Skip to content
Longterm Wiki
Back

Cybersecurity Best Practices | Cybersecurity and Infrastructure Security Agency CISA

government

Credibility Rating

4/5
High(4)

High quality. Established institution or organization with editorial oversight and accountability.

Rating inherited from publication venue: CISA

This is a U.S. government reference page covering general cybersecurity hygiene; tangentially relevant to AI safety for practitioners concerned with securing AI systems and infrastructure against cyber threats.

Metadata

Importance: 22/100guidance documentreference

Summary

CISA's official cybersecurity best practices page outlines foundational cyber hygiene recommendations for both individuals and organizations, emphasizing the complexity of modern cyber threats. It covers core practices such as strong passwords, multi-factor authentication, software updates, and risk management planning. CISA positions itself as a national resource for strengthening cybersecurity resilience through guidance, services, and threat communication.

Key Points

  • Recommends fundamental cyber hygiene: strong passwords, MFA, regular software updates, and cautious link-clicking behavior.
  • Highlights the global, interconnected nature of cyber threats affecting both digital and physical infrastructure.
  • Emphasizes the need for organizations to develop tailored cybersecurity plans beyond basic individual practices.
  • CISA serves as a national hub for cybersecurity resources, risk management guidance, and threat communication.
  • Relevant to AI safety insofar as AI systems and infrastructure face the same cyber threats and hygiene requirements.

Cited by 1 page

PageTypeQuality
Autonomous Cyber Attack TimelineAnalysis63.0

Cached Content Preview

HTTP 200Fetched Apr 9, 20268 KB
Cybersecurity Best Practices | Cybersecurity and Infrastructure Security Agency CISA 
 
 
 

 

 
 
 
 
 Skip to main content 
 
 

 
 

 
 
 
 
 
 
 
 
 
 
 
 Official websites use .gov 
 
 A .gov website belongs to an official government organization in the United States.
 

 
 
 
 
 
 
 Secure .gov websites use HTTPS 
 
 A lock ( Lock A locked padlock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
 

 
 
 
 
 
 
 
 

 

 
 
 
 

 
 
 

 

 
 
 

 
 
 

 
 Due to the lapse in federal funding, this website will not be actively managed. Read More 

 no-cost Cyber Services Secure by design Secure Your Business Shields Up Report A Cyber Issue 

 

 
 
 
 
 

 
 
 
 
 
 
 
 

 

 
 
 
 
 
 
 

 
 
 

 
 

 
 
 
 

 

 
 
 

 
 
 
 Share: 
 

 

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
 
 
 
 

 
 
 

 
 

 
 
 
 

 
 

 
 
 

 
 

 

 

 
 
 
 
 
 
 

 

 
 
 
 
 Cybersecurity Best Practices

 CISA provides information on cybersecurity best practices to help individuals and organizations implement preventative measures and manage cyber risks. 
 
 
 
 
 
 
 
 
 
 
 

 

 
 
 Cybersecurity Best Practices 

 

 
 
 
 
 
 
 
 
 
 
 
 Artificial Intelligence 
 
 
 

 
 
 
 
 
 Edge Device Security 
 
 
 

 
 
 
 
 
 Cybersecurity for K-12 Education 
 
 
 

 
 
 
 
 
 Cybersecurity Awareness Month 
 
 
 

 
 
 
 
 
 Federal Cyber Defense Skilling Academy 
 
 
 

 
 
 
 
 
 Multifactor Authentication 
 
 
 

 
 
 
 
 
 Open Source Software Security 
 
 
 

 
 
 
 
 
 President's Cup Cybersecurity Competition 
 
 
 

 
 
 
 
 
 Secure by Design 
 
 
 

 
 
 
 
 
 Organizations and Cyber Safety 
 
 
 

 
 
 
 
 
 Identify Theft and Personal Cyber Threats 
 
 
 

 
 
 
 
 
 Zero Trust 
 
 
 

 
 
 
 
 

 
 
 
 
 

 
 
 
 
 
 
 
 
 

 
 Cyberspace is particularly difficult to secure due to a number of factors: the ability of malicious actors to operate from anywhere in the world, the linkages between cyberspace and physical systems, and the difficulty of reducing vulnerabilities and consequences in complex cyber networks. Implementing safe cybersecurity best practices is important for individuals as well as organizations of all sizes. Using strong passwords, updating your software, thinking before you click on suspicious links, and turning on multi-factor authentication are the basics of what we call “cyber hygiene” and will drastically improve your online safety. These cybersecurity basics apply to both individuals and organizations. For both government and private entities, developing and implementing tailored cybersecurity plans and processes is key to protecting and maintaining business operations. As information technology becomes increasingly integrated with all aspects of our society, there is increased risk for wide scale or high-consequence events that could cause harm or disrupt services upon which our economy and the daily lives of mi

... (truncated, 8 KB total)
Resource ID: b1df6d22a2a02199 | Stable ID: sid_X9b25FbHgp