SlideShare uma empresa Scribd logo
1 de 13
IT Security DOs and DON’Ts
From your helpful IT Team
A note for you
We have created this presentation for you, the outstanding employee who has
IT security on the brain.

We want to help you spread the word about IT security, so we’re giving you our
top 10 IT Security DOs and DON’Ts to help you in that effort.

Take this content and tailor it to your business. Use it for new employee
training, quarterly IT updates, or even general company meetings. It’s up to you.

And we’d love to hear your feedback on how we can make this better.
Visit www.sophos.com/staysafefeedback

Your friends @ SOPHOS
1. Don’t be tricked into giving
away confidential information
• Don’t respond to emails or phone calls requesting
  confidential company information
• Always keep in mind that bad guys are successful
  because they are convincing.
• Recent news stories out of Canada reported scammers
  were tricking people into giving away information with
  fake tech support calls claiming to help.
• Keep on guard and report any
  suspicious activity to IT.

Video tip 1: Don’t get tricked
2. Don’t use an unprotected
computer
• When you access sensitive information from a non-secure
  computer you put the information you’re viewing at risk.
• Malicious software exists that allows people to easily
  snoop on what you’re doing online when accessing
  unprotected sites.
• If you’re unsure if the computer you’re using
  is safe, don’t use it to access corporate or
  sensitive data.
                            Keep your personal computer safe with
                                   Sophos Virus Removal Tool or
                           Sophos Anti-virus for Mac Home Edition



Video tip 2: Stay secure
3. Don’t leave sensitive info lying
around the office
• Don’t leave printouts containing private information on your
  desk. It’s easy for a visitor to glance at your desk and see
  sensitive documents.
• Keep your desk tidy and documents locked away or
  shredded when no longer needed.
• It makes the office look more organized, and reduces the
  risk of information leaks.




Video tip 3: Put things away
4. Lock your computer and
mobile phone when not in use
• Always lock your computer and mobile phone when you’re
  not using them. You work on important things, and we want
  to make sure they stay safe and secure.
• Locking these devices keeps both your personal
  information and the company’s data and contacts safe
  from prying eyes.




Video tip 4: Lock it
5. Stay alert and report suspicious
activity
• Sometimes suspicious activity isn’t as obvious as we think.
• A recent news story reported that a supermarket manager,
  who was randomly befriended by a mysterious woman on
  Facebook, ended up on a “date” with two men who
  overpowered him and robbed his store.
• Be cautious of people you don't know
  asking for things, especially online.
• Always report any suspicious activity
  to IT. If something goes wrong, the
  faster we know about it, the faster we
  can deal with it.
Video tip 5: Stay alert
6. Password-protect sensitive
files and devices
• Always password-protect sensitive files on your
  computer, USB flash drive, smartphone, laptop, etc.
• Losing a device can happen to anyone. But by protecting
  your device with strong passwords, you make it difficult for
  someone to break in and steal data.




Video tip 6: Protect it
7. Always use hard-to-guess
passwords
• Many people use obvious passwords like “password,” “cat,”
  or obvious character sequences on the qwerty keyboard
  like “asdfg.”
• Create complex passwords by including different letter
  cases, numbers, and even punctuation.
• Try to use different passwords for
  different websites and computers.
  So if one gets hacked,
  your other accounts aren’t
  compromised.

Video tip 7: Use strong passwords
8. Be cautious of suspicious
emails and links
• Hackers try to steal email lists from companies, which
  happened recently to Toshiba. Company email addresses
  are valuable to attackers, allowing them to create fake
  emails from "real people.“
• Always delete suspicious emails from people you don't
  know. And never click on the links.
• Opening these emails or clicking on
  links in them can compromise your
  computer without you ever knowing it.

Video tip 8: Think first
9. Don’t plug in personal devices
without the OK from IT
• Don’t plug in personal devices such as USBs, MP3 players
  and smartphones without permission from IT.
• Even a brand new iPod or USB flash drive could be
  infected with a nasty virus.
• These devices can be compromised
  with code waiting to launch
  as soon as you plug them into
  a computer.
• Talk to IT about your devices and
                                       Protect your personal Android device with
  let them make the call.                   Sophos Mobile Security Free Edition

Video tip 9: Don't plug it in
10. Don’t install unauthorized
programs on your work computer
• Malicious applications often pose as legitimate programs
  like games, tools or even antivirus software.
• They aim to fool you into infecting your computer
  or network.
• If you like an application and think it will be useful,
  contact us and we’ll look into it for you.




Video tip 10: Don’t install it
Get more
IT Security DOs and DON’Ts
View the online handbook at www.sophos.com/securitytips

Get quick tips to create strong passwords



Connect with us:
facebook.com/securitybysophos
twitter.com/Sophos_News
Sophos on Google+
linkedin.com/company/sophos

Mais conteúdo relacionado

Mais procurados

IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 
IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTsIT Tech
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...David Menken
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slidesjubke
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness SnapComms
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness trainingAbdalrhmanTHassan
 

Mais procurados (20)

IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTs
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 

Semelhante a IT Security DOs and DON'Ts

Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital SecurityUjjwal Acharya
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your usersSimpliv LLC
 
Edu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crsEdu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crssapphirecrs
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 
Module5 desktop-laptop-security-b
Module5 desktop-laptop-security-bModule5 desktop-laptop-security-b
Module5 desktop-laptop-security-bBbAOC
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnumARUN REDDY M
 
Your smartphone can help protect itself – and
Your smartphone can help protect itself – andYour smartphone can help protect itself – and
Your smartphone can help protect itself – andRandyBett
 
Personal cyber security tips remote work
Personal cyber security tips remote workPersonal cyber security tips remote work
Personal cyber security tips remote workChinmayee Behera
 
How to be safe on the internet. Group 2 of Tulip Made by the group two of se...
How to be safe on the internet. Group 2 of Tulip  Made by the group two of se...How to be safe on the internet. Group 2 of Tulip  Made by the group two of se...
How to be safe on the internet. Group 2 of Tulip Made by the group two of se...XhanPlayz
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
Keep Your Computers Safe And Secure
Keep Your Computers Safe And SecureKeep Your Computers Safe And Secure
Keep Your Computers Safe And SecureRob Clement
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter Cyber Security
 
Essential Technologies for Psychologists
Essential Technologies for PsychologistsEssential Technologies for Psychologists
Essential Technologies for PsychologistsBradnor444
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security TipsInfusionsoft
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 

Semelhante a IT Security DOs and DON'Ts (20)

IT Security DOs and DON'Ts
IT Security DOs and DON'TsIT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
Edu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crsEdu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crs
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Module5 desktop-laptop-security-b
Module5 desktop-laptop-security-bModule5 desktop-laptop-security-b
Module5 desktop-laptop-security-b
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnum
 
Internet
InternetInternet
Internet
 
Your smartphone can help protect itself – and
Your smartphone can help protect itself – andYour smartphone can help protect itself – and
Your smartphone can help protect itself – and
 
Personal cyber security tips remote work
Personal cyber security tips remote workPersonal cyber security tips remote work
Personal cyber security tips remote work
 
How to be safe on the internet. Group 2 of Tulip Made by the group two of se...
How to be safe on the internet. Group 2 of Tulip  Made by the group two of se...How to be safe on the internet. Group 2 of Tulip  Made by the group two of se...
How to be safe on the internet. Group 2 of Tulip Made by the group two of se...
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Keep Your Computers Safe And Secure
Keep Your Computers Safe And SecureKeep Your Computers Safe And Secure
Keep Your Computers Safe And Secure
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 
Essential Technologies for Psychologists
Essential Technologies for PsychologistsEssential Technologies for Psychologists
Essential Technologies for Psychologists
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Mais de Sophos

Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos
 
Your Money or Your File! Highway Robbery with Blackhole and Ransomware
Your Money or Your File! Highway Robbery with Blackhole and RansomwareYour Money or Your File! Highway Robbery with Blackhole and Ransomware
Your Money or Your File! Highway Robbery with Blackhole and RansomwareSophos
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report PresentationSophos
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser ProtectionSophos
 
2013 Security Threat Report
2013 Security Threat Report2013 Security Threat Report
2013 Security Threat ReportSophos
 
4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint SettingsSophos
 
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionPreparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionSophos
 
Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Sophos
 
Get the Most From Your Firewall
Get the Most From Your FirewallGet the Most From Your Firewall
Get the Most From Your FirewallSophos
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't StopSophos
 
When Malware Goes Mobile
When Malware Goes MobileWhen Malware Goes Mobile
When Malware Goes MobileSophos
 
Exposing the Money Behind Malware
Exposing the Money Behind MalwareExposing the Money Behind Malware
Exposing the Money Behind MalwareSophos
 
BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your SchoolSophos
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security BoxSophos
 
Complete Security
Complete SecurityComplete Security
Complete SecuritySophos
 
IT Security DOs und DON’Ts (Italian)
IT Security DOs und DON’Ts (Italian)IT Security DOs und DON’Ts (Italian)
IT Security DOs und DON’Ts (Italian)Sophos
 

Mais de Sophos (18)

Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection Overview
 
Your Money or Your File! Highway Robbery with Blackhole and Ransomware
Your Money or Your File! Highway Robbery with Blackhole and RansomwareYour Money or Your File! Highway Robbery with Blackhole and Ransomware
Your Money or Your File! Highway Robbery with Blackhole and Ransomware
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report Presentation
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
2013 Security Threat Report
2013 Security Threat Report2013 Security Threat Report
2013 Security Threat Report
 
4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings
 
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionPreparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless Protection
 
Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?
 
Get the Most From Your Firewall
Get the Most From Your FirewallGet the Most From Your Firewall
Get the Most From Your Firewall
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop
 
When Malware Goes Mobile
When Malware Goes MobileWhen Malware Goes Mobile
When Malware Goes Mobile
 
Exposing the Money Behind Malware
Exposing the Money Behind MalwareExposing the Money Behind Malware
Exposing the Money Behind Malware
 
BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your School
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security Box
 
Complete Security
Complete SecurityComplete Security
Complete Security
 
IT Security DOs und DON’Ts (Italian)
IT Security DOs und DON’Ts (Italian)IT Security DOs und DON’Ts (Italian)
IT Security DOs und DON’Ts (Italian)
 

Último

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Último (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

IT Security DOs and DON'Ts

  • 1. IT Security DOs and DON’Ts From your helpful IT Team
  • 2. A note for you We have created this presentation for you, the outstanding employee who has IT security on the brain. We want to help you spread the word about IT security, so we’re giving you our top 10 IT Security DOs and DON’Ts to help you in that effort. Take this content and tailor it to your business. Use it for new employee training, quarterly IT updates, or even general company meetings. It’s up to you. And we’d love to hear your feedback on how we can make this better. Visit www.sophos.com/staysafefeedback Your friends @ SOPHOS
  • 3. 1. Don’t be tricked into giving away confidential information • Don’t respond to emails or phone calls requesting confidential company information • Always keep in mind that bad guys are successful because they are convincing. • Recent news stories out of Canada reported scammers were tricking people into giving away information with fake tech support calls claiming to help. • Keep on guard and report any suspicious activity to IT. Video tip 1: Don’t get tricked
  • 4. 2. Don’t use an unprotected computer • When you access sensitive information from a non-secure computer you put the information you’re viewing at risk. • Malicious software exists that allows people to easily snoop on what you’re doing online when accessing unprotected sites. • If you’re unsure if the computer you’re using is safe, don’t use it to access corporate or sensitive data. Keep your personal computer safe with Sophos Virus Removal Tool or Sophos Anti-virus for Mac Home Edition Video tip 2: Stay secure
  • 5. 3. Don’t leave sensitive info lying around the office • Don’t leave printouts containing private information on your desk. It’s easy for a visitor to glance at your desk and see sensitive documents. • Keep your desk tidy and documents locked away or shredded when no longer needed. • It makes the office look more organized, and reduces the risk of information leaks. Video tip 3: Put things away
  • 6. 4. Lock your computer and mobile phone when not in use • Always lock your computer and mobile phone when you’re not using them. You work on important things, and we want to make sure they stay safe and secure. • Locking these devices keeps both your personal information and the company’s data and contacts safe from prying eyes. Video tip 4: Lock it
  • 7. 5. Stay alert and report suspicious activity • Sometimes suspicious activity isn’t as obvious as we think. • A recent news story reported that a supermarket manager, who was randomly befriended by a mysterious woman on Facebook, ended up on a “date” with two men who overpowered him and robbed his store. • Be cautious of people you don't know asking for things, especially online. • Always report any suspicious activity to IT. If something goes wrong, the faster we know about it, the faster we can deal with it. Video tip 5: Stay alert
  • 8. 6. Password-protect sensitive files and devices • Always password-protect sensitive files on your computer, USB flash drive, smartphone, laptop, etc. • Losing a device can happen to anyone. But by protecting your device with strong passwords, you make it difficult for someone to break in and steal data. Video tip 6: Protect it
  • 9. 7. Always use hard-to-guess passwords • Many people use obvious passwords like “password,” “cat,” or obvious character sequences on the qwerty keyboard like “asdfg.” • Create complex passwords by including different letter cases, numbers, and even punctuation. • Try to use different passwords for different websites and computers. So if one gets hacked, your other accounts aren’t compromised. Video tip 7: Use strong passwords
  • 10. 8. Be cautious of suspicious emails and links • Hackers try to steal email lists from companies, which happened recently to Toshiba. Company email addresses are valuable to attackers, allowing them to create fake emails from "real people.“ • Always delete suspicious emails from people you don't know. And never click on the links. • Opening these emails or clicking on links in them can compromise your computer without you ever knowing it. Video tip 8: Think first
  • 11. 9. Don’t plug in personal devices without the OK from IT • Don’t plug in personal devices such as USBs, MP3 players and smartphones without permission from IT. • Even a brand new iPod or USB flash drive could be infected with a nasty virus. • These devices can be compromised with code waiting to launch as soon as you plug them into a computer. • Talk to IT about your devices and Protect your personal Android device with let them make the call. Sophos Mobile Security Free Edition Video tip 9: Don't plug it in
  • 12. 10. Don’t install unauthorized programs on your work computer • Malicious applications often pose as legitimate programs like games, tools or even antivirus software. • They aim to fool you into infecting your computer or network. • If you like an application and think it will be useful, contact us and we’ll look into it for you. Video tip 10: Don’t install it
  • 13. Get more IT Security DOs and DON’Ts View the online handbook at www.sophos.com/securitytips Get quick tips to create strong passwords Connect with us: facebook.com/securitybysophos twitter.com/Sophos_News Sophos on Google+ linkedin.com/company/sophos