Page 135 - MPTSOUTH NEWSLETTER - JAN to JUN 2019 ISSUE
P. 135
Computers and smartphones are integral SAFE HABITS TO PRACTICE ALL THE TIMES Any organization should take these sort of insider shopping, you’re sharing your credit card number.
to almost everyone’s lives. We use such threats into account and plan security procedures And so on! Safely transferring and storing sensitive
internet-connected devices at home and Here are some tips for safe habits that any employee can accordingly data affects us all.
at the workplace. Technology has created start practicing today:
enormous conveniences for us. We make NON-TECHNICAL PRACTICES ON THE GO How can you verify that you’re sharing and trans-
purchases, search for information, bank - Use strong passwords (longer is better!) and change them ferring sensitive data well? Follow these three
transactions, arrange vacations, interact regularly. Strong security isn’t just about the cyber domain steps:
with friends and relatives, just about any- - Keep your sensitive login credentials private. of strong passwords, blocking malware, and man-
thing imaginable – as a result our devices - Be very wary of opening emails and attachments from aging permissions. You also safeguard sensitive - Verify the recipient. Don’t send to the wrong
contain a wealth of personal and work sources that you don’t recognize. information with physical security and cautious person! Take a minute to double-check the recipi-
related information – information that of - Don’t install software or connect hardware to your busi- behavior. Here are some non-technical security ent before you hit “Send”.
course, we want to protect. ness’s network without permission. tips: - Verify the data. You don’t want to send the wrong
- When working from home, make sure your Internet con- data, even if it’s to the right person. Glance over
Taking steps to prevent unauthorized nection is secure. - Keep an eye on your devices and never leave your attached document one last time (did you
computer or phone access is very import- them unlocked. attach the version with the least necessary sensi-
ant for a wide number of reasons. If your BE WARY OF INSIDER THREATS TO SECURITY - Look for privacy in places like airports and coffee tive information, for example?) and reread your
devices are not protected, identity thieves shops. Sit where no one can see over your shoul- email.
and other fraudsters may be able to get Not all security threats come from outside. Human beings in der. - Verify the method. Transfer data according to
access and steal your personal informa- organizations are often threats as well, from accidents to - Dim the screen on your device or get a privacy best practice or in line with your organization’s
tion. Spammers could use your computer negligence to malicious behavior. filter so it’s harder for strangers to see what’s on policies. Are you required to encrypt emails with
to send spam that looks like it came from your device. PII? Make sure you’re doing that.
you. Malicious viruses or spyware could be How can employees pose a risk? Any user with network - Don’t discuss sensitive information in public
deposited on your computer, slowing it permissions can inadvertently delete or compromise data. areas or where people can eavesdrop on your con- Don’t ever say “It won’t happen to me”. We are all
down or destroying files. This behavior is accidental, rather than malicious, but it can versation. at risk and the stakes are high. Protect your com-
be just as bad. Then there’s negligence: sometimes employ- puter and phone, your data, and yourself by imple-
By using good practices and If you do ees violate security policies or best practices through SENSITIVE DATA ON THE MOVE menting just a few simple measures.
some regular maintenance and check a well-intentioned but harmful actions or inattention.
few settings, your computer and phone We live in a connected world where we must share Source:
will last longer and your data will be And lastly, there are malicious insiders. The classic example sensitive, identifying information regularly in https: //oxen.tech/blog/basic-cybersecuri-
protected. The following tips can help you is the fired employee who abscond with sensitive data to sell exchange for services. If you’re accessing govern- ty-tips-workplace/
protect all the data it holds: or uses still-active login credentials to access and harm busi- ment or medical services, you’ll be sharing your PII
ness accounts. (Personally Identifying Information). If you’re

