Статья опубликована в рамках: Научного журнала «Студенческий» № 1(339)
Рубрика журнала: Информационные технологии
Скачать книгу(-и): скачать журнал часть 1, скачать журнал часть 2, скачать журнал часть 3, скачать журнал часть 4, скачать журнал часть 5, скачать журнал часть 6, скачать журнал часть 7, скачать журнал часть 8, скачать журнал часть 9
RESEARCH ON THE IMPACT OF CYBER HYGIENE ON REDUCING THE RISKS OF DATA LEAKS IN THE CORPORATE ENVIRONMENT AND DEVELOPING RECOMMENDATIONS FOR ITS IMPROVEMENT
ABSTRACT
In the context of rapid digital transformation, corporate organizations increasingly depend on information systems to support business processes, data analytics, and decision-making. At the same time, the frequency and severity of data leaks continue to grow, largely due to human-related factors and insufficient cybersecurity practices. Cyber hygiene, defined as a set of routine practices and behaviors aimed at maintaining the security of digital assets, plays a critical role in reducing the likelihood and impact of data breaches.
This paper examines the impact of cyber hygiene on reducing data leak risks in corporate environments. The research analyzes common causes of data leaks, evaluates the effectiveness of cyber hygiene measures, and identifies key organizational and human factors influencing security outcomes. A conceptual assessment model is proposed to demonstrate how improved cyber hygiene practices contribute to risk reduction. Based on the findings, practical recommendations are developed to enhance cyber hygiene at organizational and employee levels. The results confirm that systematic cyber hygiene implementation significantly improves corporate data protection and overall security resilience.
Keywords: cyber hygiene, data leaks, corporate cybersecurity, human factor, information security risk.
Introduction: The growing reliance of modern organizations on digital technologies has significantly increased the volume of sensitive information processed, stored, and transmitted within corporate environments. Customer data, intellectual property, financial records, and strategic documents have become critical assets that directly influence organizational competitiveness and reputation. However, the expansion of digital infrastructure has also created new opportunities for cyber attacks and accidental data exposure.
Data leaks remain one of the most damaging cybersecurity incidents faced by corporations. Unlike many technical attacks, a substantial proportion of data breaches occur due to poor security practices, lack of awareness, misconfiguration, and negligent user behavior. Weak passwords, phishing attacks, unsecured devices, and improper access control are frequently cited as primary causes of corporate data leaks. These issues are closely related to inadequate cyber hygiene rather than advanced technical exploitation.
Cyber hygiene refers to a set of routine cybersecurity practices that users and organizations perform to ensure the ongoing protection of systems and information. These practices include regular software updates, secure password management, cautious handling of emails and external media, and adherence to security policies. While technical security controls such as firewalls and intrusion detection systems are essential, they are insufficient without strong cyber hygiene among employees and management.
This research aims to analyze the role of cyber hygiene in reducing the risks of data leaks in corporate environments. The study focuses on identifying key cyber hygiene practices, assessing their influence on data leak prevention, and developing recommendations for improving organizational cyber hygiene. The main objectives of this paper are to examine common data leak vectors, evaluate the effectiveness of cyber hygiene measures, and propose practical recommendations that can be implemented in real corporate settings. Unlike many existing studies that focus primarily on technical security controls, this research emphasizes the human and organizational dimensions of cybersecurity and their measurable impact on data leak risks in corporate environments. The study adopts a practice-oriented approach, combining analytical assessment of real-world breach patterns with a structured evaluation of cyber hygiene practices. The main contributions of this paper are as follows:
- A systematic analysis of the primary cyber hygiene deficiencies that contribute to data leaks in corporate environments, including poor credential management, inadequate access control, insufficient user awareness, and weak policy enforcement.
- The development of a conceptual cyber hygiene maturity model that illustrates the relationship between routine security practices, human behavior, and the likelihood and impact of corporate data leaks.
- The formulation of practical, implementable recommendations aimed at improving cyber hygiene at both organizational and employee levels, with the objective of reducing data leak risks and strengthening overall corporate cybersecurity resilience.
Methodology: The research methodology is based on a qualitative and analytical approach, combining a review of academic literature, industry reports, and cybersecurity standards with conceptual risk analysis. The primary goal of the methodology is to evaluate how cyber hygiene practices influence the likelihood and impact of data leaks within corporate environments.
The first stage of the study involved an analysis of documented data breach cases from corporate sectors, focusing on incidents where human factors and poor security practices played a decisive role. This analysis allowed the identification of recurring patterns, such as phishing-related credential theft, misconfigured access rights, and insecure endpoint usage.

Figure 1. Common causes of corporate data leaks
As shown in Figure 1, human-related cyber hygiene deficiencies represent the most significant source of corporate data leak risks. Human-related factors, including phishing susceptibility, weak password practices, and accidental data exposure, account for the majority of incidents. Technical vulnerabilities such as unpatched systems and misconfigured cloud services further amplify these risks. The figure highlights that inadequate cyber hygiene remains a dominant contributor to data breaches, often exceeding the impact of advanced technical exploits.
To strengthen the analytical depth of this study, additional statistical observations related to cyber hygiene and data leak incidents are presented. Industry reports consistently indicate that human-related factors remain the dominant cause of corporate data breaches. The lack of employee awareness, weak authentication practices, and susceptibility to phishing attacks significantly increase organizational exposure to data leaks.

Figure 2. Human factor related breaches (%)
The presented statistics illustrate a steady increase in incidents directly linked to insufficient cyber hygiene practices. This trend emphasizes the necessity of systematic employee training and continuous monitoring of user behavior.

Figure 3. Phishing incidents growth (%)
The presented statistics illustrate a steady increase in incidents directly linked to insufficient cyber hygiene practices. This trend emphasizes the necessity of systematic employee training and continuous monitoring of user behavior.
The second stage focused on identifying core cyber hygiene practices relevant to corporate environments. These practices were grouped into technical, organizational, and behavioral categories. Technical practices include regular patch management and secure configuration. Organizational practices involve policy enforcement and role-based access control. Behavioral practices relate to employee awareness, training, and compliance.

Figure 4. Relationship between cyber hygiene maturity and data leak risk
At the third stage, a conceptual risk assessment model was developed to illustrate the relationship between cyber hygiene maturity and data leak risk levels. The model assumes that improved cyber hygiene reduces both the probability of successful attacks and the potential impact of incidents. Although no live experimental testing was conducted, the model is grounded in widely accepted information security risk management principles.

Figure 5. Relationship between risk and cost
The provided maturity illustration serves as a critical conceptual framework for understanding how cyber hygiene directly influences the mitigation of data leak risks within a corporate environment. At its core, the model demonstrates that organizational security is not a static state but a developmental journey across five distinct stages, ranging from Initial to Optimized, centered on the three foundational pillars of people, process, and technology. In the earliest stages, characterized by uncoordinated activities and a lack of formal security programs, the risk of data leakage is at its peak because controls are either non-existent or entirely reliant on individual, inconsistent efforts. As an organization matures, it moves through the developing and defined phases where basic governance and documented controls begin to stabilize the environment, causing the risk curve to decline sharply. However, the model illustrates a vital trade-off, showing that while risk decreases as hygiene practices become more sophisticated, the associated costs and resource requirements rise. To reach the highest levels of maturity, such as the Managed and Optimized stages, a corporation must transition from simple technical compliance to a holistic security culture where processes are quantitatively understood and subject to continuous improvement. For the purposes of this research, the model highlights that effective cyber hygiene is the primary mechanism for shifting an organization away from the high-risk initial state toward a resilient posture where people are aware, processes are verified, and technology is automated, thereby creating a multi-layered defense against both internal and external data threats
Finally, based on the analysis and model findings, a set of practical recommendations was formulated. These recommendations are intended to be applicable to organizations of various sizes and industries.

Figure 6. Cyber hygiene components in a corporate environment
Figure 6 presents the main components of cyber hygiene in a corporate context. Technical controls include patch management, endpoint protection, and secure configuration. Organizational controls involve policies, procedures, and access governance. Behavioral controls focus on employee awareness, training, and compliance. Effective cyber hygiene requires coordinated implementation across all three domains.
Results: The analysis revealed that poor cyber hygiene is a dominant contributing factor in the majority of corporate data leak incidents. Weak password practices, such as password reuse and lack of multi-factor authentication, significantly increase the success rate of phishing and credential stuffing attacks. Similarly, delayed software updates and unpatched systems create exploitable vulnerabilities that attackers can easily leverage.
The conceptual assessment model demonstrates a clear inverse relationship between cyber hygiene maturity and data leak risk. Organizations with low cyber hygiene maturity exhibit a high likelihood of data leaks, even when advanced technical security solutions are in place. In contrast, organizations that consistently apply cyber hygiene practices show reduced attack success rates and faster incident containment.
Employee behavior was identified as a critical factor influencing cyber hygiene effectiveness. Regular security awareness training significantly improves employees’ ability to recognize phishing attempts and social engineering attacks. Moreover, clearly defined security policies and management support increase compliance and accountability.
The discussion also highlights that cyber hygiene should be viewed as an ongoing process rather than a one-time initiative. Continuous monitoring, regular audits, and periodic training updates are essential to address evolving threats. The results confirm that cyber hygiene acts as a foundational layer that enhances the effectiveness of technical security controls.
Conclusion: This research examined the impact of cyber hygiene on reducing data leak risks in corporate environments. The analysis confirms that inadequate cyber hygiene is a major contributor to data breaches, often outweighing purely technical vulnerabilities. By addressing human behavior, organizational processes, and routine security practices, organizations can significantly strengthen their data protection posture.
The proposed conceptual model illustrates how improved cyber hygiene reduces both the probability and impact of data leaks. The recommendations provided in this paper offer practical guidance for organizations seeking to enhance cybersecurity resilience through sustainable and cost-effective measures. A review of recent corporate data leak cases demonstrates that even organizations with advanced technical security infrastructures remain vulnerable when cyber hygiene is neglected. In multiple incidents, attackers gained initial access through phishing emails or compromised credentials, later escalating privileges due to excessive access rights and lack of monitoring.
These cases confirm that cyber hygiene functions as a preventive control that reduces the attack surface before technical defenses are engaged. Organizations that regularly audit user access, enforce security awareness programs, and monitor compliance show significantly lower incident severity and recovery time.
Overall, cyber hygiene should be recognized as a strategic component of corporate cybersecurity. Future research may focus on empirical validation of cyber hygiene metrics and the integration of behavioral analytics to further improve data leak prevention strategies.
Recommendations: Based on the findings of this research, several recommendations are proposed to improve cyber hygiene in corporate environments. First, organizations should establish mandatory cybersecurity awareness training programs tailored to employee roles and responsibilities. Training should be conducted regularly and include practical simulations of phishing and social engineering attacks.
Second, strong access control mechanisms should be enforced, including the principle of least privilege and multi-factor authentication for critical systems. Regular reviews of user access rights can prevent unauthorized data exposure resulting from role changes or employee turnover.
Third, organizations should implement structured patch management and asset inventory processes to ensure that all systems remain up to date and securely configured. Automated tools can significantly reduce human error in this area.
Finally, cyber hygiene metrics should be integrated into organizational risk management frameworks. Measuring compliance levels, training effectiveness, and incident trends enables continuous improvement and informed decision-making.
Reference:
- Argyridou, E., Nifakos, S., Laoudias, C., Panda, S., Panaousis, E., Chandramouli, K., ... & Bonacina, S. (2023). Cyber hygiene methodology for raising cybersecurity and data privacy awareness in health care organizations: Concept study. Journal of Medical Internet Research, 25, e41294.
- Alshaikh, M. (2020). Developing cybersecurity culture to influence employee behavior: A practice perspective. Computers & Security, 98, 102003, https://doi.org/10.1016/j.cose.2020.102003
- Armoogum, S., Armoogum, V., Chandra, A., Dewi, D. A., Kurniawan, T. B., Bappoo, S., ... & Alanda, A. (2025). A Comprehensive Review of Cyber Hygiene Practices in the Workplace for Enhanced Digital Security. JOIV: International Journal on Informatics Visualization, 9(1), 137-145.
- Awan, M. S., & Dahabiyeh, L. (2018). Corporate attractiveness index: A measure for assessing the potential of a cyber attack. 9th International Conference on Information and Communication Systems, Irbid, Jordan.
- Baraković, S., & Husić, K. B. (2023). Cyber hygiene knowledge, awareness, and behavioral practices of university students. Information Security Journal: A Global Perspective, 32(5), 347–370. https://doi.org/10.1080/19393555.2022.2088428
- Basholli, A., Mema, B., Basholli, F., Hyka, D., & Salillari, D. (2023). The role of education in cyber hygiene. Advanced Engineering Days (AED), 7, 178-181.
- Cain, A. A., Edwards, M. E., & Still, J. D. (2018). An exploratory study of cyber hygiene behaviors and knowledge. Journal of information security and applications, 42, 36-45. https://doi.org/10.1016/j.jisa.2018.08.002
- Fenech, J., Richards, D., & Formosa, P. (2024). Ethical principles shaping values-based cybersecurity decision-making. Computers & Security, 140, 1–17. https://doi.org/10.1016/j.cose.2024.103795
- Kalhoro, S., Rehman, M., Ponnusamy, V. A., & Shaikh, F. B. (2021). Extracting key factors of cyber hygiene behaviour among software engineers: A systematic literature review. IEEE Access, 9, 99339–99363.
- Kioskli, K., Fotis, T., Nifakos, S., & Mouratidis, H. (2023). The importance of conceptualising the human-centric approach in maintaining and promoting cybersecurity-hygiene in healthcare 4.0. Applied Sciences, 13(6), 3410.
- Singh, D., Mohanty, N. P., Swagatika, S., & Kumar, S. (2020). Cyber-hygiene: The key concept for cyber security in cyberspace. Test Engineering and Management, 83, 8145-8152.
- Skarga-Bandurova, I., Kotsiuba, I., & Velasco, E. R. (2021). Cyber Hygiene Maturity Assessment Framework for Smart Grid Scenarios. Frontiers in Computer Science, 3, 614337. https://doi.org/10.3389/fcomp.2021.614337
- Surdjono, H. D., Fadli, R., Sari, R. C., Eliza, F., Yassin, A., Kulanthaivel, G., ... & Purnomo, S. (2025). Effectiveness of Cybersecurity Awareness Program Based on Mobile Learning to Improve Cyber Hygiene. International Journal of Information and Education Technology, 15(2).
- Sweeney, J., & Tran, V. (2022). Improving protection against cybersecurity attacks of emergency dispatch centers. In Proceedings of the 17th International Conference on Information Warfare and Security (pp. 134–142). Albany, New York, USA.
- Szczepaniuk, E. K., & Szczepaniuk, H. (2022). Analysis of cybersecurity competencies: Recommendations for telecommunications policy. Telecommunications Policy, 26, 102145.
- Triplett, W. J. (2022). Addressing human factors in cybersecurity leadership. Journal of Cybersecurity and Privacy, 2(3), 573-586. https://doi.org/10.3390/jcp2030029
- Ugwu, C., Ani, C., Ezema, M., Asogwa, C., Ome, U., Obayi, A., ... & Ukwandu, E. (2022, April). Towards determining the effect of age and educational level on cyber-hygiene. In 2022 IEEE Nigeria 4th International Conference on Disruptive Technologies for Sustainable Development (NIGERCON) (pp. 1-5). IEEE.
- Vishwanath, A., Neo, L. S., Goh, P., Lee, S., Khader, M., Ong, G., & Chin, J. (2020). Cyber hygiene: The concept, its measure, and its initial tests. Decision Support Systems, 128, 113160. https://doi.org/10.1016/j.dss.2019.113160
- Whitty, M. T., Moustafa, N., & Grobler, M. (2024). Cybersecurity when working from home during COVID-19: Considering the human factors. Journal of Cybersecurity, 10(1), Article tyae001. https://doi.org/10.1093/cybsec/tyae001
- Wong, L. W., Lee, V. H., Tan, G. W. H., & Ooi, K. B. (2022). The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities. International Journal of Information Management, 66, 102552.
- Zhang, Y., & Malacaria, P. (2023). Keep spending: Beyond optimal cyber-security investment. In Proceedings of the 36th Computer Security Foundations Symposium (pp. 1–14). Dubrovnik, Croatia. https://doi.org/10.1109/CSF57540.2023.00024


Оставить комментарий