When it comes to cybersecurity, it is common to begin by defining terms such as antivirus, firewalls or security settings. Still, many times we forget our most immediate environment: our workplace.
A careless job can sometimes lead to a fundamental security breach. This is the environment where we handle information; leaving it exposed or accessible to third parties can lead to a security incident.
One of the attack vectors used by cybercriminals is to take advantage of unlocked mobiles and computers. Our devices carry out fundamental and vital procedures for the business. In addition, they contain crucial information for the company. For this reason, it is essential that when we stop using them, they are not left unattended, even for a moment, blocking them to prevent anyone from compromising the company’s information.
Even though we use digital media more and more frequently, printed paper documents continue to be a fundamental element for any company. The moment we stop using a document, it is necessary to archive it safely, even when we have to be temporarily absent. It will also need to be stored under lock and key, especially when dealing with confidential or business-critical documents. Remember to keep this in mind at the end of your workday.
Passwords must follow the complexity, length and periodicity established by the company’s secure password policy and be unique and never shared. It is not recommended to write it in places that are accessible, such as notes pasted on the screen or under the keyboard. One possibility is to use a password manager.
Documents that are no longer useful should be safely disposed of. The information they contain can be critical or valuable for another company or person. For this reason, they must be destroyed or deleted so that this information cannot be recovered. The same goes for hard drives, phones or USB sticks that have been damaged or are no longer helpful.
Having all the devices in sight, any carelessness, loss, or theft could trigger a security incident. If you’re constantly on the go, store your devices when you’re not using them and encrypt the information they contain.
These are some guidelines you must follow to keep your workplace safe. All of them, accompanied by a workplace policy, will raise your company’s cybersecurity level.
In this article, we will guide you on how to use WhatsApp's multi-device feature. Many… Read More
People suffering from hypothyroidism have a slower metabolism, and even if they have a low… Read More
In a world where data security and control of IT resources are paramount, private clouds… Read More
Today, businesses constantly have to adapt to new market conditions and requirements. This is especially… Read More
Did you know that external positioning factors, those that you cannot control directly on your… Read More
WhatsApp is an essential communication tool but can be vulnerable to unauthorized access. Learn how… Read More