Information Security Ė Doís & Doníts
Cyber security is the shared responsibility of every individual and business unit. You as an organization play a key role in properly safeguarding and using private, sensitive information and organizational resources. Many organizations either haven’t enforced their policies in the past, or have done so inconsistently depending on the position of the employee. This causes many issues when a security function tries to crack down of violators. Many organizations have underestimated the important of implement policies and regulation about the information security.
Don’ts – Do not store sensitive information in portable device without strong encryption.
Don’ts – Don’t open email attachments from unknown sources, don’t click on links embedded
Reality check – 61% of Security & IT professionals believe their organizations will be the target of an advanced attack within next 6 months.
Don’ts – Don’t make any e-shopping transactions using computers in Internet cafť, don’t share your IDs with others.
Don’ts – Don’t share them with others or write them down. You are responsible for all activities associated with your credentials.
Don’ts – Install unauthorized programs on your work computer. Malicious applications often pose as legitimate software. Contact your IT support staff to verify if an application may be installed.
Information security is crucial in organization. So it is crucial and important to all staff in an organization to have knowledge and understanding about the importance of information security practice to protect the confidential data. Should you have any questions or concerns regarding your organizations security or need any IT security consulting then please visit https://www.credenceone.com/information-security-consulting/
Source: Free Articles from ArticlesFactory.com
ABOUT THE AUTHOR
I’m an IT Consultant living in India. I am a fan of technology, entrepreneurship, and innovation. Currently I am working with Credenceone.†
CredenceOne†is an IT Infrastructure strategy & consulting firm that brings a disciplined and realistic approach in transforming IT by using proven methodologies, frameworks, and best practices based on vast Industry experience in IT Infrastructure Management.†