SlideShare a Scribd company logo
1 of 8
BUILDING A SAFER
WORKPLACE
Security tips for your office

365
retailmarkets
Employee Awareness & Training
There are countless resources for basic
training on good employee
practices. Having employees trained
and aware of the threats on the internet
(and email) is half the battle to keeping
your corporate systems secure.

365 Retail Markets | Smart MicroMarket TechnologySM
1743 Maplelawn| Troy, MI | 48084 | www.365retailmarkets.com

2
Website Filtering
Do you control what employees can do
on your computers? You
should! Filtering out certain sites and
blocking certain types of content can
greatly reduce the likelihood that
employees are able to inadvertently
introduce viruses and “malware” onto
your corporate network.
365 Retail Markets | Smart MicroMarket TechnologySM
1743 Maplelawn| Troy, MI | 48084 | www.365retailmarkets.com

3
Email & Spam Filtering
Don’t rely on employees to know what is
safe or not. Most service providers now
offer this for free. By limiting the types of
content and attachments which can be
sent or received, you can greatly lower
the chances that someone accidentally
opens a bad file while at work (or
home.)
365 Retail Markets | Smart MicroMarket TechnologySM
1743 Maplelawn| Troy, MI | 48084 | www.365retailmarkets.com

4
Antivirus & PC Support
There is no excuse for every PC on your
network NOT having AntiVirus and NOT
being set to receive automatic
updates. Out of date software is one of
the most common ways Pcs become
infected. If you have employees with
laptops this is a must-have!!

365 Retail Markets | Smart MicroMarket TechnologySM
1743 Maplelawn| Troy, MI | 48084 | www.365retailmarkets.com

5
Security Healthcheck
For as little as $2,500, you can have a
reputable consultant conduct a health
check – they review your systems and
documentation and can generally give
you an action-plan in as little as a week.

365 Retail Markets | Smart MicroMarket TechnologySM
1743 Maplelawn| Troy, MI | 48084 | www.365retailmarkets.com

6
Insurance
Lastly, insurance. Many providers now
offer Security breach or insurance
coverage as a rider to your existing
liability policy. Breaches not only cost
you money in lost revenue and
customers but can cost enormous sums
to clean up. Talk to your agent
regarding options, as a small breach
can easily cost $50,000 to remediate.
365 Retail Markets | Smart MicroMarket TechnologySM
1743 Maplelawn| Troy, MI | 48084 | www.365retailmarkets.com

7
Resources
• Training Material

http://www.pcisecurityawarenesstraining.com/pages/sampledocuments

• Policies & Procedures

http://pcipolicyportal.com

• Insurance

http://www.thehartford.com/data-breach-insurance (best to
talk to your broker.)

• General Security Sites

http://www.sans.org

https://www.pcisecuritystandards.org/security_standards/index.
php
http://www.darkreading.com (news)
365 Retail Markets | Smart MicroMarket TechnologySM
1743 Maplelawn| Troy, MI | 48084 | www.365retailmarkets.com

8

More Related Content

Viewers also liked (6)

Security - Situational awareness
Security - Situational awarenessSecurity - Situational awareness
Security - Situational awareness
 
Self Defence For Women
Self Defence For WomenSelf Defence For Women
Self Defence For Women
 
Female Self Defense
Female Self DefenseFemale Self Defense
Female Self Defense
 
Self defense power point by giri bdr. sunar
Self defense power point by giri bdr. sunarSelf defense power point by giri bdr. sunar
Self defense power point by giri bdr. sunar
 
Self defense 2
Self defense 2Self defense 2
Self defense 2
 
Stress Management Presentation
Stress Management PresentationStress Management Presentation
Stress Management Presentation
 

Similar to Security Tips For A Safer Workplace

Module 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxModule 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptx
caniceconsulting
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
at MicroFocus Italy ❖✔
 

Similar to Security Tips For A Safer Workplace (20)

Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
 
Module 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxModule 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptx
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seeking
 
Security and SMBs
Security and SMBsSecurity and SMBs
Security and SMBs
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Protect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and ActionProtect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and Action
 
Common IT Mistakes
Common IT MistakesCommon IT Mistakes
Common IT Mistakes
 
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
 
Train Employees to Avoid Cybercrime
Train Employees to Avoid CybercrimeTrain Employees to Avoid Cybercrime
Train Employees to Avoid Cybercrime
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - Kloudlearn
 
Why SMBs Outsource IT to MSPs
Why SMBs Outsource IT to MSPsWhy SMBs Outsource IT to MSPs
Why SMBs Outsource IT to MSPs
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Epoch Universal Professional Services: Penetration Test
Epoch Universal Professional Services: Penetration TestEpoch Universal Professional Services: Penetration Test
Epoch Universal Professional Services: Penetration Test
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Security Tips For A Safer Workplace

  • 1. BUILDING A SAFER WORKPLACE Security tips for your office 365 retailmarkets
  • 2. Employee Awareness & Training There are countless resources for basic training on good employee practices. Having employees trained and aware of the threats on the internet (and email) is half the battle to keeping your corporate systems secure. 365 Retail Markets | Smart MicroMarket TechnologySM 1743 Maplelawn| Troy, MI | 48084 | www.365retailmarkets.com 2
  • 3. Website Filtering Do you control what employees can do on your computers? You should! Filtering out certain sites and blocking certain types of content can greatly reduce the likelihood that employees are able to inadvertently introduce viruses and “malware” onto your corporate network. 365 Retail Markets | Smart MicroMarket TechnologySM 1743 Maplelawn| Troy, MI | 48084 | www.365retailmarkets.com 3
  • 4. Email & Spam Filtering Don’t rely on employees to know what is safe or not. Most service providers now offer this for free. By limiting the types of content and attachments which can be sent or received, you can greatly lower the chances that someone accidentally opens a bad file while at work (or home.) 365 Retail Markets | Smart MicroMarket TechnologySM 1743 Maplelawn| Troy, MI | 48084 | www.365retailmarkets.com 4
  • 5. Antivirus & PC Support There is no excuse for every PC on your network NOT having AntiVirus and NOT being set to receive automatic updates. Out of date software is one of the most common ways Pcs become infected. If you have employees with laptops this is a must-have!! 365 Retail Markets | Smart MicroMarket TechnologySM 1743 Maplelawn| Troy, MI | 48084 | www.365retailmarkets.com 5
  • 6. Security Healthcheck For as little as $2,500, you can have a reputable consultant conduct a health check – they review your systems and documentation and can generally give you an action-plan in as little as a week. 365 Retail Markets | Smart MicroMarket TechnologySM 1743 Maplelawn| Troy, MI | 48084 | www.365retailmarkets.com 6
  • 7. Insurance Lastly, insurance. Many providers now offer Security breach or insurance coverage as a rider to your existing liability policy. Breaches not only cost you money in lost revenue and customers but can cost enormous sums to clean up. Talk to your agent regarding options, as a small breach can easily cost $50,000 to remediate. 365 Retail Markets | Smart MicroMarket TechnologySM 1743 Maplelawn| Troy, MI | 48084 | www.365retailmarkets.com 7
  • 8. Resources • Training Material http://www.pcisecurityawarenesstraining.com/pages/sampledocuments • Policies & Procedures http://pcipolicyportal.com • Insurance http://www.thehartford.com/data-breach-insurance (best to talk to your broker.) • General Security Sites http://www.sans.org https://www.pcisecuritystandards.org/security_standards/index. php http://www.darkreading.com (news) 365 Retail Markets | Smart MicroMarket TechnologySM 1743 Maplelawn| Troy, MI | 48084 | www.365retailmarkets.com 8