Information Security

With the growing number of threats, coupled with the evolving sophistication of attacks, organizations need to invest in cybersecurity and employee education to mitigate the loss of access to critical data and the resulting impact on business operations.

Employee Best Practices

  • Do not open attachments unless they are expected and come from a known and trusted source.
  • Do not execute software that is downloaded from the Internet (if such actions are permitted) unless from a trusted source or the download has been scanned for malware.
  • Be cautious when clicking on URLs in emails or social media programs, even when coming from trusted sources and friends.
  • Employ safe social media conduct. Hot topics are prime bait for scams, not all links lead to real login pages.
  • Encourage employees to raise the alarm if they see anything suspicious.

IT Best Practices

  • Deploy web browser URL reputation plugin solutions that display the reputation of websites from searches.
  • Restrict software to corporate-approved applications, and avoid downloading software from file sharing sites. Only download packages directly from trusted vendors’ websites with secure certificates.
  • Deploy two-step authentication on any website or app that offers it.
  • Ensure employees have different passwords for every email account, applications and login?especially for work-related sites and services.

Last modified: 4/12/2019 2:39:03 PM