Free Articles, Free Web Content, Reprint Articles
Tuesday, April 23, 2019
 
Free Articles, Free Web Content, Reprint ArticlesRegisterAll CategoriesTop AuthorsSubmit Article (Article Submission)ContactSubscribe Free Articles, Free Web Content, Reprint Articles
 

Information Security Ė Doís & Doníts

Cyber security

Cyber security is the shared responsibility of every individual and business unit. You as an organization play a key role in properly safeguarding and using private, sensitive information and organizational resources. Many organizations either haven’t enforced their policies in the past, or have done so inconsistently depending on the position of the employee. This causes many issues when a security function tries to crack down of violators. Many organizations have underestimated the important of implement policies and regulation about the information security.

The following Do’s and Don’ts help remind us all the things we must keep in mind to remain cautious.
  1. Do’s - Be accountable for your IT assets and data, Adhere to Policy on use of IT services and facilities.

Don’ts – Do not store sensitive information in portable device without strong encryption.

  1. Dos – Do scan all email attachments for viruses before opening them, use digital signature to send emails.

Don’ts – Don’t open email attachments from unknown sources, don’t click on links embedded

Reality check – 61% of Security & IT professionals believe their organizations will be the target of an advanced attack within next 6 months.

  1. Do’s – Choose well-known or trustworthy e-shopping sites, check the trustworthiness of the e-commerce website (e.g. checking the SSL certificate)

Don’ts – Don’t make any e-shopping transactions using computers in Internet cafť, don’t share your IDs with others.

  1. Do’s – Do keep your passwords or passphrases confidential, make sure that your password strength is strong and change it regularly.

Don’ts – Don’t share them with others or write them down. You are responsible for all activities associated with your credentials.

  1. Do’s – Be aware of your surroundings when printing, copying, faxing or discussing sensitive information. Pick up information from printers, copiers or faxes in a timely manner.

Don’ts – Install unauthorized programs on your work computer. Malicious applications often pose as legitimate software. Contact your IT support staff to verify if an application may be installed.

Information security is crucial in organization. So it is crucial and important to all staff in an organization to have knowledge and understanding about the importance of information security practice to protect the confidential data. Should you have any questions or concerns regarding your organizations security or need any IT security consulting then please visit https://www.credenceone.com/information-security-consulting/

Source: Free Articles from ArticlesFactory.com

ABOUT THE AUTHOR


I’m an IT Consultant living in India. I am a fan of technology, entrepreneurship, and innovation. Currently I am working with Credenceone.†

CredenceOne†is an IT Infrastructure strategy & consulting firm that brings a disciplined and realistic approach in transforming IT by using proven methodologies, frameworks, and best practices based on vast Industry experience in IT Infrastructure Management.†



Health
Business
Finance
Travel
Technology
Home Repair
Computers
Marketing
Autos
Family
Entertainment
Law
Education
Communication
Other
Sports
ECommerce
Home Business
Self Help
Internet
Partners


Page loaded in 0.086 seconds