SlideShare une entreprise Scribd logo
1  sur  8
1
Information SecurityInformation Security
Toolbox Talk
This document is made available on the condition that it is used solely to assist you in the preparation of your own safety training
material. Use for resale or similar commercial activity to third parties is strictly forbidden. This document was produced for our
internal use only, and therefore it may not be suitable or sufficient for your purposes. No guarantees whatsoever can be given as to
their legal compliance or comprehensiveness, and you are responsible for obtaining professional advice and verification as to the
correctness or suitability of any training or documents which you produce which are based wholly or in part on these. No liabilities
whatsoever are accepted. It has been made available purely for information to others who may find them useful when formulating
their own safety training and procedures.
© A. Groves & Océ (UK) Ltd
2
Rule 1Rule 1
 Always keep to our Policies
 Keep to our information security policies.
 Obey the customer’s information security rules.
 Respect the law and privacy legislation.
 Use approved hardware and licensed software only.
3
Rule 2Rule 2
 Handle information with care
 Keep your desk / work area clear.
 Keep confidential information
protected (under lock & key) during
breaks and when going home.
 Remove printed matter from printers,
copiers and faxes immediately
 Dispose of documents and
digital media securely
4
Rule 3Rule 3
 Keep your passwords and PINs secret
 Use quality passwords and PINs, and change them
regularly
 Keep your password and PINs secure
and don’t share them with anyone.
 Use password-protected screensavers.
 Log off and switch the PC off before
going home.
5
Rule 4Rule 4
 Know whom you’re dealing with
 Exercise caution in conversations and professional
interactions.
 Ensure that you know who you are communicating with on
the phone, the internet or via e-mail.
 Use your best professional judgement when getting or
giving information.
Not everything is true.
6
Rule 5Rule 5
 Use e-mail and the Internet with care
 Use e-mail and the Internet primarily
for business purposes.
 Don’t open any strange e-mails or
attachments and be careful when
downloading information.
 Don’t send strictly confidential
information via e-mail unless it is encrypted.
 Don’t access, download, store and send illegal or offensive
materials.
7
Rule 6Rule 6
 Pay attention to physical security and
mobile equipment
 Escort guests and make sure they
wear their visitor badges.
 Question strangers about their
presence in your department.
 Protect your mobile equipment with a
password or PIN and don’t leave it
unattended.
 Avoid the use of non-company equipment on the company
network.
8
Rule 7Rule 7
 Report incidents like viruses, thefts and
losses.
 Report suspicious activity at your workstation / area
immediately.
 Report all security incidents like thefts, losses, etc. to your
manager and security co-ordinator.

Contenu connexe

Tendances

20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network SecurityPatten John
 
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" InfographicDavid McHale
 
10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out10 Tips to Keep Criminals Out
10 Tips to Keep Criminals OutNeil Kemp
 
Pure retail training non animation
Pure retail training non animationPure retail training non animation
Pure retail training non animationkatelyn-fogarty
 
Pure retail training presentation v2
Pure retail training presentation v2Pure retail training presentation v2
Pure retail training presentation v2kaspersky-lab
 
Pure retail training presentation
Pure retail training presentationPure retail training presentation
Pure retail training presentationkatelyn-fogarty
 
Secure your public WiFi
Secure your public WiFiSecure your public WiFi
Secure your public WiFiMartin Keg
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe onlineShirley Diniz
 
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08Michael Boman
 
10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must FollowQuick Heal Technologies Ltd.
 
Network basic security
Network basic  securityNetwork basic  security
Network basic securityMohamed Radji
 
ReputationDefender - Your Privacy Demands Protection
ReputationDefender - Your Privacy Demands ProtectionReputationDefender - Your Privacy Demands Protection
ReputationDefender - Your Privacy Demands ProtectionReputationDefender
 
Austen Security Centre Presentation
Austen Security Centre PresentationAusten Security Centre Presentation
Austen Security Centre PresentationFrancois Brill
 

Tendances (19)

20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
 
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
 
10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out
 
Pure retail training non animation
Pure retail training non animationPure retail training non animation
Pure retail training non animation
 
Pure retail training presentation v2
Pure retail training presentation v2Pure retail training presentation v2
Pure retail training presentation v2
 
Pure retail training presentation
Pure retail training presentationPure retail training presentation
Pure retail training presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Van 231 safe
 Van 231 safe Van 231 safe
Van 231 safe
 
Secure your public WiFi
Secure your public WiFiSecure your public WiFi
Secure your public WiFi
 
Cyber security and crime
Cyber security and crimeCyber security and crime
Cyber security and crime
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
 
10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
 
HMA
HMAHMA
HMA
 
ReputationDefender - Your Privacy Demands Protection
ReputationDefender - Your Privacy Demands ProtectionReputationDefender - Your Privacy Demands Protection
ReputationDefender - Your Privacy Demands Protection
 
6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi
 
Austen Security Centre Presentation
Austen Security Centre PresentationAusten Security Centre Presentation
Austen Security Centre Presentation
 
How much should you reveal on social media
How much should you reveal on social mediaHow much should you reveal on social media
How much should you reveal on social media
 

En vedette

Accident investigation presentation by stuart would
Accident investigation presentation by stuart wouldAccident investigation presentation by stuart would
Accident investigation presentation by stuart wouldMuthurv Venkatachalam
 
Corporate manslaughter and_corporate_homicide_act_2007
Corporate manslaughter and_corporate_homicide_act_2007Corporate manslaughter and_corporate_homicide_act_2007
Corporate manslaughter and_corporate_homicide_act_2007Muthurv Venkatachalam
 
Construction independant tied_scaffold
Construction independant tied_scaffoldConstruction independant tied_scaffold
Construction independant tied_scaffoldMuthurv Venkatachalam
 
Behavioural safety program_by_simon_holmes
Behavioural safety program_by_simon_holmesBehavioural safety program_by_simon_holmes
Behavioural safety program_by_simon_holmesMuthurv Venkatachalam
 
Aa asbestos training presentation version for h&s website
Aa asbestos training presentation version for h&s websiteAa asbestos training presentation version for h&s website
Aa asbestos training presentation version for h&s websiteMuthurv Venkatachalam
 
Basic principles of electrical safety
Basic principles of electrical safetyBasic principles of electrical safety
Basic principles of electrical safetyMuthurv Venkatachalam
 
Ms pipe internal cleaning (2)
Ms pipe internal cleaning (2)Ms pipe internal cleaning (2)
Ms pipe internal cleaning (2)Iqbal Mohammad
 

En vedette (20)

Altered and job made tools bst
Altered and job made tools   bstAltered and job made tools   bst
Altered and job made tools bst
 
Btfacultyorientation
BtfacultyorientationBtfacultyorientation
Btfacultyorientation
 
15 electro staticdischarge1g
15 electro staticdischarge1g15 electro staticdischarge1g
15 electro staticdischarge1g
 
16 info securitytoolbox1g (1)
16 info securitytoolbox1g (1)16 info securitytoolbox1g (1)
16 info securitytoolbox1g (1)
 
15 electro staticdischarge1g
15 electro staticdischarge1g15 electro staticdischarge1g
15 electro staticdischarge1g
 
13 lone workingtoolbox1g
13 lone workingtoolbox1g13 lone workingtoolbox1g
13 lone workingtoolbox1g
 
Backcare5 g
Backcare5 gBackcare5 g
Backcare5 g
 
Accident investigation presentation by stuart would
Accident investigation presentation by stuart wouldAccident investigation presentation by stuart would
Accident investigation presentation by stuart would
 
Welcome heath safety
Welcome heath safetyWelcome heath safety
Welcome heath safety
 
Corporate manslaughter and_corporate_homicide_act_2007
Corporate manslaughter and_corporate_homicide_act_2007Corporate manslaughter and_corporate_homicide_act_2007
Corporate manslaughter and_corporate_homicide_act_2007
 
Construction independant tied_scaffold
Construction independant tied_scaffoldConstruction independant tied_scaffold
Construction independant tied_scaffold
 
Basics hf +_ergonomics
Basics hf +_ergonomicsBasics hf +_ergonomics
Basics hf +_ergonomics
 
Construction basics
Construction basicsConstruction basics
Construction basics
 
Case law slideshow
Case law slideshowCase law slideshow
Case law slideshow
 
Behavioural safety program_by_simon_holmes
Behavioural safety program_by_simon_holmesBehavioural safety program_by_simon_holmes
Behavioural safety program_by_simon_holmes
 
Aa asbestos training presentation version for h&s website
Aa asbestos training presentation version for h&s websiteAa asbestos training presentation version for h&s website
Aa asbestos training presentation version for h&s website
 
Safe operating of forklift
Safe operating of forkliftSafe operating of forklift
Safe operating of forklift
 
Construction site induction
Construction site inductionConstruction site induction
Construction site induction
 
Basic principles of electrical safety
Basic principles of electrical safetyBasic principles of electrical safety
Basic principles of electrical safety
 
Ms pipe internal cleaning (2)
Ms pipe internal cleaning (2)Ms pipe internal cleaning (2)
Ms pipe internal cleaning (2)
 

Similaire à 16 info securitytoolbox1g (1)

Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online NetiquetteZoro18
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection ProgramsMichael Annis
 
Personal cyber security tips remote work
Personal cyber security tips remote workPersonal cyber security tips remote work
Personal cyber security tips remote workChinmayee Behera
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information SecurityKen Holmes
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Work from home policy
Work from home policyWork from home policy
Work from home policyHanees UK
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxvasidharta
 
Module4 policies&procedures-b
Module4   policies&procedures-bModule4   policies&procedures-b
Module4 policies&procedures-bBbAOC
 
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...Insurance Technologies Corporation (ITC)
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteGab Billones
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Security and Wearables: Success starts with security
Security and Wearables: Success starts with securitySecurity and Wearables: Success starts with security
Security and Wearables: Success starts with securityStephen Cobb
 
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...Jack Pringle
 

Similaire à 16 info securitytoolbox1g (1) (20)

Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online Netiquette
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Poicy 121
Poicy 121Poicy 121
Poicy 121
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection Programs
 
Personal cyber security tips remote work
Personal cyber security tips remote workPersonal cyber security tips remote work
Personal cyber security tips remote work
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
it-security.ppt
it-security.pptit-security.ppt
it-security.ppt
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Work from home policy
Work from home policyWork from home policy
Work from home policy
 
Online Safety.pptx
Online Safety.pptxOnline Safety.pptx
Online Safety.pptx
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
 
Module4 policies&procedures-b
Module4   policies&procedures-bModule4   policies&procedures-b
Module4 policies&procedures-b
 
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Security and Wearables: Success starts with security
Security and Wearables: Success starts with securitySecurity and Wearables: Success starts with security
Security and Wearables: Success starts with security
 
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
 

Plus de Muthurv Venkatachalam (11)

heat stress
heat stressheat stress
heat stress
 
Civil law and criminal law
Civil law and criminal lawCivil law and criminal law
Civil law and criminal law
 
Campaign posters
Campaign postersCampaign posters
Campaign posters
 
Welcome heath safety
Welcome heath safetyWelcome heath safety
Welcome heath safety
 
Powered industrial trucks osha std
Powered industrial trucks osha stdPowered industrial trucks osha std
Powered industrial trucks osha std
 
Forllift safety
Forllift safetyForllift safety
Forllift safety
 
Fork lifts drive
Fork lifts driveFork lifts drive
Fork lifts drive
 
Working safely with work equipment by donald a mackay
Working safely with work equipment by donald a mackayWorking safely with work equipment by donald a mackay
Working safely with work equipment by donald a mackay
 
03 display screenequiptoolbox1g
03 display screenequiptoolbox1g03 display screenequiptoolbox1g
03 display screenequiptoolbox1g
 
13 lone workingtoolbox1g
13 lone workingtoolbox1g13 lone workingtoolbox1g
13 lone workingtoolbox1g
 
Breast cancer
Breast cancerBreast cancer
Breast cancer
 

Dernier

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 

Dernier (20)

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 

16 info securitytoolbox1g (1)

  • 1. 1 Information SecurityInformation Security Toolbox Talk This document is made available on the condition that it is used solely to assist you in the preparation of your own safety training material. Use for resale or similar commercial activity to third parties is strictly forbidden. This document was produced for our internal use only, and therefore it may not be suitable or sufficient for your purposes. No guarantees whatsoever can be given as to their legal compliance or comprehensiveness, and you are responsible for obtaining professional advice and verification as to the correctness or suitability of any training or documents which you produce which are based wholly or in part on these. No liabilities whatsoever are accepted. It has been made available purely for information to others who may find them useful when formulating their own safety training and procedures. © A. Groves & Océ (UK) Ltd
  • 2. 2 Rule 1Rule 1  Always keep to our Policies  Keep to our information security policies.  Obey the customer’s information security rules.  Respect the law and privacy legislation.  Use approved hardware and licensed software only.
  • 3. 3 Rule 2Rule 2  Handle information with care  Keep your desk / work area clear.  Keep confidential information protected (under lock & key) during breaks and when going home.  Remove printed matter from printers, copiers and faxes immediately  Dispose of documents and digital media securely
  • 4. 4 Rule 3Rule 3  Keep your passwords and PINs secret  Use quality passwords and PINs, and change them regularly  Keep your password and PINs secure and don’t share them with anyone.  Use password-protected screensavers.  Log off and switch the PC off before going home.
  • 5. 5 Rule 4Rule 4  Know whom you’re dealing with  Exercise caution in conversations and professional interactions.  Ensure that you know who you are communicating with on the phone, the internet or via e-mail.  Use your best professional judgement when getting or giving information. Not everything is true.
  • 6. 6 Rule 5Rule 5  Use e-mail and the Internet with care  Use e-mail and the Internet primarily for business purposes.  Don’t open any strange e-mails or attachments and be careful when downloading information.  Don’t send strictly confidential information via e-mail unless it is encrypted.  Don’t access, download, store and send illegal or offensive materials.
  • 7. 7 Rule 6Rule 6  Pay attention to physical security and mobile equipment  Escort guests and make sure they wear their visitor badges.  Question strangers about their presence in your department.  Protect your mobile equipment with a password or PIN and don’t leave it unattended.  Avoid the use of non-company equipment on the company network.
  • 8. 8 Rule 7Rule 7  Report incidents like viruses, thefts and losses.  Report suspicious activity at your workstation / area immediately.  Report all security incidents like thefts, losses, etc. to your manager and security co-ordinator.