The more we rely on technology to receive, store, and manage information, the more vulnerable we are to severe security breaches. Human errors, hacker attacks, and systems breakdowns could cost a business a lot of money and hurt its reputation, so we’ve taken certain security precautions to reduce security threats.
Confidential Data is private and important information such
- Unpublished financial data
- Customer/partner/vendor data
- Patents, formulae, or innovations
- Existing/prospective customer lists
Way to avoid security Breaches
-
- Protect personal and company devices:
- Keep both personal and company-issued devices password protected.
- Use a complete antivirus software.
- Avoid leaving devices exposed or unattended.
- Do regular checks on security updates of browsers and systems monthly or as soon as updates are available.
- Only use private and secure networks to access company accounts and systems.
- Emails often host scams and malicious software (e.g. worms.) To avoid virus infection or data theft:
- Avoid opening attachments and clicking on links when the content is not adequately explained (e.g. “watch this video, it’s amazing.”)
- Be suspicious of clickbait titles (e.g. offering prizes, advice.)
- Check email and names of people they received a message from to ensure they are legitimate.
- Look for inconsistencies or give-aways (e.g. grammar mistakes, capital letters, excessive number of exclamation marks.
- Manage passwords properly:
- Password leaks are dangerous since they can compromise our entire infrastructure. Not only should passwords be secure so they won’t be easily hacked, but they should also remain secret.
- Choose passwords with at least eight characters (including capital and lower-case letters, numbers and symbols) and avoid information that can be easily guessed (e.g. birthdays).
- Remember passwords instead of writing them down. If employees need to write their passwords, they are obliged to keep the paper or digital document confidential and destroy it when their work is done.
- Exchange credentials only when absolutely necessary. When exchanging them in-person isn’t possible, employees should prefer the phone instead of email, and only if they personally recognize the person they are talking to.
- Change passwords every two months.
- Protect personal and company devices: