SlideShare a Scribd company logo
1 of 19
IT Security DOs and DON'Ts
James Lee
1. Confidential Information
• Don’t respond to emails or phone calls asking for
confidential company information.
• Always keep in mind that bad guys are successful because
they are convincing.
• Keep on guard and report any suspicious activity to IT.
• Recent news, Snapchat’s payroll department was targeted
by an isolated email phishing scam in which the scammer
impersonated their CEO and asked for employee payroll
information.
2. Sensitive Information
• Don’t leave printouts containing private information on your
desk. It’s easy for a visitor to glance at your desk and see
sensitive documents.
• Keep your desk tidy and documents locked away or shredded
when no longer needed.
• It makes the office look more organized, and reduces the risk
of information leaks.
3. Unprotected Computer
• When you access sensitive information from a non-secure
computer you put the information you’re viewing at risk.
• If you’re unsure if the computer you’re using is safe, don’t
use it to access corporate or sensitive data.
4. Lock your device
• Always lock your computer and mobile phone. You
work on important things, and we want to make sure
they stay safe and secure.
• Locking these devices keeps both your personal
information and the company’s data safe.
• Exit running applications and close opened
documents on the workstations prior leaving the
office.
5. Stay Alert
• Sometimes suspicious activity isn’t as obvious as we think.
• Be cautious of people you don’t know asking for things,
especially online.
• Always report any suspicious activity to IT. If something goes
wrong, the faster we know about it, the faster we can deal
with it.
• Users must report all lost or stolen devices to FUTEK IT
immediately.
• Also keep in mind to Keep food and drink away from
computer to avoid accidental spills.
6. Password Protection
• Always password-protect sensitive files on your
computer, USB flash drive, smartphone, laptop,
etc.
• Losing a device can happen to anyone. But by
protecting your device with strong passwords,
you can make it difficult for someone to break in
and steal data.
7. Passwords
• Many people use obvious passwords like
“password,” “cat,” or obvious character
sequences on the qwerty keyboard like “asdfg.”
• Create complex passwords by including
different letter cases, numbers, and AT LEAST
one punctuation.
• Try to use different passwords for different
websites and computers.
• DO NOT SHARE YOUR PASSWORD! You alone
are responsible for your account and activity
generated by it.
7. Passwords cont.
• Use a password manager software (for example LastPass,
Dashlane, 1Password, and others) to store and organize all
your encrypted passwords in one place.
• Always decline the use of the "Remember Password" feature
of FUTEK related applications (e.g., Google Chrome, IE).
• If someone demands a password, refer them to the IT
Policies document and direct them to the IT Department.
• If an account or password compromise is suspected,
immediately change it and report the incident to the IT
Department.
8. Email Phishing
Forward
Simply forward the email to
it@futek.com.
DO NOT
reply back
DO NOT reply back to the email.
DO NOT
click on
DO NOT click on any hyperlinks.
DO NOT
open
DO NOT open any type of
attachments.
• Hackers try to steal email lists from
companies. Company email addresses are
valuable to attackers, allowing them to
create fake emails from “real people.”
• Always delete suspicious emails from people
you don’t know, and never click on the links.
• Opening these emails or clicking on links in
them can compromise your computer
without you ever knowing it.
8.1 Email Phishing Examples
8.1 Email Phishing Examples
8.1 Email Phishing Examples
8.1 Email Phishing Examples
8.1 Email Phishing Examples
8.1 Email Phishing Examples
9. No Personal Data/Devices
• Make sure to make any connectivity with your
computer by clicking “Don’t Trust”.
• Don’t connect a personal cloud storage onto FUTEK’s
computer.
• Don’t back up smartphone data on FUTEK’s computer.
• We DO NOT back up computers.
• Put all work related files on your network share drives (:J
or :K) and save on the drive where your department is
allocated to.
10. Unauthorized Programs
• Malicious applications often pose as legitimate programs
like games, tools, or even antivirus software.
• Don’t install unauthorized software on workstations.
• If you like an application and think it will be useful, contact
us and we’ll look into it for you.

More Related Content

What's hot

ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slidesjubke
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Securityawareness
SecurityawarenessSecurityawareness
SecurityawarenessJayfErika
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanAhmed Musaad
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet SecurityGerard Lamusse
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 
Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxsanap6
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3DallasHaselhorst
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...David Menken
 

What's hot (20)

ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptx
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 

Similar to IT Security DOs and DON'Ts

IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTsIT Tech
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts Sophos
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfVarinder K
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
West Chester - Tech Training Session 11
West Chester - Tech Training Session 11West Chester - Tech Training Session 11
West Chester - Tech Training Session 11William Mann
 
Identity Theft - by LINKS Technology
Identity Theft - by LINKS TechnologyIdentity Theft - by LINKS Technology
Identity Theft - by LINKS TechnologyCoyleFinancial
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
7 Email Security Best Practices You Need to Follow in 2023.pptx
7 Email Security Best Practices You Need to Follow in 2023.pptx7 Email Security Best Practices You Need to Follow in 2023.pptx
7 Email Security Best Practices You Need to Follow in 2023.pptxMumara Campaigns
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 

Similar to IT Security DOs and DON'Ts (20)

IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTs
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Internet
InternetInternet
Internet
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdf
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Online reputation
Online reputationOnline reputation
Online reputation
 
West Chester - Tech Training Session 11
West Chester - Tech Training Session 11West Chester - Tech Training Session 11
West Chester - Tech Training Session 11
 
Identity Theft - by LINKS Technology
Identity Theft - by LINKS TechnologyIdentity Theft - by LINKS Technology
Identity Theft - by LINKS Technology
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Online reputation
Online reputationOnline reputation
Online reputation
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
7 Email Security Best Practices You Need to Follow in 2023.pptx
7 Email Security Best Practices You Need to Follow in 2023.pptx7 Email Security Best Practices You Need to Follow in 2023.pptx
7 Email Security Best Practices You Need to Follow in 2023.pptx
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 

Recently uploaded (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 

IT Security DOs and DON'Ts

  • 1. IT Security DOs and DON'Ts James Lee
  • 2. 1. Confidential Information • Don’t respond to emails or phone calls asking for confidential company information. • Always keep in mind that bad guys are successful because they are convincing. • Keep on guard and report any suspicious activity to IT. • Recent news, Snapchat’s payroll department was targeted by an isolated email phishing scam in which the scammer impersonated their CEO and asked for employee payroll information.
  • 3. 2. Sensitive Information • Don’t leave printouts containing private information on your desk. It’s easy for a visitor to glance at your desk and see sensitive documents. • Keep your desk tidy and documents locked away or shredded when no longer needed. • It makes the office look more organized, and reduces the risk of information leaks.
  • 4. 3. Unprotected Computer • When you access sensitive information from a non-secure computer you put the information you’re viewing at risk. • If you’re unsure if the computer you’re using is safe, don’t use it to access corporate or sensitive data.
  • 5. 4. Lock your device • Always lock your computer and mobile phone. You work on important things, and we want to make sure they stay safe and secure. • Locking these devices keeps both your personal information and the company’s data safe. • Exit running applications and close opened documents on the workstations prior leaving the office.
  • 6. 5. Stay Alert • Sometimes suspicious activity isn’t as obvious as we think. • Be cautious of people you don’t know asking for things, especially online. • Always report any suspicious activity to IT. If something goes wrong, the faster we know about it, the faster we can deal with it. • Users must report all lost or stolen devices to FUTEK IT immediately. • Also keep in mind to Keep food and drink away from computer to avoid accidental spills.
  • 7. 6. Password Protection • Always password-protect sensitive files on your computer, USB flash drive, smartphone, laptop, etc. • Losing a device can happen to anyone. But by protecting your device with strong passwords, you can make it difficult for someone to break in and steal data.
  • 8. 7. Passwords • Many people use obvious passwords like “password,” “cat,” or obvious character sequences on the qwerty keyboard like “asdfg.” • Create complex passwords by including different letter cases, numbers, and AT LEAST one punctuation. • Try to use different passwords for different websites and computers. • DO NOT SHARE YOUR PASSWORD! You alone are responsible for your account and activity generated by it.
  • 9.
  • 10. 7. Passwords cont. • Use a password manager software (for example LastPass, Dashlane, 1Password, and others) to store and organize all your encrypted passwords in one place. • Always decline the use of the "Remember Password" feature of FUTEK related applications (e.g., Google Chrome, IE). • If someone demands a password, refer them to the IT Policies document and direct them to the IT Department. • If an account or password compromise is suspected, immediately change it and report the incident to the IT Department.
  • 11. 8. Email Phishing Forward Simply forward the email to it@futek.com. DO NOT reply back DO NOT reply back to the email. DO NOT click on DO NOT click on any hyperlinks. DO NOT open DO NOT open any type of attachments. • Hackers try to steal email lists from companies. Company email addresses are valuable to attackers, allowing them to create fake emails from “real people.” • Always delete suspicious emails from people you don’t know, and never click on the links. • Opening these emails or clicking on links in them can compromise your computer without you ever knowing it.
  • 12. 8.1 Email Phishing Examples
  • 13. 8.1 Email Phishing Examples
  • 14. 8.1 Email Phishing Examples
  • 15. 8.1 Email Phishing Examples
  • 16. 8.1 Email Phishing Examples
  • 17. 8.1 Email Phishing Examples
  • 18. 9. No Personal Data/Devices • Make sure to make any connectivity with your computer by clicking “Don’t Trust”. • Don’t connect a personal cloud storage onto FUTEK’s computer. • Don’t back up smartphone data on FUTEK’s computer. • We DO NOT back up computers. • Put all work related files on your network share drives (:J or :K) and save on the drive where your department is allocated to.
  • 19. 10. Unauthorized Programs • Malicious applications often pose as legitimate programs like games, tools, or even antivirus software. • Don’t install unauthorized software on workstations. • If you like an application and think it will be useful, contact us and we’ll look into it for you.

Editor's Notes

  1. Don’t respond to emails or phone calls requesting confidential company information Always keep in mind that bad guys are successful because they are convincing. Keep on guard and report any suspicious activity to IT. (Recent Story 2/16/17 2 months ago: Snapchat leaked, payroll information can include SSN, bank details, addresses, emails, and other personal ID, which in the hands of the wrong people can cause headaches for those affected) https://techcrunch.com/2016/02/29/snapchat-employee-data-leaks-out-following-phishing-attack/
  2. Don’t leave printouts containing private information on your desk. It’s easy for a visitor to glance at your desk and see sensitive documents. Keep your desk tidy and documents locked away or shredded when no longer needed. It makes the office look more organized, and reduces the risk of information leaks.
  3. When you access sensitive information from a non-secure computer you put the information you’re viewing at risk. If you’re unsure if the computer you’re using is safe, don’t use it to access corporate or sensitive data.
  4. Always lock your computer and mobile phone when you’re not using them. You work on important things, and we want to make sure they stay safe and secure. Locking these devices keeps both your personal information and the company’s data and contacts safe from prying eyes. Exit running applications and close opened documents on the workstations prior leaving the office.
  5. Sometimes suspicious activity isn’t as obvious as we think. Be cautious of people you don't know asking for things, especially online. Always report any suspicious activity to IT. If something goes wrong, the faster we know about it, the faster we can deal with it. Users must report all lost or stolen devices to FUTEK IT immediately. Also keep in mind to Keep food and drink away from computer to avoid accidental spills.
  6. Always password-protect sensitive files on your computer, USB flash drive, smartphone, laptop, etc. Losing a device can happen to anyone. But by protecting your device with strong passwords, you make it difficult for someone to break in and steal data.
  7. Many people use obvious passwords like “password,” “cat,” or obvious character sequences on the qwerty keyboard like “asdfg.” Create complex passwords by including different letter cases, numbers, and even punctuation. Try to use different passwords for different websites and computers. So if one gets hacked, your other accounts aren’t compromised. DO NOT SHARE YOUR PASSWORD! You alone are responsible for your account and activity generated by it. Passwords should never be publicly displayed. If a password is compromised, it must be changed immediately. Passwords must not consist of commonly recognizable names or words, readily guessable sequence of letters or numbers, or data that can be easily associated with the user, such as birthdays, names of self, spouse, children, etc. Always use different passwords for FUTEK accounts from other non-FUTEK access (e.g., personal account, bank account, etc.). Do not share FUTEK passwords with anyone, except the IT Department as if required. All passwords are to be treated as sensitive, confidential FUTEK information. Use a password manager software (e.g., LastPass, Dashlane, 1Password and …) to store and organize all your encrypted passwords in one place. Passwords should never be written down or stored on-line without encryption. Do not reveal a password in email, chat, text message, or other electronic communication. Do not speak about a password in front of others. Do not hint at the format of a password (e.g., "my family name"). Do not reveal a password on questionnaires or security forms. If someone demands a password, refer them to this document and direct them to the IT Department. Always decline the use of the "Remember Password" feature of FUTEK related applications (e.g., Google Chrome, IE). If an account or password compromise is suspected, immediately change it and report the incident to the IT Department.
  8. Passwords should never be publicly displayed. (If a password is compromised, it must be changed immediately.) Passwords must not consist of commonly recognizable names or words, readily guessable sequence of letters or numbers, or data that can be easily associated with the user, such as birthdays, names of self, spouse, children, etc. Always use different passwords for FUTEK accounts from other non-FUTEK access (e.g., personal account, bank account, etc.). Do not share FUTEK passwords with anyone, except the IT Department as if required. All passwords are to be treated as sensitive, confidential FUTEK information. Use a password manager software (e.g., LastPass, Dashlane, 1Password and …) to store and organize all your encrypted passwords in one place. Passwords should never be written down or stored on-line without encryption. Do not reveal a password in email, chat, text message, or other electronic communication. Do not speak about a password in front of others. Do not hint at the format of a password (e.g., "my family name"). Do not reveal a password on questionnaires or security forms. If someone demands a password, refer them to this document and direct them to the IT Department. Always decline the use of the "Remember Password" feature of FUTEK related applications (e.g., Google Chrome, IE). If an account or password compromise is suspected, immediately change it and report the incident to the IT Department.
  9. Hackers try to steal email lists from companies. Company email addresses are valuable to attackers, allowing them to create fake emails from "real people.“ Always delete suspicious emails from people you don't know. And never click on the links. Opening these emails or clicking on links in them can compromise your computer without you ever knowing it.
  10. Don’t plug in personal devices such as USBs, MP3 players and smartphones without permission from IT. *Even a brand new iPod or USB flash drive could be infected with a nasty virus. *These devices can be compromised with code waiting to launch as soon as you plug them into a computer. Not connecting a personal USB Memory Stick to FUTEK’s computer. Not connecting a personal cloud storage on FUTEK’s computer. Not backing up a smartphone’s data on FUTEK’s computer. Talk to IT about your devices and let them make the call.
  11. Malicious applications often pose as legitimate programs like games, tools or even antivirus software. They aim to fool you into infecting your computer or network. Not installing unauthorized software on workstations. If you like an application and think it will be useful, contact us and we’ll look into it for you.