{"id":1845,"date":"2016-07-26T11:57:31","date_gmt":"2016-07-26T18:57:31","guid":{"rendered":"https:\/\/cm-edgetun.pages.dev\/industry\/blog\/uncategorized\/7-steps-to-better-cybersecurity-hygiene\/"},"modified":"2023-07-18T08:48:50","modified_gmt":"2023-07-18T15:48:50","slug":"7-steps-to-better-cybersecurity-hygiene","status":"publish","type":"post","link":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/07\/26\/7-steps-to-better-cybersecurity-hygiene\/","title":{"rendered":"7 steps to better cybersecurity hygiene"},"content":{"rendered":"<p>Cyberattacks on government agencies at all levels can compromise private citizen information and leave the United States vulnerable to national security threats. That\u2019s why the White House recently announced its Cyber National Action Plan (CNAP) and committed $19 billion to enhancing cybersecurity awareness and protection among government agencies.<\/p>\n<p>Local, state, and federal government agencies must be diligent about securing their information and systems against modern cybersecurity threats. Fortunately, there are a number of basic hygiene strategies that agencies can implement to get started on the path towards stronger cybersecurity.<\/p>\n<p>For more information and the other six steps, check out the <em><a href=\"https:\/\/www.slideshare.net\/secret\/NeWq8QjJZ8ygIh\">7 Steps to Basic Cybersecurity Hygiene<\/a><\/em>\u00a0SlideShare and get started on the path to stronger security practices. Or get the complete <a href=\"http:\/\/aka.ms\/govcybersecurityguide\">Insider\u2019s Guide to Cybersecurity for Government<\/a> to understand how compliance, transparency, privacy and empowerment can create a more secure cloud environment for your agency.<\/p>\n<div style=\"margin-bottom: 5px\"><strong> <a title=\"7 Steps to Better Cybersecurity Hygiene \" href=\"\/\/www.slideshare.net\/Microsoft\/seven-steps-to-better-cybersecurity-hygiene\" target=\"_blank\" rel=\"noopener\">7 Steps to Better Cybersecurity Hygiene <\/a> <\/strong> from <strong><a href=\"\/\/www.slideshare.net\/Microsoft\" target=\"_blank\" rel=\"noopener\">Microsoft<\/a><\/strong><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Government agencies can improve basic cybersecurity hygiene by taking these seven steps.<\/p>\n","protected":false},"author":843,"featured_media":9913,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"categories":[1515],"post_tag":[],"content-type":[1483],"coauthors":[4308],"class_list":["post-1845","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-government","content-type-thought-leadership"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>7 steps to better cybersecurity hygiene - Microsoft Industry Blogs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/07\/26\/7-steps-to-better-cybersecurity-hygiene\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"7 steps to better cybersecurity hygiene - Microsoft Industry Blogs\" \/>\n<meta property=\"og:description\" content=\"Government agencies can improve basic cybersecurity hygiene by taking these seven steps.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/07\/26\/7-steps-to-better-cybersecurity-hygiene\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Industry Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-26T18:57:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-18T15:48:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/06\/MSFT_CyberSecurity7StepsToBasicHygiene_SS_LB_2000x1000_R1_V2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Microsoft Industry for Government Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Industry for Government Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 min read\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/07\/26\/7-steps-to-better-cybersecurity-hygiene\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/07\/26\/7-steps-to-better-cybersecurity-hygiene\/\"},\"author\":[{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/author\/microsoft-industry-for-government-team\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Industry for Government Team\"}],\"headline\":\"7 steps to better cybersecurity hygiene\",\"datePublished\":\"2016-07-26T18:57:31+00:00\",\"dateModified\":\"2023-07-18T15:48:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/07\/26\/7-steps-to-better-cybersecurity-hygiene\/\"},\"wordCount\":157,\"publisher\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/07\/26\/7-steps-to-better-cybersecurity-hygiene\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/06\/MSFT_CyberSecurity7StepsToBasicHygiene_SS_LB_2000x1000_R1_V2.jpg\",\"articleSection\":[\"Government\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/07\/26\/7-steps-to-better-cybersecurity-hygiene\/\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/07\/26\/7-steps-to-better-cybersecurity-hygiene\/\",\"name\":\"7 steps to better cybersecurity hygiene - Microsoft Industry Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/07\/26\/7-steps-to-better-cybersecurity-hygiene\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/07\/26\/7-steps-to-better-cybersecurity-hygiene\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/06\/MSFT_CyberSecurity7StepsToBasicHygiene_SS_LB_2000x1000_R1_V2.jpg\",\"datePublished\":\"2016-07-26T18:57:31+00:00\",\"dateModified\":\"2023-07-18T15:48:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/07\/26\/7-steps-to-better-cybersecurity-hygiene\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/07\/26\/7-steps-to-better-cybersecurity-hygiene\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/07\/26\/7-steps-to-better-cybersecurity-hygiene\/#primaryimage\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/06\/MSFT_CyberSecurity7StepsToBasicHygiene_SS_LB_2000x1000_R1_V2.jpg\",\"contentUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/06\/MSFT_CyberSecurity7StepsToBasicHygiene_SS_LB_2000x1000_R1_V2.jpg\",\"width\":2000,\"height\":1000,\"caption\":\"Basic cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/07\/26\/7-steps-to-better-cybersecurity-hygiene\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"7 steps to better cybersecurity hygiene\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#website\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/\",\"name\":\"Microsoft Industry Blogs\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization\",\"name\":\"Microsoft Industry Blogs\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"contentUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"width\":259,\"height\":194,\"caption\":\"Microsoft Industry Blogs\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"7 steps to better cybersecurity hygiene - Microsoft Industry Blogs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/07\/26\/7-steps-to-better-cybersecurity-hygiene\/","og_locale":"en_US","og_type":"article","og_title":"7 steps to better cybersecurity hygiene - Microsoft Industry Blogs","og_description":"Government agencies can improve basic cybersecurity hygiene by taking these seven steps.","og_url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/07\/26\/7-steps-to-better-cybersecurity-hygiene\/","og_site_name":"Microsoft Industry Blogs","article_published_time":"2016-07-26T18:57:31+00:00","article_modified_time":"2023-07-18T15:48:50+00:00","og_image":[{"width":2000,"height":1000,"url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/06\/MSFT_CyberSecurity7StepsToBasicHygiene_SS_LB_2000x1000_R1_V2.jpg","type":"image\/jpeg"}],"author":"Microsoft Industry for Government Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Microsoft Industry for Government Team","Est. reading time":"1 min read"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/07\/26\/7-steps-to-better-cybersecurity-hygiene\/#article","isPartOf":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/07\/26\/7-steps-to-better-cybersecurity-hygiene\/"},"author":[{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/author\/microsoft-industry-for-government-team\/","@type":"Person","@name":"Microsoft Industry for Government Team"}],"headline":"7 steps to better cybersecurity hygiene","datePublished":"2016-07-26T18:57:31+00:00","dateModified":"2023-07-18T15:48:50+00:00","mainEntityOfPage":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/07\/26\/7-steps-to-better-cybersecurity-hygiene\/"},"wordCount":157,"publisher":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/07\/26\/7-steps-to-better-cybersecurity-hygiene\/#primaryimage"},"thumbnailUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/06\/MSFT_CyberSecurity7StepsToBasicHygiene_SS_LB_2000x1000_R1_V2.jpg","articleSection":["Government"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/07\/26\/7-steps-to-better-cybersecurity-hygiene\/","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/07\/26\/7-steps-to-better-cybersecurity-hygiene\/","name":"7 steps to better cybersecurity hygiene - Microsoft Industry Blogs","isPartOf":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/07\/26\/7-steps-to-better-cybersecurity-hygiene\/#primaryimage"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/07\/26\/7-steps-to-better-cybersecurity-hygiene\/#primaryimage"},"thumbnailUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/06\/MSFT_CyberSecurity7StepsToBasicHygiene_SS_LB_2000x1000_R1_V2.jpg","datePublished":"2016-07-26T18:57:31+00:00","dateModified":"2023-07-18T15:48:50+00:00","breadcrumb":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/07\/26\/7-steps-to-better-cybersecurity-hygiene\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/07\/26\/7-steps-to-better-cybersecurity-hygiene\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/07\/26\/7-steps-to-better-cybersecurity-hygiene\/#primaryimage","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/06\/MSFT_CyberSecurity7StepsToBasicHygiene_SS_LB_2000x1000_R1_V2.jpg","contentUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/06\/MSFT_CyberSecurity7StepsToBasicHygiene_SS_LB_2000x1000_R1_V2.jpg","width":2000,"height":1000,"caption":"Basic cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/07\/26\/7-steps-to-better-cybersecurity-hygiene\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/"},{"@type":"ListItem","position":2,"name":"7 steps to better cybersecurity hygiene"}]},{"@type":"WebSite","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#website","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/","name":"Microsoft Industry Blogs","description":"","publisher":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization","name":"Microsoft Industry Blogs","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","contentUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","width":259,"height":194,"caption":"Microsoft Industry Blogs"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Industry Blogs","distributor_original_site_url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/1845","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/users\/843"}],"replies":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/comments?post=1845"}],"version-history":[{"count":0,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/1845\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/media\/9913"}],"wp:attachment":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/media?parent=1845"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/categories?post=1845"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/post_tag?post=1845"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/content-type?post=1845"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/coauthors?post=1845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}