Why is System Hardening so Important?
In this day and age, protecting your system and your system data is imperative. Luckily, there are steps you can take to prevent cyberattacks and to increase the security of your data. System hardening, also called Operating System (OS) hardening, is the process of securing a system by reducing its surface of vulnerability. It is done to minimize a computer Operating System’s exposure to threats and to mitigate possible risks. The cost/benefit of mitigating risk drives value and conveniently, most computers offer network security features to limit outside access to the system.
The following items are recommendations to perform every few months in order to strengthen your OS and reduce its risk of a cyberattack:
- Programs Clean-up
- Remove unnecessary programs because every program is a potential entry point for a hacker. Cleaning diminishes the number of ways into a system. If the program is not something vetted by the IT team, it should not be installed. Attackers look for backdoors and security holes when attempting to compromise networks, so it is best to minimize their chances.
- Use of Service Packs
- Keep your OS up-to-date and install the latest version. It is a simple and easy rule to follow.
- Patches and Patch Management
- Use auto-updates and apply critical patches as soon as possible.
- Access Control
- Windows, Linux, and Mac OS X all provide user, group, and account management features that can be used to restrict access to files, networking and other resources. Review these features, as the defaults are not strict, and ensure that you grant rights only to the users that truly need it.
- Disable and eliminate unneeded accounts
- Firewall Configuration
- Your OS has a firewall set up by default. When connected to a VPN that is managed by IT, you are typically covered by a more robust firewall configuration.
- Check your PC’s Security and Privacy Settings
- It is best to disable OS or application features you are not using. For example, Windows typically comes with Skype, but if you have never used it, disable or uninstall it. It can be consuming resources or create potential security holes.
- Network, Server, Application, and Database Hardening Measures
- These should be thought about and acted upon, although typically, this is handled by IT specialists.
More Best Practice Tips:
- Do not leave your computer unlocked when unattended
- Use a password manager
- Office 365 users:
- Create, store, manage, and share your files in the cloud using OneDrive for easy access via all your devices.
- Use an anti-virus application
- Most OSs have a built-in anti-virus application to protect against infected attachments, etc. Verify that you have one and ensure that it is configured to download the latest definitions.
- Do not use free or public Wi-Fi
- If you do, use your VPN software.
- As an alternative option, use your mobile phone as a hotspot instead.
- Do not open suspicious email attachments or respond to suspicious requests
- Report them to your IT department.
- Avoid illegal file sharing
- Pirated software and peer-to-peer sites can expose information to everyone else who uses the site and are riddled with malware.
- Establish a backup solution
- Windows and Mac have built-in backup functions available.
Ultimately, by devoting a little bit of time to harden your Operating System, you can save yourself a great deal of time in the long run by diminishing the risk of a successful cyberattack. Please note that an OS hardening strategy also needs to be complemented by a data backup, which is the final line of defense. This way, if something goes awry, you can restore your PC and all of your data.
Please also see the Working Remotely – Cybersecurity Tips blog to review more valuable tips.
If you’re interested in talking further about how Edmunds GovTech can assist in safeguarding your local government with Managed IT Services, please contact us online or via email at firstname.lastname@example.org.