Search

+
Information Security – Do’s & Dont’s

Cyber security is the shared responsibility of every individual and business unit. You as an organization play a key role in properly safeguarding and using private, sensitive information and organizational resources. Many organizations either haven’t enforced their policies in the past, or have done so inconsistently depending on the position of the employee. This causes many issues when a security function tries to crack down of violators. Many organizations have underestimated the important of implement policies and regulation about the information security.

The following Do’s and Don’ts help remind us all the things we must keep in mind to remain cautious.

  1. Do’s – Be accountable for your IT assets and data, Adhere to Policy on use of IT services and facilities.
  2. Dos – Do scan all email attachments for viruses before opening them, use digital signature to send emails.
  3. Do’s – Choose well-known or trustworthy e-shopping sites, check the trustworthiness of the e-commerce website (e.g. checking the SSL certificate)
  4. Do’s – Do keep your passwords or passphrases confidential, make sure that your password strength is strong and change it regularly.
  5. Do’s – Be aware of your surroundings when printing, copying, faxing or discussing sensitive information. Pick up information from printers, copiers or faxes in a timely manner.

 

  1. Dont’s – Install unauthorized programs on your work computer. Malicious applications often pose as legitimate software. Contact your IT support staff to verify if an application may be installed.
  2. Dont’s – Do not store sensitive information in portable device without strong encryption.
  3. Dont;s – Don’t open email attachments from unknown sources, don’t click on links embedded
  4. Reality check – 61% of Security & IT professionals believe their organizations will be the target of an advanced attack within next 6 months.
  5. Dont’s – Don’t make any e-shopping transactions using computers in Internet café, don’t share your IDs with others.
Posted in: Certified Cyber Security

Comments (No Responses )

No comments yet.