Page 135 - MPTSOUTH NEWSLETTER - JAN to JUN 2019 ISSUE
P. 135

Computers and smartphones are integral    SAFE HABITS TO PRACTICE ALL THE TIMES                                                 Any organization should take these sort of insider      shopping, you’re sharing your credit card number.
 to almost everyone’s lives. We use such                                                                                         threats into account and plan security procedures       And so on! Safely transferring and storing sensitive
 internet-connected devices at home and  Here  are some  tips  for  safe  habits  that  any  employee  can                       accordingly                                             data affects us all.
 at the workplace. Technology has created  start practicing today:
 enormous conveniences for us. We make                                                                                              NON-TECHNICAL PRACTICES ON THE GO                    How can you verify that you’re sharing and trans-
 purchases, search for information, bank  - Use strong passwords (longer is better!) and change them                                                                                     ferring sensitive  data well?  Follow these  three
 transactions, arrange vacations, interact  regularly.                                                                           Strong security isn’t just about the cyber domain       steps:
 with friends and relatives, just about any-  - Keep your sensitive login credentials private.                                   of strong passwords, blocking malware, and man-
 thing imaginable – as a result our devices  - Be very wary of opening emails and attachments from                               aging permissions. You also safeguard sensitive         - Verify the recipient. Don’t send to the wrong
 contain a wealth of personal and work  sources that you don’t recognize.                                                        information with physical security and cautious         person! Take a minute to double-check the recipi-
 related information – information that of  - Don’t install software or connect hardware to your busi-                           behavior. Here are some non-technical security          ent before you hit “Send”.
 course, we want to protect.  ness’s network without permission.                                                                 tips:                                                   - Verify the data. You don’t want to send the wrong
 - When working from home, make sure your Internet con-                                                                                                                                  data, even if it’s to the right person. Glance over
 Taking steps to prevent unauthorized  nection is secure.                                                                        - Keep an eye on your devices and never leave           your attached document one last time (did you
 computer or phone access is very import-                                                                                        them unlocked.                                          attach the version with the least necessary sensi-
 ant for a wide number of reasons. If your   BE WARY OF INSIDER THREATS TO SECURITY                                              - Look for privacy in places like airports and coffee   tive information, for example?) and reread your
 devices are not protected, identity thieves                                                                                     shops. Sit where no one can see over your shoul-        email.
 and other fraudsters may be able to get  Not all security threats come from outside. Human beings in                            der.                                                    - Verify the method. Transfer data according to
 access and steal your personal informa-  organizations are often threats as well, from accidents to                             - Dim the screen on your device or get a privacy        best practice or in line with your organization’s
 tion. Spammers could use your computer  negligence to malicious behavior.                                                       filter so it’s harder for strangers to see what’s on     policies. Are you required to encrypt emails with
 to send spam that looks like it came from                                                                                       your device.                                            PII? Make sure you’re doing that.
 you. Malicious viruses or spyware could be  How  can  employees  pose  a  risk?  Any  user  with  network                       - Don’t discuss sensitive information in public
 deposited on your computer, slowing it  permissions can inadvertently delete or compromise data.                                areas or where people can eavesdrop on your con-        Don’t ever say “It won’t happen to me”.  We are all
 down or destroying files.  This behavior is accidental, rather than malicious, but it can                                        versation.                                              at risk and the stakes are high. Protect your com-
 be just as bad. Then there’s negligence: sometimes employ-                                                                                                                              puter and phone, your data, and yourself by imple-
 By using good practices and If you do  ees violate security policies or best practices through                                           SENSITIVE DATA ON THE MOVE                     menting just a few simple measures.
 some regular maintenance and check a  well-intentioned but harmful actions or inattention.
 few settings, your computer and phone                                                                                           We live in a connected world where we must share        Source:
 will last longer and your data will be  And lastly, there are malicious insiders. The classic example                           sensitive,  identifying information  regularly  in      https: //oxen.tech/blog/basic-cybersecuri-
 protected. The following tips can help you  is the fired employee who abscond with sensitive data to sell                        exchange for services. If you’re accessing govern-      ty-tips-workplace/
 protect all the data it holds:  or uses still-active login credentials to access and harm busi-                                 ment or medical services, you’ll be sharing your PII
 ness accounts.                                                                                                                  (Personally Identifying Information). If you’re
   130   131   132   133   134   135   136   137   138   139   140