Skip to content
Longterm Wiki
Back

Cybersecurity Best Practices | Cybersecurity and Infrastructure Security Agency CISA

government

Credibility Rating

4/5
High(4)

High quality. Established institution or organization with editorial oversight and accountability.

Rating inherited from publication venue: CISA

This is a U.S. government reference page covering general cybersecurity hygiene; tangentially relevant to AI safety for practitioners concerned with securing AI systems and infrastructure against cyber threats.

Metadata

Importance: 22/100guidance documentreference

Summary

CISA's official cybersecurity best practices page outlines foundational cyber hygiene recommendations for both individuals and organizations, emphasizing the complexity of modern cyber threats. It covers core practices such as strong passwords, multi-factor authentication, software updates, and risk management planning. CISA positions itself as a national resource for strengthening cybersecurity resilience through guidance, services, and threat communication.

Key Points

  • Recommends fundamental cyber hygiene: strong passwords, MFA, regular software updates, and cautious link-clicking behavior.
  • Highlights the global, interconnected nature of cyber threats affecting both digital and physical infrastructure.
  • Emphasizes the need for organizations to develop tailored cybersecurity plans beyond basic individual practices.
  • CISA serves as a national hub for cybersecurity resources, risk management guidance, and threat communication.
  • Relevant to AI safety insofar as AI systems and infrastructure face the same cyber threats and hygiene requirements.

Cited by 1 page

PageTypeQuality
Autonomous Cyber Attack TimelineAnalysis63.0

Cached Content Preview

HTTP 200Fetched Mar 15, 202610 KB
[Skip to main content](https://www.cisa.gov/topics/cybersecurity-best-practices#main)

![Dot gov](https://www.cisa.gov/profiles/cisad8_gov/themes/custom/gesso/dist/images/icon-dot-gov.svg)

**Official websites use .gov**

A **.gov** website belongs to an official government organization in the United States.


![HTTPS](https://www.cisa.gov/profiles/cisad8_gov/themes/custom/gesso/dist/images/icon-https.svg)

**Secure .gov websites use HTTPS**

A **lock** (LockA locked padlock) or **https://** means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.


**Due to the lapse in federal funding, this website will not be actively managed.**[**Read More**](https://go.dhs.gov/lapse-2026)

[no-cost Cyber Services](https://www.cisa.gov/resources-tools/resources/free-cybersecurity-services-and-tools "Free Cyber Services") [Secure by design](https://www.cisa.gov/securebydesign) [Secure Your Business](https://www.cisa.gov/secureyourbusiness) [Shields Up](https://www.cisa.gov/node/8056) [Report A Cyber Issue](https://www.cisa.gov/report)

Share:

[Share to Facebook](https://www.facebook.com/sharer/sharer.php?u=https://www.cisa.gov/topics/cybersecurity-best-practices&title=Cybersecurity%20Best%20Practices "Share to Facebook")[Share to X](https://twitter.com/intent/tweet?text=Cybersecurity%20Best%20Practices+https://www.cisa.gov/topics/cybersecurity-best-practices "Share to X")[Share to Linkedin](https://www.linkedin.com/sharing/share-offsite/?url=https://www.cisa.gov/topics/cybersecurity-best-practices "Share to Linkedin")[Share to Email](mailto:?subject=Cybersecurity%20Best%20Practices&body=https://www.cisa.gov/topics/cybersecurity-best-practices "Share to Email")

![Cybersecurity image featuring locks](https://www.cisa.gov/sites/default/files/styles/hero_large/public/2022-12/HERO_AbstractCyber4_0.jpg?h=e0d9a4bb&itok=Yw3OtF2k)

# Cybersecurity Best Practices

CISA provides information on cybersecurity best practices to help individuals and organizations implement preventative measures and manage cyber risks.

Cyberspace is particularly difficult to secure due to a number of factors: the ability of malicious actors to operate from anywhere in the world, the linkages between cyberspace and physical systems, and the difficulty of reducing vulnerabilities and consequences in complex cyber networks. Implementing safe cybersecurity best practices is important for individuals as well as organizations of all sizes. Using strong passwords, updating your software, thinking before you click on suspicious links, and turning on multi-factor authentication are the basics of what we call “cyber hygiene” and will drastically improve your online safety. These cybersecurity basics apply to both individuals and organizations. For both government and private entities, developing and implementing tailored cybersecurity plans and processes is key to protecting and maintaining business operations. As information technology become

... (truncated, 10 KB total)
Resource ID: b1df6d22a2a02199 | Stable ID: YzU2OTQ2Mm