At Insert Company Name we take all precautions for keeping our networks, equipment and data secure very seriously. Help us do so by following these guidelines.
Use Built-in Protections
Don’t disable or try to breach our company-wide firewall and anti-virus programs. They have been activated on all of our machines to protect company data. Disabling these programs is in violation of ’s safe computer use policy. If these protections inhibit your workflow, let your supervisor know and work with IT to solve the problem.
Since threats are always evolving, so are the defences our systems use to fight against them. Always allow system automatic updates to install properly. If you choose to cancel these upgrades, your system may not have the most up-to-date security measures.
Use Smart Passwords
Strong passwords should be at least seven characters long and mix upper and lowercase letters and numbers. Using common words is a bad idea, since a common hacker technique is to use dictionary hacking that attempts common combinations.
Use different passwords for different accounts. Using the same passwords may be easy to remember, but if a hacker retrieves your password from a less secured site, they could then access all of your accounts. Change passwords regularly to increase your security.
To prevent spam messages and files reaching your inbox, be sure to use the spam filtration that ’s email client uses. If you do see any spam-like messages in your inbox, flag them as spam. This will help the spam filter improve its monitoring.
Set Security to High
Web browsers are a point of major weakness for security defence. Malicious programs will try to get your computer to download malware without you even knowing it by exposing weaknesses in your browser. Improve your defences by bolstering the security settings for your browser.
Download with Caution
If you need to download something, proceed carefully. By giving permission for a file to download, the anti-virus program may not be able to protect against them. Make sure the files are from a protected source. Even if an email comes from someone you know, but doesn’t seem like something they would send, their account may have been compromised.
When you’re out of the office, protect your electronic equipment from theft by disguising it. Don’t use obvious laptop briefcases and never leave any electronics out in the open in your car. If working remotely, try to keep within sight of your equipment. If you have to let it out of your sight, use a workstation lock to prevent someone from walking off with it.
The content of this document is of general interest and is not intended to apply to specific circumstances. It does not purport to be a comprehensive analysis of all matters relevant to its subject matter. The content should not, therefore, be regarded as constituting legal advice and not be relied upon as such. In relation to any particular problem which they may have, readers are advised to seek specific advice. Further, the law may have changed since first publication and the reader is cautioned accordingly. © 2010-2013, 2019 Zywave, Inc. All rights reserved