Page 34 - GBC Winter 2024 English
P. 34

PASSWORD MANAGEMENT BEST PRACTICES
Creating strong passwords is critical to safeguarding sensitive data from cyber threats in today’s digital landscape. Employees should adhere to the following guide- lines for password management:
• Select Unique Passwords: Each of your accounts should have its own password. Don’t reuse passwordsacrossmultiplesitesor applications, as this can lead to a domino effect of security breaches.
• Length and Complexity: Your passwords should be at least 12 characters long and include a mix of upper- and lowercase letters, numbers, and symbols to increase their complexity.
• Avoid Personal Information: Never include identifiable information like your name, birth date, or common words that could be easily guessed.
• Update Regularly: Change your passwords periodically, ideally every three months, to reduce the risk of being compromised.
• Password Managers: Consider using a password manager. These tools generate and store complex passwords, requiring you only to remember one strong master password.
• Activate 2FA: Always enable two-factor authentication (2FA) when available. 2FA adds an extra layer of security by requiring a second form of identification beyond just your password. This can include Authenticators, Hardware Tokens, fingerprint or facial recognition.
RECOGNIZING AND PREVENTING PHISHING ATTACKS
Phishing attacks are a serious security threat that can lead to data breaches and financial loss. Equip your team with knowledge and vigilance to effectively identify and combat these deceptive practices.
Types of Phishing Techniques
•Email Phishing is the most common type. In this type, you’ll receive an email that appears to be from a legitimate source, urging you to click on a link or provide sensitive information.
• Spear Phishing: A more targeted form of phishing involves emails directed at specific individuals or companies, often using personal information to appear convincing.
• Whaling: This technique targets high-level executives with more sophisticated email content, attempting to steal substantial amounts of money or sensitive company information.
• Smishing and Vishing: These types involve phishing via SMS (smishing) and voice calls (vishing) to coax personal details from the victim, like passwords or banking details.
• Spoofing: This is when someone disguises an email address, sender name, phone number, or website URL—often just by changing one letter, symbol, or number—to convince you that you are interacting with a trusted source. For instance, a staff member may receive an email that looks like it came from the general manager or club president, a company they’ve done business with, or even one of your regular golfers – but it isn’t!
Identifying Suspicious Emails and Links
When evaluating emails and links for signs of phishing, look for these red flags:
• Unusual Requests: Be skeptical of emails asking for confidential information, especially if they demand urgency.
• Sender’s Email Address: Check the sender’s email to see if it matches the legitimate organ- ization’s domain.
• Links and Attachments: Hover over links without clicking to view the URL. If it looks suspicious or doesn’t match the legitimate site, don’t click. Be wary of unexpected email attachments.
• Poor Grammar and Spelling: Official communications rarely have significant spelling or grammar errors.
• Generic Greetings: Phishing attempts often use generic salutations like “Dear Customer” instead of your real name.
SAFE INTERNET PRACTICES
This section will focus on securing devices and employing safe browsing to protect against online threats.
Securing Personal and Work Devices
To safeguard against cybersecurity risks, it’s essential tosecure both personal and work-related devices. In addition to strong passwords and authentication previously men- tioned, your employees need to: •Keep Your Operating Systems
Updated
• Install Antivirus Software
• Encrypt Sensitive Data
• Never leave devices unattended
in public spaces; keep them locked
when not in use.
•Use a Virtual Private Network
(VPN) when browsing on public Wi-Fi to encrypt your internet connection and protect your data.
• Set Up Standard User Accounts
Safe Browsing Techniques
Maintaining vigilance while browsing the internet is crucial to avoid falling prey to cyber threats. • Avoid Suspicious Links: Hover
over links before clicking to verify the URL and be wary of unsolicited links in emails or messages. For example, if the message comes from someone claiming to be from one company, but the link you’re hovering over goes to a different website, that’s suspicious!
34 Golf Business Canada
 


























































   32   33   34   35   36