Information Security – Do’s & Don’ts

May 31
10:41

2017

Cerina

Cerina

  • Share this article on Facebook
  • Share this article on Twitter
  • Share this article on Linkedin

Cyber security Cyber security is the shared responsibility of every individual and business unit. You as an organization play a key role in properly safeguarding and using private, sensitive information and organizational resources. Many organizations either haven’t enforced their policies in the past, or have done so inconsistently depending on the position of the employee. This causes many issues when a security function tries to crack down of violators. Many organizations have underestimated the important of implement policies and regulation about the information security.

mediaimage
The following Do’s and Don’ts help remind us all the things we must keep in mind to remain cautious.
  1. Do’s - Be accountable for your IT assets and data,Information Security – Do’s & Don’ts Articles Adhere to Policy on use of IT services and facilities.

Don’ts – Do not store sensitive information in portable device without strong encryption.

  1. Dos – Do scan all email attachments for viruses before opening them, use digital signature to send emails.

Don’ts – Don’t open email attachments from unknown sources, don’t click on links embedded

Reality check – 61% of Security & IT professionals believe their organizations will be the target of an advanced attack within next 6 months.

  1. Do’s – Choose well-known or trustworthy e-shopping sites, check the trustworthiness of the e-commerce website (e.g. checking the SSL certificate)

Don’ts – Don’t make any e-shopping transactions using computers in Internet café, don’t share your IDs with others.

  1. Do’s – Do keep your passwords or passphrases confidential, make sure that your password strength is strong and change it regularly.

Don’ts – Don’t share them with others or write them down. You are responsible for all activities associated with your credentials.

  1. Do’s – Be aware of your surroundings when printing, copying, faxing or discussing sensitive information. Pick up information from printers, copiers or faxes in a timely manner.

Don’ts – Install unauthorized programs on your work computer. Malicious applications often pose as legitimate software. Contact your IT support staff to verify if an application may be installed.

Information security is crucial in organization. So it is crucial and important to all staff in an organization to have knowledge and understanding about the importance of information security practice to protect the confidential data. Should you have any questions or concerns regarding your organizations security or need any IT security consulting then please visit https://www.credenceone.com/information-security-consulting/