Security is the responsibility for all of us. Follow these tips and you’ll help keep yourself, your colleagues and our business safe.
Do not respond to emails or phone calls requesting confidential company information such as employee information, financial results, or company secrets. It is easy for an unauthorized person to call us and pretend to be an employee or one of our business partners. Stay on guard to avoid falling for scams and report any suspicious activities to Help Desk.
When you access sensitive information from a non-secure computer, like one in an Internet café or a shared machine at home, you put the information you’re viewing at risk. Make sure your computer is running the latest approved security patches, antivirus and firewall. And you should work in user mode, not administrator mode, whenever possible.
Don’t leave printouts containing private information on your desk. Lock them in a drawer or shred them. It’s very easy for a visitor to glance down at your desk and see sensitive documents. Keep your desk tidy and documents locked away. It makes the office look more organized, and reduces the risk of information leaks.
Always lock your computer and mobile phone when you’re not using them. You work is important and we want to make sure it stays safe and secure. Locking your phone and computer keeps your data and contacts safe from prying eyes.
*Tip: Pressing Win+L keys together will lock your computer quickly.
Always report any suspicious activity to the Help Desk. Part of our job is to stop cyber attacks and to make sure our data is not lost or stolen. All of our jobs depend on keeping our information safe. if something goes wrong, report it promptly. The faster we know about it, the faster we can handle it.
Always password-protect sensitive files on your computer, USB, smartphone, etc. Losing items like phones, USB flash drives and laptops can happen to anyone. Protecting your devices with strong passwords means you make it incredibly difficult for someone to break in and steal data.
Do not use easy-to-guess passwords, like “password,” or “cat,” and avoid obvious character sequences on the QWERTY keyboard, like “asdfg” and “12345.” It is better to use complex passwords containing different punctuations, upper and lowercase letters, numbers, and symbols. It is a best practice to use different passwords for different logins. If one gets hacked, other accounts will not be compromised.
Don’t let curiosity get the best of you. Always delete suspicious emails and links. Even opening or viewing these emails and links can compromise your computer and create unwanted problems without your knowledge. Remember, if something looks too good to be true, it probably is.
Don’t plug in personal devices like USB flash drives, MP3 players and smartphones without permission from IT. These devices can be compromised with code waiting to launch as soon as you plug them into a computer. Talk to IT about your devices and let us make the call.
Malicious applications often pose as legitimate programs, like games, tools or even antivirus software. They aim to fool you into infecting your computer or network. If you like an application and think it will be useful, contact IT to look into it for you before installing