When it comes to cyber security everyone wishes to be safe and secured but even then, we don’t keep a watch on our own activity which can ensure that we are actually secured.
To begin with, Workplace Security is one of the key areas where our little effort and alertness may prevent several security lapses. This may result in peace and rest for everyone.
Everyone should keep strong passwords for their accounts and should never share their passwords with other may sound too cliché but when it comes to cyber security it does make sense. There are few strict dos and don’ts when it comes to passwords and everyone should follow it.
- Keep a strong password preferably a mix of letters (small case and upper-case), numbers and special characters.
- Keep separate passwords for different accounts
- Keep changing your passwords frequently
- Use 2 factor authentication wherever possible
- Don’t keep same password for multiple accounts
- Never share your passwords through your emails along with account details
- Never write down your password where it can be accessed by others
- Lock Your Device
Many people lock their computers when they leave their system unattended even for a minute but at the same time there are majority of people who don’t bother to do this basic check. This is a very common mistake that people make. So, it is always advisable to lock your device as soon as you leave it unattended.
While working, your system’s screen is meant for you and when you are not it doesn’t mean that someone else should peep around and see the content which may include confidential information or can be used by a colleague to send a prank email. This may also prevent a phishing attempt commonly known as shoulder phishing.
It’s very simple to lock your windows and mac, just press CTRL+ALT+DEL or Windows+L on a windows system and CTRL+SHIFT+Power on mac to lock your system. The systems would then require to login again with your password in order to be used.
- Take care of what you are sharing
Often people tend to leak information by being careless while speaking incorrect things at public places (or to the unintended person), not securing the printed documents, leaving the printed documents unattended at the reprographics room and sending emails to the wrong recipient(s). Most of the people also have habit of leaving the contents on whiteboard in conference rooms while exiting the conference rooms.
- One should STOP doing these practices right away. You should be aware while speaking in a public place, in a group including unintended persons.
- It just take a little effort on your part to be alert and read the contents of your email and messages twice before sending it or checking the recipients of the email and messages. One should review the documents before sending to ensure that you don’t leak any sensitive information
- Any printed documents should not be left unattended, in case such documents are no longer required; they should properly shredded instead of being thrown into the bin directly.
- Lastly you should ensure to erase the contents of board while leaving the conference
- Understand the meaning of Personal vs Professional
People often forget one basic rule of differentiating between personal and professional stuff. It is advisable to keep your personal and professional stuff separate.
- You should not use any personal email addresses or personal file sharing website on your work system.
- A professional should not to use his/her work systems for personal use such as online shopping, opening adult websites, storing personal files like pictures and documents.
- Likewise, you should refrain from using your office emails accounts for exchanging personal stuff, as they are likely tracked/monitored thus your personal stuff may end up in hands an unknown person.
- Report suspicious activity
Many people have tendency of clicking on links from untrusted sources and be victim of phishing and thus giving a chance to hackers to attack you and your company’s security.
- Do not open emails or attachment from strangers
- If you find any suspicious activity on your system, report these incidents to your company’s IT security team.
- Also, if you see any of your colleagues to be a victim of any of these activities then you should encourage them to report the incidents to the security team or you should report them to the security team.