When it comes to information security … what are the desired security practices?

Today, more than ever before, we need all employees to follow a number of basic guidelines to help ensure you don’t become a target for Phishing or Ransomware cybercriminals.

Strong, unique passwords: Create strong passwords by using passphrases or numbers, letters and symbols. Use a password manager to keep track of them all. If a cybercriminal figures out your personal password and it is the same as your work password, they may be able to access the company’s systems (and vice versa).

Watch your personal information: Do not share any personal information including credit card or banking information unless you know it is a confirmed, secure source. 

Lookout for red flags: Please ensure ALL staff are educated and directed to not click on anything without first checking for red flags. Cybercriminals take advantage of times of crisis to do their dirty work therefore the increased awareness looking out for phishing emails, smishing SMS/ texts and vishing calls as these are all on the rise. Before engaging with any communication, take caution and stop to ensure that it is from a secure, known party.

Use secure Wi-Fi: Trust only known and secure Wi-Fi connections when dealing with sensitive data like financial information. If using unknown/ unsecure Wi-Fi is really unavoidable, always make sure you have a VPN installed and turned on.

Ensure mobile security: Do not let your guard down because you’re on a mobile device. Be just as careful as you would on a desktop! Some ways to stay safe are to not respond to voicemails or calls asking for your financial information or to not trust text messages that attempt to get you to reveal your personal information.

As Consulting IT, our current and prospective clients push through the uncharted territory of a Coronavirus pandemic, we are seeing an increased number of targeted threats aiming to take advantage of our heightened health concerns. With more and more office employees working from home, it is never too soon to put measures and training in place that will help guide people on the correct procedures to follow.  

Our experience in crisis management, disaster recovery and time critical project work has proven to be the major point of difference as has our open and transparent communication.

To discuss successful partnerships and how engaging Consulting IT to maintain your IT infrastructure will:

  • Reduce your Staff downtime/ Expenditure/ Stress/ Exposure and Risk
  • Increase your Awareness/ Business Continuity Plans/ Backup and Disaster Recovery Systems/ Auditing and Compliance

Simply contact Corey Hill (chill@consultingit.com.au), National Sales and Marketing Manager.

#consultingit #breached #computersecurity #informationtechnology #emailsecurity #computersoftware #socialengineering #informationsecuritymanagement #scams #scammers #informationsecurityawareness #scamalert #cybercriminals #scam #phishingattacks #phishingattack #cybersecuritythreats #cybersecurity

By | 2020-04-02T16:02:50+10:00 April 2nd, 2020|Latest Articles|