Cybersecurity Best Practices | Cybersecurity and Infrastructure Security Agency CISA
governmentCredibility Rating
High quality. Established institution or organization with editorial oversight and accountability.
Rating inherited from publication venue: CISA
This is a U.S. government reference page covering general cybersecurity hygiene; tangentially relevant to AI safety for practitioners concerned with securing AI systems and infrastructure against cyber threats.
Metadata
Summary
CISA's official cybersecurity best practices page outlines foundational cyber hygiene recommendations for both individuals and organizations, emphasizing the complexity of modern cyber threats. It covers core practices such as strong passwords, multi-factor authentication, software updates, and risk management planning. CISA positions itself as a national resource for strengthening cybersecurity resilience through guidance, services, and threat communication.
Key Points
- •Recommends fundamental cyber hygiene: strong passwords, MFA, regular software updates, and cautious link-clicking behavior.
- •Highlights the global, interconnected nature of cyber threats affecting both digital and physical infrastructure.
- •Emphasizes the need for organizations to develop tailored cybersecurity plans beyond basic individual practices.
- •CISA serves as a national hub for cybersecurity resources, risk management guidance, and threat communication.
- •Relevant to AI safety insofar as AI systems and infrastructure face the same cyber threats and hygiene requirements.
Cited by 1 page
| Page | Type | Quality |
|---|---|---|
| Autonomous Cyber Attack Timeline | Analysis | 63.0 |
Cached Content Preview
[Skip to main content](https://www.cisa.gov/topics/cybersecurity-best-practices#main)

**Official websites use .gov**
A **.gov** website belongs to an official government organization in the United States.

**Secure .gov websites use HTTPS**
A **lock** (LockA locked padlock) or **https://** means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
**Due to the lapse in federal funding, this website will not be actively managed.**[**Read More**](https://go.dhs.gov/lapse-2026)
[no-cost Cyber Services](https://www.cisa.gov/resources-tools/resources/free-cybersecurity-services-and-tools "Free Cyber Services") [Secure by design](https://www.cisa.gov/securebydesign) [Secure Your Business](https://www.cisa.gov/secureyourbusiness) [Shields Up](https://www.cisa.gov/node/8056) [Report A Cyber Issue](https://www.cisa.gov/report)
Share:
[Share to Facebook](https://www.facebook.com/sharer/sharer.php?u=https://www.cisa.gov/topics/cybersecurity-best-practices&title=Cybersecurity%20Best%20Practices "Share to Facebook")[Share to X](https://twitter.com/intent/tweet?text=Cybersecurity%20Best%20Practices+https://www.cisa.gov/topics/cybersecurity-best-practices "Share to X")[Share to Linkedin](https://www.linkedin.com/sharing/share-offsite/?url=https://www.cisa.gov/topics/cybersecurity-best-practices "Share to Linkedin")[Share to Email](mailto:?subject=Cybersecurity%20Best%20Practices&body=https://www.cisa.gov/topics/cybersecurity-best-practices "Share to Email")

# Cybersecurity Best Practices
CISA provides information on cybersecurity best practices to help individuals and organizations implement preventative measures and manage cyber risks.
Cyberspace is particularly difficult to secure due to a number of factors: the ability of malicious actors to operate from anywhere in the world, the linkages between cyberspace and physical systems, and the difficulty of reducing vulnerabilities and consequences in complex cyber networks. Implementing safe cybersecurity best practices is important for individuals as well as organizations of all sizes. Using strong passwords, updating your software, thinking before you click on suspicious links, and turning on multi-factor authentication are the basics of what we call “cyber hygiene” and will drastically improve your online safety. These cybersecurity basics apply to both individuals and organizations. For both government and private entities, developing and implementing tailored cybersecurity plans and processes is key to protecting and maintaining business operations. As information technology become
... (truncated, 10 KB total)b1df6d22a2a02199 | Stable ID: YzU2OTQ2Mm