I-BN Blog

Cybersecurity Guidelines from the Employee Perspective

Posted by I-BN on Dec 17, 2019 10:53:00 AM

Skeleton Key cloudCybersecurity includes the processes, procedures and technology used by companies and their employees to protect the computer networks, equipment and data from unauthorized access, use, modification, theft or destruction.  Protecting these “digital assets” has become an urgent priority for all companies to maintain the trust of their customers, compliance with contracts or laws and even its survival from an attack.

Many studies have shown the weak link in cybersecurity for a company is its current and or former employees.  The action or inaction of an employee does not have to be malicious in intent to put a company at risk.  Every employee must recognize their responsibility to be familiar with their company’s information security policy to protect themselves from any legal liability for incidents or breaches.  Many companies have specific guidelines or procedures for avoiding incidents and for reporting if an incident occurs or is suspected.

If your company has specific security guidelines be sure to stay current and follow those rules diligently.  If there is no written policy, then use the following basic procedures:

  • Make certain you have anti- virus/anti-malware software on your computer which scans your computer regularly and all files you receive via email or download from the internet.
  • Educate and protect yourself from phishing and fake communication
  • Use complex passwords and protect them!

If your company uses two factor authentication or single sign on solutions with complex passwords, these systems can help protect passwords.  Some companies also provide password management software when multiple passwords are required in their systems.  Most small businesses don’t have these tools in place and leaves password management to the employee.  As an employee you should try and follow best practices:

  • Maintain unique and long complex passwords for each system and change them regularly.
  • Use passwords that are not readily guessable like names or your children or spouse. Really long passwords made up of nursery rhymes, favorite song lyrics, memorable quotes are harder for algorithms or hackers to guess than your initials and birthday.
  • Do not store passwords on post it notes, little black books or other written form on or in your desk.
  • If you use a password manager to help you remember these passwords, only use them
    • On equipment you physically control and know are secure
    • When the passwords are stored locally and not on a cloud that can be hacked without your knowledge

As Phishing is one of the most common cyber-attack, we will devote entire blog to this subject for you and your employees.  If you need more information on any of these topics, contact one of our representatives at ibn@i-bn.net or call 678-627-0646 x230.

Topics: Cyber Security

New Call-to-action

Recent Posts

Posts by Topic

see all