update and code refactoring focused on: 1. Adding new documentation pages to the table of contents 2. Restructuring the bot templates documentation 3. Changing keyword syntax from underscore format to space format (e.g., `SET_BOT_MEMORY` → `SET BOT MEMORY`) 4. Updating compiler and keyword registration to support the new space-based syntax 5. Adding new keyword modules (social media, lead scoring, templates, etc.) Refactor BASIC keywords to use spaces instead of underscores Change keyword syntax from underscore format (SET_BOT_MEMORY) to more natural space-separated format (SET BOT MEMORY) throughout the codebase. Key changes: - Update Rhai custom syntax registration to use space tokens - Simplify compiler preprocessing (fewer replacements needed) - Update all template .bas files to use new syntax - Expand documentation with consolidated examples and new sections - Add new keyword modules: social_media, lead_scoring, send_template, core_functions, qrcode, sms, procedures, import_export, llm_macros, on_form_submit
4.1 KiB
4.1 KiB
IT Security Tips and Best Practices
Password Security
Creating Strong Passwords
- Use at least 12 characters
- Mix uppercase, lowercase, numbers, and symbols
- Avoid personal information like birthdays or names
- Don't use common words or patterns
- Consider using a passphrase: "Coffee$Morning2024!"
Password Management
- Never share your password with anyone
- Don't write passwords on sticky notes
- Use the company-approved password manager
- Change passwords immediately if you suspect compromise
- Use unique passwords for each account
Phishing Awareness
How to Spot Phishing Emails
- Check the sender's email address carefully
- Look for spelling and grammar mistakes
- Be suspicious of urgent requests
- Hover over links before clicking to see the real URL
- Beware of unexpected attachments
Common Phishing Red Flags
- "Your account will be suspended"
- "Click here immediately"
- "Verify your password"
- "You've won a prize"
- Requests for sensitive information
What to Do If You Suspect Phishing
- Do NOT click any links
- Do NOT open any attachments
- Do NOT reply to the email
- Report the email to security@company.com
- Delete the email from your inbox
Device Security
Laptop Security
- Lock your screen when away: Windows+L
- Never leave your laptop unattended in public
- Use the laptop lock cable when in shared spaces
- Enable full disk encryption
- Keep your operating system updated
Mobile Device Security
- Use a strong PIN or biometric lock
- Enable remote wipe capability
- Don't connect to unknown Wi-Fi networks
- Keep apps updated
- Only install apps from official stores
Data Protection
Handling Sensitive Data
- Only access data you need for your job
- Don't copy sensitive data to personal devices
- Use company-approved cloud storage only
- Encrypt files before sending externally
- Shred physical documents with sensitive info
Clean Desk Policy
- Lock your computer when leaving
- Put away sensitive documents
- Don't leave printouts on the printer
- Secure notebooks with confidential notes
- Clear whiteboards after meetings
Remote Work Security
Working from Home
- Use the company VPN for all work
- Secure your home Wi-Fi with WPA3
- Don't let family members use work devices
- Position your screen away from windows
- Use a privacy screen in public places
Public Wi-Fi Dangers
- Avoid public Wi-Fi for work tasks
- Always use VPN if you must connect
- Don't access banking or sensitive sites
- Verify the network name with staff
- Disable auto-connect to open networks
Social Engineering
Types of Social Engineering
- Phishing: Fake emails requesting info
- Vishing: Phone calls impersonating IT/execs
- Tailgating: Following someone into secure areas
- Pretexting: Fabricated scenarios to gain trust
How to Protect Yourself
- Verify unexpected requests via a known channel
- Don't give info to unverified callers
- Challenge unknown people in secure areas
- Report suspicious behavior immediately
Incident Reporting
What to Report
- Suspicious emails or calls
- Lost or stolen devices
- Unauthorized access attempts
- Malware or virus warnings
- Any security concerns
How to Report
- Email: security@company.com
- Phone: ext. 4357 (HELP)
- Create a ticket with category "security"
- For urgent issues, call immediately
Security Updates
Why Updates Matter
- Fixes known security vulnerabilities
- Protects against new threats
- Ensures compliance with policies
- Improves system stability
Update Schedule
- Windows updates: Weekly on Wednesday nights
- Application updates: As released
- Antivirus: Daily automatic updates
- Browser updates: Enable auto-update
Frequently Asked Questions
Q: Can I use my personal email for work? A: No, always use your company email for work communications.
Q: Is it safe to use USB drives? A: Only use company-approved encrypted USB drives.
Q: Can I install software on my work computer? A: No, contact IT to request software installation.
Q: What if I accidentally clicked a suspicious link? A: Disconnect from the network and contact IT security immediately.