SlideShare a Scribd company logo
1 of 8
1
Information SecurityInformation Security
Toolbox Talk
This document is made available on the condition that it is used solely to assist you in the preparation of your own safety training
material. Use for resale or similar commercial activity to third parties is strictly forbidden. This document was produced for our
internal use only, and therefore it may not be suitable or sufficient for your purposes. No guarantees whatsoever can be given as to
their legal compliance or comprehensiveness, and you are responsible for obtaining professional advice and verification as to the
correctness or suitability of any training or documents which you produce which are based wholly or in part on these. No liabilities
whatsoever are accepted. It has been made available purely for information to others who may find them useful when formulating
their own safety training and procedures.
© A. Groves & Océ (UK) Ltd
2
Rule 1Rule 1
 Always keep to our Policies
 Keep to our information security policies.
 Obey the customer’s information security rules.
 Respect the law and privacy legislation.
 Use approved hardware and licensed software only.
3
Rule 2Rule 2
 Handle information with care
 Keep your desk / work area clear.
 Keep confidential information
protected (under lock & key) during
breaks and when going home.
 Remove printed matter from printers,
copiers and faxes immediately
 Dispose of documents and
digital media securely
4
Rule 3Rule 3
 Keep your passwords and PINs secret
 Use quality passwords and PINs, and change them
regularly
 Keep your password and PINs secure
and don’t share them with anyone.
 Use password-protected screensavers.
 Log off and switch the PC off before
going home.
5
Rule 4Rule 4
 Know whom you’re dealing with
 Exercise caution in conversations and professional
interactions.
 Ensure that you know who you are communicating with on
the phone, the internet or via e-mail.
 Use your best professional judgement when getting or
giving information.
Not everything is true.
6
Rule 5Rule 5
 Use e-mail and the Internet with care
 Use e-mail and the Internet primarily
for business purposes.
 Don’t open any strange e-mails or
attachments and be careful when
downloading information.
 Don’t send strictly confidential
information via e-mail unless it is encrypted.
 Don’t access, download, store and send illegal or offensive
materials.
7
Rule 6Rule 6
 Pay attention to physical security and
mobile equipment
 Escort guests and make sure they
wear their visitor badges.
 Question strangers about their
presence in your department.
 Protect your mobile equipment with a
password or PIN and don’t leave it
unattended.
 Avoid the use of non-company equipment on the company
network.
8
Rule 7Rule 7
 Report incidents like viruses, thefts and
losses.
 Report suspicious activity at your workstation / area
immediately.
 Report all security incidents like thefts, losses, etc. to your
manager and security co-ordinator.

More Related Content

What's hot

20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network SecurityPatten John
 
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" InfographicDavid McHale
 
10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out10 Tips to Keep Criminals Out
10 Tips to Keep Criminals OutNeil Kemp
 
Pure retail training presentation v2
Pure retail training presentation v2Pure retail training presentation v2
Pure retail training presentation v2kaspersky-lab
 
Pure retail training non animation
Pure retail training non animationPure retail training non animation
Pure retail training non animationkatelyn-fogarty
 
Pure retail training presentation
Pure retail training presentationPure retail training presentation
Pure retail training presentationkatelyn-fogarty
 
Secure your public WiFi
Secure your public WiFiSecure your public WiFi
Secure your public WiFiMartin Keg
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe onlineShirley Diniz
 
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08Michael Boman
 
10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must FollowQuick Heal Technologies Ltd.
 
Network basic security
Network basic  securityNetwork basic  security
Network basic securityMohamed Radji
 
ReputationDefender - Your Privacy Demands Protection
ReputationDefender - Your Privacy Demands ProtectionReputationDefender - Your Privacy Demands Protection
ReputationDefender - Your Privacy Demands ProtectionReputationDefender
 
Austen Security Centre Presentation
Austen Security Centre PresentationAusten Security Centre Presentation
Austen Security Centre PresentationFrancois Brill
 

What's hot (19)

20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
 
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
 
10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out
 
Pure retail training presentation v2
Pure retail training presentation v2Pure retail training presentation v2
Pure retail training presentation v2
 
Pure retail training non animation
Pure retail training non animationPure retail training non animation
Pure retail training non animation
 
Pure retail training presentation
Pure retail training presentationPure retail training presentation
Pure retail training presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Van 231 safe
 Van 231 safe Van 231 safe
Van 231 safe
 
Secure your public WiFi
Secure your public WiFiSecure your public WiFi
Secure your public WiFi
 
Cyber security and crime
Cyber security and crimeCyber security and crime
Cyber security and crime
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
 
10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
 
HMA
HMAHMA
HMA
 
ReputationDefender - Your Privacy Demands Protection
ReputationDefender - Your Privacy Demands ProtectionReputationDefender - Your Privacy Demands Protection
ReputationDefender - Your Privacy Demands Protection
 
6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi
 
Austen Security Centre Presentation
Austen Security Centre PresentationAusten Security Centre Presentation
Austen Security Centre Presentation
 
How much should you reveal on social media
How much should you reveal on social mediaHow much should you reveal on social media
How much should you reveal on social media
 

Viewers also liked

Accident investigation presentation by stuart would
Accident investigation presentation by stuart wouldAccident investigation presentation by stuart would
Accident investigation presentation by stuart wouldMuthurv Venkatachalam
 
Corporate manslaughter and_corporate_homicide_act_2007
Corporate manslaughter and_corporate_homicide_act_2007Corporate manslaughter and_corporate_homicide_act_2007
Corporate manslaughter and_corporate_homicide_act_2007Muthurv Venkatachalam
 
Construction independant tied_scaffold
Construction independant tied_scaffoldConstruction independant tied_scaffold
Construction independant tied_scaffoldMuthurv Venkatachalam
 
Behavioural safety program_by_simon_holmes
Behavioural safety program_by_simon_holmesBehavioural safety program_by_simon_holmes
Behavioural safety program_by_simon_holmesMuthurv Venkatachalam
 
Aa asbestos training presentation version for h&s website
Aa asbestos training presentation version for h&s websiteAa asbestos training presentation version for h&s website
Aa asbestos training presentation version for h&s websiteMuthurv Venkatachalam
 
Basic principles of electrical safety
Basic principles of electrical safetyBasic principles of electrical safety
Basic principles of electrical safetyMuthurv Venkatachalam
 
Ms pipe internal cleaning (2)
Ms pipe internal cleaning (2)Ms pipe internal cleaning (2)
Ms pipe internal cleaning (2)Iqbal Mohammad
 

Viewers also liked (20)

Welcome heath safety
Welcome heath safetyWelcome heath safety
Welcome heath safety
 
Btfacultyorientation
BtfacultyorientationBtfacultyorientation
Btfacultyorientation
 
15 electro staticdischarge1g
15 electro staticdischarge1g15 electro staticdischarge1g
15 electro staticdischarge1g
 
15 electro staticdischarge1g
15 electro staticdischarge1g15 electro staticdischarge1g
15 electro staticdischarge1g
 
16 info securitytoolbox1g (1)
16 info securitytoolbox1g (1)16 info securitytoolbox1g (1)
16 info securitytoolbox1g (1)
 
13 lone workingtoolbox1g
13 lone workingtoolbox1g13 lone workingtoolbox1g
13 lone workingtoolbox1g
 
Accident investigation presentation by stuart would
Accident investigation presentation by stuart wouldAccident investigation presentation by stuart would
Accident investigation presentation by stuart would
 
Backcare5 g
Backcare5 gBackcare5 g
Backcare5 g
 
Altered and job made tools bst
Altered and job made tools   bstAltered and job made tools   bst
Altered and job made tools bst
 
Corporate manslaughter and_corporate_homicide_act_2007
Corporate manslaughter and_corporate_homicide_act_2007Corporate manslaughter and_corporate_homicide_act_2007
Corporate manslaughter and_corporate_homicide_act_2007
 
Construction independant tied_scaffold
Construction independant tied_scaffoldConstruction independant tied_scaffold
Construction independant tied_scaffold
 
Basics hf +_ergonomics
Basics hf +_ergonomicsBasics hf +_ergonomics
Basics hf +_ergonomics
 
Construction basics
Construction basicsConstruction basics
Construction basics
 
Case law slideshow
Case law slideshowCase law slideshow
Case law slideshow
 
Behavioural safety program_by_simon_holmes
Behavioural safety program_by_simon_holmesBehavioural safety program_by_simon_holmes
Behavioural safety program_by_simon_holmes
 
Aa asbestos training presentation version for h&s website
Aa asbestos training presentation version for h&s websiteAa asbestos training presentation version for h&s website
Aa asbestos training presentation version for h&s website
 
Safe operating of forklift
Safe operating of forkliftSafe operating of forklift
Safe operating of forklift
 
Construction site induction
Construction site inductionConstruction site induction
Construction site induction
 
Basic principles of electrical safety
Basic principles of electrical safetyBasic principles of electrical safety
Basic principles of electrical safety
 
Ms pipe internal cleaning (2)
Ms pipe internal cleaning (2)Ms pipe internal cleaning (2)
Ms pipe internal cleaning (2)
 

Similar to 16 info securitytoolbox1g (1)

Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online NetiquetteZoro18
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection ProgramsMichael Annis
 
Personal cyber security tips remote work
Personal cyber security tips remote workPersonal cyber security tips remote work
Personal cyber security tips remote workChinmayee Behera
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information SecurityKen Holmes
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Work from home policy
Work from home policyWork from home policy
Work from home policyHanees UK
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxvasidharta
 
Module4 policies&procedures-b
Module4   policies&procedures-bModule4   policies&procedures-b
Module4 policies&procedures-bBbAOC
 
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...Insurance Technologies Corporation (ITC)
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteGab Billones
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Security and Wearables: Success starts with security
Security and Wearables: Success starts with securitySecurity and Wearables: Success starts with security
Security and Wearables: Success starts with securityStephen Cobb
 
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...Jack Pringle
 

Similar to 16 info securitytoolbox1g (1) (20)

Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online Netiquette
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Poicy 121
Poicy 121Poicy 121
Poicy 121
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection Programs
 
Personal cyber security tips remote work
Personal cyber security tips remote workPersonal cyber security tips remote work
Personal cyber security tips remote work
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
it-security.ppt
it-security.pptit-security.ppt
it-security.ppt
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Work from home policy
Work from home policyWork from home policy
Work from home policy
 
Online Safety.pptx
Online Safety.pptxOnline Safety.pptx
Online Safety.pptx
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
 
Module4 policies&procedures-b
Module4   policies&procedures-bModule4   policies&procedures-b
Module4 policies&procedures-b
 
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Security and Wearables: Success starts with security
Security and Wearables: Success starts with securitySecurity and Wearables: Success starts with security
Security and Wearables: Success starts with security
 
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
 

More from Muthurv Venkatachalam (11)

heat stress
heat stressheat stress
heat stress
 
Civil law and criminal law
Civil law and criminal lawCivil law and criminal law
Civil law and criminal law
 
Campaign posters
Campaign postersCampaign posters
Campaign posters
 
Welcome heath safety
Welcome heath safetyWelcome heath safety
Welcome heath safety
 
Powered industrial trucks osha std
Powered industrial trucks osha stdPowered industrial trucks osha std
Powered industrial trucks osha std
 
Forllift safety
Forllift safetyForllift safety
Forllift safety
 
Fork lifts drive
Fork lifts driveFork lifts drive
Fork lifts drive
 
Working safely with work equipment by donald a mackay
Working safely with work equipment by donald a mackayWorking safely with work equipment by donald a mackay
Working safely with work equipment by donald a mackay
 
03 display screenequiptoolbox1g
03 display screenequiptoolbox1g03 display screenequiptoolbox1g
03 display screenequiptoolbox1g
 
13 lone workingtoolbox1g
13 lone workingtoolbox1g13 lone workingtoolbox1g
13 lone workingtoolbox1g
 
Breast cancer
Breast cancerBreast cancer
Breast cancer
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

16 info securitytoolbox1g (1)

  • 1. 1 Information SecurityInformation Security Toolbox Talk This document is made available on the condition that it is used solely to assist you in the preparation of your own safety training material. Use for resale or similar commercial activity to third parties is strictly forbidden. This document was produced for our internal use only, and therefore it may not be suitable or sufficient for your purposes. No guarantees whatsoever can be given as to their legal compliance or comprehensiveness, and you are responsible for obtaining professional advice and verification as to the correctness or suitability of any training or documents which you produce which are based wholly or in part on these. No liabilities whatsoever are accepted. It has been made available purely for information to others who may find them useful when formulating their own safety training and procedures. © A. Groves & Océ (UK) Ltd
  • 2. 2 Rule 1Rule 1  Always keep to our Policies  Keep to our information security policies.  Obey the customer’s information security rules.  Respect the law and privacy legislation.  Use approved hardware and licensed software only.
  • 3. 3 Rule 2Rule 2  Handle information with care  Keep your desk / work area clear.  Keep confidential information protected (under lock & key) during breaks and when going home.  Remove printed matter from printers, copiers and faxes immediately  Dispose of documents and digital media securely
  • 4. 4 Rule 3Rule 3  Keep your passwords and PINs secret  Use quality passwords and PINs, and change them regularly  Keep your password and PINs secure and don’t share them with anyone.  Use password-protected screensavers.  Log off and switch the PC off before going home.
  • 5. 5 Rule 4Rule 4  Know whom you’re dealing with  Exercise caution in conversations and professional interactions.  Ensure that you know who you are communicating with on the phone, the internet or via e-mail.  Use your best professional judgement when getting or giving information. Not everything is true.
  • 6. 6 Rule 5Rule 5  Use e-mail and the Internet with care  Use e-mail and the Internet primarily for business purposes.  Don’t open any strange e-mails or attachments and be careful when downloading information.  Don’t send strictly confidential information via e-mail unless it is encrypted.  Don’t access, download, store and send illegal or offensive materials.
  • 7. 7 Rule 6Rule 6  Pay attention to physical security and mobile equipment  Escort guests and make sure they wear their visitor badges.  Question strangers about their presence in your department.  Protect your mobile equipment with a password or PIN and don’t leave it unattended.  Avoid the use of non-company equipment on the company network.
  • 8. 8 Rule 7Rule 7  Report incidents like viruses, thefts and losses.  Report suspicious activity at your workstation / area immediately.  Report all security incidents like thefts, losses, etc. to your manager and security co-ordinator.