  • Close unutilized ports and services
  • Do not connect to servers remotely.
  • Use Secure Applications and Protocols
  • Server and firewall security logs are kept for at least one month.
  • The corporate Wi-Fi network and the public Wi-Fi network are separate.
  • Security logs must be kept for at least six months Protect enterprise Wi Fi by WPA2.
  • System for Enterprise
    Device registration
  • All systems should be reinforced according to the recommendations of the supplier.
  • A network that is logically separate from the user’s network can be used to administer server administration.
  • Evaluate all alerts and events for servers, firewalls, and network components.
  • An alert-based system that detects malicious behavior (SIEM).
  • All communications are monitored by an IDS / IPS (Intrusion Detection / Prevention System).
  • Access to servers and network components can only be physically accessed by a small number of people.
  • Logging is used to log all physical access to servers or network components.
  • Conduct vulnerability scans and intrusion tests.


The boundaries of traditional network security are being blurred by the adoption of cloud apps, mobile staff, and extended network access for business partners and consultants. Remote access security solutions must be deployed by organizations to ensure data protection when employees are not in the office.

It is crucial to have a central management point that can enforce uniform access controls and ensure security when enterprise resources are distributed across cloud, local and virtual applications.

  • When is inactive for a time, remote access should automatically be closed.
  • Limit remote accessibility to what is absolutely necessary.
  • All connections to the corporate network have been encrypted and secured.
  • Endpoints only Virtual Private Networks (VPNs) connections.
  • Strong authentication is used to connect from outside public networks.
  • Remote access is restricted to the IP addresses and required regions of the providers.


This group of measures is designed to ensure that the essential services of the business are maintained in all possible crisis situations, including those involving extreme shocks. The Business Continuity Plan, or BCP, includes risk analysis to address multiple scenarios. It could be an IT problem or a data breach attack.

The business continuity plan covers the maintenance of essential services, such as the provision of services at a fallback location. It also plans for the recovery of activities.

When there is a possibility of disruptions to critical activities, which could lead to economic loss or reputational damage to the company, a Business Continuity Plan is vital.

Correctly responding to situations, such as sending out a clear and precise message using a crisis management program, can improve credibility with customers and employees.
To ensure sustainability, it is important to manage and control the risks associated with any change.

You should conduct one or more crisis risk analyses:

An analysis of the repercussions of the operations: In the context of a crisis, what activities and processes are essential for the company’s survival?

IT Risk Analysis: Is IT critical to the smooth running and success of a business? What are the potential consequences of affirmation?

Chemical or Flood Risk Analysis: Is there a hazardous substance in the company that could ignite? Is it in an area at risk of flooding? Are there other companies nearby that are using dangerous substances? The proximity to other dangers of internal or exterior origin can lead to disaster.

  • Create an Incident Management Plan to Respond to an Incident
  • Create a plan for business continuity to protect the business
  • To report an incident, all workers need to know where they can be reached.
  • Update and distribute contact information (internal, external, management, technical, etc.).
  • Report all issues to the management
  • These plans can be evaluated and tested annually.
  • Assess The advisability to insure against the incidences of
  • Install Emergency Devices for Utility Services (Internet, Telephone, Electricity, etc. ).


Cybercrime is on the rise and businesses are increasingly being targeted. Nearly 44% of small-businesses in the United States have been the victims of a hacker attack, and this number is increasing each year. In 2019, this crime could be worth more than $ 2 Billion. This is four times the amount that was in 2015.

A strong and multi-layered security strategy that includes each of the 12 types can help a company save money.

Employee training and implementation of security technology will be a key element in reducing security breaches and provide a first line defense.