The European Union Agency for Cybersecurity (ENISA) and the European Union’s Computer Emergency Response Team (CERT-EU) last week published a set of best practices to help organizations boost their cyber resilience.
The joint guidance is meant for public and private organizations in the EU, specifically CISOs and other decision makers. The document is also recommended for entities that support organizational risk management.
A total of 14 recommendations are outlined, and organizations have been advised to prioritize them based on their specific business needs.
The list includes the implementation of multi-factor authentication, avoiding the reuse of passwords to prevent credential stuffing attacks, ensuring that all software is up-to-date, limiting the access of third parties to internal networks and systems, hardening cloud environments, reviewing data backup strategies, and changing default credentials and disabling protocols that use weak authentication.
The agencies also recommend employing network segmentation, conducting regular training and cyber awareness events, creating a resilient email security environment, deploying protection against denial-of-service (DoS) attacks, limiting internet access for servers and other devices that could be abused for command and control (C&C) purposes by malicious actors, and creating procedures to efficiently communicate with computer security incident response teams (CSIRT).
“By following these recommendations in a consistent, systematic manner, ENISA and CERT-EU remain confident that organisations in the EU will be able to substantially improve their cybersecurity posture and in doing so will enhance the overall cyber resilience of Europe,” the cybersecurity agencies said.
However, the agencies noted that their recommendations can complement guidance issued by national or governmental cybersecurity authorities, but they do not replace it.
While other similar cybersecurity recommendations are available from both the private and public sector, implementing these recommendations is in many cases not an easy task, including due to budget and workforce constraints.
The guidance comes just weeks after major oil terminals in some of Western Europe’s biggest ports were hit by disruptive cyberattacks.
The recommendations also coincide with tensions mounting over a potential Russian invasion of Ukraine. Agencies in the United States have issued several warnings over the past weeks due to the threat posed by Russian cyber groups — while Russia appears to have mainly targeted Ukraine, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) noted that Moscow may expand its “destabilizing actions” outside of Ukraine.
Related: Security Scanners Across Europe Tied to China Govt, Military
Related: Europe’s Hypocrisy Over Personal Data Privacy Exposed
Related: EU Denounces Alleged Russian Hacking Ahead of German Vote

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
- New York Man Arrested for Running BreachForums Cybercrime Website
- Exploitation of Recent Fortinet Zero-Day Linked to Chinese Cyberspies
- Mozilla Patches High-Severity Vulnerabilities With Release of Firefox 111
- Microsoft: 17 European Nations Targeted by Russia in 2023 as Espionage Ramping Up
Latest News
- Burnout in Cybersecurity – Can it be Prevented?
- Spain Needs More Transparency Over Pegasus: EU Lawmakers
- Ransomware Will Likely Target OT Systems in EU Transport Sector: ENISA
- Virtual Event Today: Supply Chain & Third-Party Risk Summit
- Google Suspends Chinese Shopping App Amid Security Concerns
- Verosint Launches Account Fraud Detection and Prevention Platform
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
