145 lines
4.1 KiB
Markdown
145 lines
4.1 KiB
Markdown
|
|
# IT Security Tips and Best Practices
|
||
|
|
|
||
|
|
## Password Security
|
||
|
|
|
||
|
|
### Creating Strong Passwords
|
||
|
|
- Use at least 12 characters
|
||
|
|
- Mix uppercase, lowercase, numbers, and symbols
|
||
|
|
- Avoid personal information like birthdays or names
|
||
|
|
- Don't use common words or patterns
|
||
|
|
- Consider using a passphrase: "Coffee$Morning2024!"
|
||
|
|
|
||
|
|
### Password Management
|
||
|
|
- Never share your password with anyone
|
||
|
|
- Don't write passwords on sticky notes
|
||
|
|
- Use the company-approved password manager
|
||
|
|
- Change passwords immediately if you suspect compromise
|
||
|
|
- Use unique passwords for each account
|
||
|
|
|
||
|
|
## Phishing Awareness
|
||
|
|
|
||
|
|
### How to Spot Phishing Emails
|
||
|
|
- Check the sender's email address carefully
|
||
|
|
- Look for spelling and grammar mistakes
|
||
|
|
- Be suspicious of urgent requests
|
||
|
|
- Hover over links before clicking to see the real URL
|
||
|
|
- Beware of unexpected attachments
|
||
|
|
|
||
|
|
### Common Phishing Red Flags
|
||
|
|
- "Your account will be suspended"
|
||
|
|
- "Click here immediately"
|
||
|
|
- "Verify your password"
|
||
|
|
- "You've won a prize"
|
||
|
|
- Requests for sensitive information
|
||
|
|
|
||
|
|
### What to Do If You Suspect Phishing
|
||
|
|
1. Do NOT click any links
|
||
|
|
2. Do NOT open any attachments
|
||
|
|
3. Do NOT reply to the email
|
||
|
|
4. Report the email to security@company.com
|
||
|
|
5. Delete the email from your inbox
|
||
|
|
|
||
|
|
## Device Security
|
||
|
|
|
||
|
|
### Laptop Security
|
||
|
|
- Lock your screen when away: Windows+L
|
||
|
|
- Never leave your laptop unattended in public
|
||
|
|
- Use the laptop lock cable when in shared spaces
|
||
|
|
- Enable full disk encryption
|
||
|
|
- Keep your operating system updated
|
||
|
|
|
||
|
|
### Mobile Device Security
|
||
|
|
- Use a strong PIN or biometric lock
|
||
|
|
- Enable remote wipe capability
|
||
|
|
- Don't connect to unknown Wi-Fi networks
|
||
|
|
- Keep apps updated
|
||
|
|
- Only install apps from official stores
|
||
|
|
|
||
|
|
## Data Protection
|
||
|
|
|
||
|
|
### Handling Sensitive Data
|
||
|
|
- Only access data you need for your job
|
||
|
|
- Don't copy sensitive data to personal devices
|
||
|
|
- Use company-approved cloud storage only
|
||
|
|
- Encrypt files before sending externally
|
||
|
|
- Shred physical documents with sensitive info
|
||
|
|
|
||
|
|
### Clean Desk Policy
|
||
|
|
- Lock your computer when leaving
|
||
|
|
- Put away sensitive documents
|
||
|
|
- Don't leave printouts on the printer
|
||
|
|
- Secure notebooks with confidential notes
|
||
|
|
- Clear whiteboards after meetings
|
||
|
|
|
||
|
|
## Remote Work Security
|
||
|
|
|
||
|
|
### Working from Home
|
||
|
|
- Use the company VPN for all work
|
||
|
|
- Secure your home Wi-Fi with WPA3
|
||
|
|
- Don't let family members use work devices
|
||
|
|
- Position your screen away from windows
|
||
|
|
- Use a privacy screen in public places
|
||
|
|
|
||
|
|
### Public Wi-Fi Dangers
|
||
|
|
- Avoid public Wi-Fi for work tasks
|
||
|
|
- Always use VPN if you must connect
|
||
|
|
- Don't access banking or sensitive sites
|
||
|
|
- Verify the network name with staff
|
||
|
|
- Disable auto-connect to open networks
|
||
|
|
|
||
|
|
## Social Engineering
|
||
|
|
|
||
|
|
### Types of Social Engineering
|
||
|
|
- **Phishing**: Fake emails requesting info
|
||
|
|
- **Vishing**: Phone calls impersonating IT/execs
|
||
|
|
- **Tailgating**: Following someone into secure areas
|
||
|
|
- **Pretexting**: Fabricated scenarios to gain trust
|
||
|
|
|
||
|
|
### How to Protect Yourself
|
||
|
|
- Verify unexpected requests via a known channel
|
||
|
|
- Don't give info to unverified callers
|
||
|
|
- Challenge unknown people in secure areas
|
||
|
|
- Report suspicious behavior immediately
|
||
|
|
|
||
|
|
## Incident Reporting
|
||
|
|
|
||
|
|
### What to Report
|
||
|
|
- Suspicious emails or calls
|
||
|
|
- Lost or stolen devices
|
||
|
|
- Unauthorized access attempts
|
||
|
|
- Malware or virus warnings
|
||
|
|
- Any security concerns
|
||
|
|
|
||
|
|
### How to Report
|
||
|
|
- Email: security@company.com
|
||
|
|
- Phone: ext. 4357 (HELP)
|
||
|
|
- Create a ticket with category "security"
|
||
|
|
- For urgent issues, call immediately
|
||
|
|
|
||
|
|
## Security Updates
|
||
|
|
|
||
|
|
### Why Updates Matter
|
||
|
|
- Fixes known security vulnerabilities
|
||
|
|
- Protects against new threats
|
||
|
|
- Ensures compliance with policies
|
||
|
|
- Improves system stability
|
||
|
|
|
||
|
|
### Update Schedule
|
||
|
|
- Windows updates: Weekly on Wednesday nights
|
||
|
|
- Application updates: As released
|
||
|
|
- Antivirus: Daily automatic updates
|
||
|
|
- Browser updates: Enable auto-update
|
||
|
|
|
||
|
|
## Frequently Asked Questions
|
||
|
|
|
||
|
|
**Q: Can I use my personal email for work?**
|
||
|
|
A: No, always use your company email for work communications.
|
||
|
|
|
||
|
|
**Q: Is it safe to use USB drives?**
|
||
|
|
A: Only use company-approved encrypted USB drives.
|
||
|
|
|
||
|
|
**Q: Can I install software on my work computer?**
|
||
|
|
A: No, contact IT to request software installation.
|
||
|
|
|
||
|
|
**Q: What if I accidentally clicked a suspicious link?**
|
||
|
|
A: Disconnect from the network and contact IT security immediately.
|