TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Huntress

Cyber Hygiene Best Practices: Essential Security Checklist

2026-04-23 · Read original ↗

ATT&CK techniques detected

8 predictions
T1021.001Remote Desktop Protocol
93%
“before your endpoints get caught in the crosshairs. learn about our soc ’ s technical analysis of vulnerable rdp exposures in our blog " brute force or something more? ransomware initial access brokers exposed " watch out for weird behavior once hackers get into your environment,…”
T1078Valid Accounts
90%
“all become far easier when the compromised identity has broad access. conduct access audits at least quarterly, and make it standard practice to revoke permissions whenever someone changes roles or leaves the organization. apply the principle of least privilege : users should hav…”
T1021.001Remote Desktop Protocol
89%
“plain text passwords. if you ’ re curious about how your password storage policies stack up to others, check out the " top 10 worst places to store a password. " does remote desktop protocol ( rdp ) really need to be exposed? our soc runs into far too many brute force attacks on …”
T1563.002RDP Hijacking
66%
“before your endpoints get caught in the crosshairs. learn about our soc ’ s technical analysis of vulnerable rdp exposures in our blog " brute force or something more? ransomware initial access brokers exposed " watch out for weird behavior once hackers get into your environment,…”
T1685.001Disable or Modify Windows Event Log
64%
“or blocked applications, resources, and network traffic is a huge step toward keeping attackers out. for example, if a user doesn ’ t need windows openssh, block it or remove it from the host. if vpn logins aren ' t allowed from specific locations, make sure they ' re on the deny…”
T1078.004Cloud Accounts
44%
“fixes. automate updates wherever possible, and use attack surface management tooling to prioritize what needs patching most urgently before it becomes an entry point. don ’ t let an overlooked obligation become an incident. failing to back up data ransomware operators are countin…”
T1110.004Credential Stuffing
38%
“plain text passwords. if you ’ re curious about how your password storage policies stack up to others, check out the " top 10 worst places to store a password. " does remote desktop protocol ( rdp ) really need to be exposed? our soc runs into far too many brute force attacks on …”
T1563.002RDP Hijacking
33%
“plain text passwords. if you ’ re curious about how your password storage policies stack up to others, check out the " top 10 worst places to store a password. " does remote desktop protocol ( rdp ) really need to be exposed? our soc runs into far too many brute force attacks on …”

Summary

Learn cyber hygiene best practices with Huntress: from strong passwords and MFA to patching and security training.