botserver/templates/it/helpdesk.gbai/helpdesk.gbkb/security-tips.md

145 lines
4.1 KiB
Markdown
Raw Normal View History

# IT Security Tips and Best Practices
## Password Security
### Creating Strong Passwords
- Use at least 12 characters
- Mix uppercase, lowercase, numbers, and symbols
- Avoid personal information like birthdays or names
- Don't use common words or patterns
- Consider using a passphrase: "Coffee$Morning2024!"
### Password Management
- Never share your password with anyone
- Don't write passwords on sticky notes
- Use the company-approved password manager
- Change passwords immediately if you suspect compromise
- Use unique passwords for each account
## Phishing Awareness
### How to Spot Phishing Emails
- Check the sender's email address carefully
- Look for spelling and grammar mistakes
- Be suspicious of urgent requests
- Hover over links before clicking to see the real URL
- Beware of unexpected attachments
### Common Phishing Red Flags
- "Your account will be suspended"
- "Click here immediately"
- "Verify your password"
- "You've won a prize"
- Requests for sensitive information
### What to Do If You Suspect Phishing
1. Do NOT click any links
2. Do NOT open any attachments
3. Do NOT reply to the email
4. Report the email to security@company.com
5. Delete the email from your inbox
## Device Security
### Laptop Security
- Lock your screen when away: Windows+L
- Never leave your laptop unattended in public
- Use the laptop lock cable when in shared spaces
- Enable full disk encryption
- Keep your operating system updated
### Mobile Device Security
- Use a strong PIN or biometric lock
- Enable remote wipe capability
- Don't connect to unknown Wi-Fi networks
- Keep apps updated
- Only install apps from official stores
## Data Protection
### Handling Sensitive Data
- Only access data you need for your job
- Don't copy sensitive data to personal devices
- Use company-approved cloud storage only
- Encrypt files before sending externally
- Shred physical documents with sensitive info
### Clean Desk Policy
- Lock your computer when leaving
- Put away sensitive documents
- Don't leave printouts on the printer
- Secure notebooks with confidential notes
- Clear whiteboards after meetings
## Remote Work Security
### Working from Home
- Use the company VPN for all work
- Secure your home Wi-Fi with WPA3
- Don't let family members use work devices
- Position your screen away from windows
- Use a privacy screen in public places
### Public Wi-Fi Dangers
- Avoid public Wi-Fi for work tasks
- Always use VPN if you must connect
- Don't access banking or sensitive sites
- Verify the network name with staff
- Disable auto-connect to open networks
## Social Engineering
### Types of Social Engineering
- **Phishing**: Fake emails requesting info
- **Vishing**: Phone calls impersonating IT/execs
- **Tailgating**: Following someone into secure areas
- **Pretexting**: Fabricated scenarios to gain trust
### How to Protect Yourself
- Verify unexpected requests via a known channel
- Don't give info to unverified callers
- Challenge unknown people in secure areas
- Report suspicious behavior immediately
## Incident Reporting
### What to Report
- Suspicious emails or calls
- Lost or stolen devices
- Unauthorized access attempts
- Malware or virus warnings
- Any security concerns
### How to Report
- Email: security@company.com
- Phone: ext. 4357 (HELP)
- Create a ticket with category "security"
- For urgent issues, call immediately
## Security Updates
### Why Updates Matter
- Fixes known security vulnerabilities
- Protects against new threats
- Ensures compliance with policies
- Improves system stability
### Update Schedule
- Windows updates: Weekly on Wednesday nights
- Application updates: As released
- Antivirus: Daily automatic updates
- Browser updates: Enable auto-update
## Frequently Asked Questions
**Q: Can I use my personal email for work?**
A: No, always use your company email for work communications.
**Q: Is it safe to use USB drives?**
A: Only use company-approved encrypted USB drives.
**Q: Can I install software on my work computer?**
A: No, contact IT to request software installation.
**Q: What if I accidentally clicked a suspicious link?**
A: Disconnect from the network and contact IT security immediately.