Free Articles, Free Web Content, Reprint Articles
Tuesday, October 26, 2021
Free Articles, Free Web Content, Reprint ArticlesRegisterAll CategoriesTop AuthorsSubmit Article (Article Submission)ContactSubscribe Free Articles, Free Web Content, Reprint Articles

Information Security Ė Doís & Doníts

Cyber security

Cyber security is the shared responsibility of every individual and business unit. You as an organization play a key role in properly safeguarding and using private, sensitive information and organizational resources. Many organizations either haven’t enforced their policies in the past, or have done so inconsistently depending on the position of the employee. This causes many issues when a security function tries to crack down of violators. Many organizations have underestimated the important of implement policies and regulation about the information security.

The following Do’s and Don’ts help remind us all the things we must keep in mind to remain cautious.
  1. Do’s - Be accountable for your IT assets and data, Adhere to Policy on use of IT services and facilities.

Don’ts – Do not store sensitive information in portable device without strong encryption.

  1. Dos – Do scan all email attachments for viruses before opening them, use digital signature to send emails.

Don’ts – Don’t open email attachments from unknown sources, don’t click on links embedded

Reality check – 61% of Security & IT professionals believe their organizations will be the target of an advanced attack within next 6 months.

  1. Do’s – Choose well-known or trustworthy e-shopping sites, check the trustworthiness of the e-commerce website (e.g. checking the SSL certificate)

Don’ts – Don’t make any e-shopping transactions using computers in Internet cafť, don’t share your IDs with others.

  1. Do’s – Do keep your passwords or passphrases confidential, make sure that your password strength is strong and change it regularly.

Don’ts – Don’t share them with others or write them down. You are responsible for all activities associated with your credentials.

  1. Do’s – Be aware of your surroundings when printing, copying, faxing or discussing sensitive information. Pick up information from printersFind Article, copiers or faxes in a timely manner.

Don’ts – Install unauthorized programs on your work computer. Malicious applications often pose as legitimate software. Contact your IT support staff to verify if an application may be installed.

Information security is crucial in organization. So it is crucial and important to all staff in an organization to have knowledge and understanding about the importance of information security practice to protect the confidential data. Should you have any questions or concerns regarding your organizations security or need any IT security consulting then please visit

Source: Free Articles from


I’m an IT Consultant living in India. I am a fan of technology, entrepreneurship, and innovation. Currently I am working with Credenceone.†

CredenceOne†is an IT Infrastructure strategy & consulting firm that brings a disciplined and realistic approach in transforming IT by using proven methodologies, frameworks, and best practices based on vast Industry experience in IT Infrastructure Management.†

Home Repair
Home Business
Self Help

Page loaded in 0.216 seconds