SlideShare a Scribd company logo
IT Security DOs and DON’Ts
From your helpful IT Team
1. Don’t be tricked into giving
away confidential information
• Don’t respond to emails or phone calls requesting
  confidential company information
• Always keep in mind that bad guys are successful
  because they are convincing.
• Recent news stories out of Canada reported scammers
  were tricking people into giving away information with
  fake tech support calls claiming to help.
• Keep on guard and report any
  suspicious activity to IT.

Video tip 1: Don’t get tricked
2. Don’t use an unprotected
computer
• When you access sensitive information from a non-secure
  computer you put the information you’re viewing at risk.
• Malicious software exists that allows people to easily
  snoop on what you’re doing online when accessing
  unprotected sites.
• If you’re unsure if the computer you’re using
  is safe, don’t use it to access corporate or
  sensitive data.
                            Keep your personal computer safe with
                                   Sophos Virus Removal Tool or
                           Sophos Anti-virus for Mac Home Edition



Video tip 2: Stay secure
3. Don’t leave sensitive info lying
around the office
• Don’t leave printouts containing private information on your
  desk. It’s easy for a visitor to glance at your desk and see
  sensitive documents.
• Keep your desk tidy and documents locked away or
  shredded when no longer needed.
• It makes the office look more organized, and reduces the
  risk of information leaks.




Video tip 3: Put things away
4. Lock your computer and
mobile phone when not in use
• Always lock your computer and mobile phone when you’re
  not using them. You work on important things, and we want
  to make sure they stay safe and secure.
• Locking these devices keeps both your personal
  information and the company’s data and contacts safe
  from prying eyes.




Video tip 4: Lock it
5. Stay alert and report suspicious
activity
• Sometimes suspicious activity isn’t as obvious as we think.
• A recent news story reported that a supermarket manager,
  who was randomly befriended by a mysterious woman on
  Facebook, ended up on a “date” with two men who
  overpowered him and robbed his store.
• Be cautious of people you don't know
  asking for things, especially online.
• Always report any suspicious activity
  to IT. If something goes wrong, the
  faster we know about it, the faster we
  can deal with it.
Video tip 5: Stay alert
6. Password-protect sensitive
files and devices
• Always password-protect sensitive files on your computer,
  USB flash drive, smartphone, laptop, etc.
• Losing a device can happen to anyone. But by protecting
  your device with strong passwords, you make it difficult for
  someone to break in and steal data.




Video tip 6: Protect it
7. Always use hard-to-guess
passwords
• Many people use obvious passwords like “password,” “cat,”
  or obvious character sequences on the qwerty keyboard
  like “asdfg.”
• Create complex passwords by including different letter
  cases, numbers, and even punctuation.
• Try to use different passwords for
  different websites and computers.
  So if one gets hacked,
  your other accounts aren’t
  compromised.

Video tip 7: Use strong passwords
8. Be cautious of suspicious
emails and links
• Hackers try to steal email lists from companies, which
  happened recently to Toshiba. Company email addresses
  are valuable to attackers, allowing them to create fake
  emails from "real people.“
• Always delete suspicious emails from people you don't
  know. And never click on the links.
• Opening these emails or clicking on
  links in them can compromise your
  computer without you ever knowing it.

Video tip 8: Think first
9. Don’t plug in personal devices
without the OK from IT
• Don’t plug in personal devices such as USBs, MP3 players
  and smartphones without permission from IT.
• Even a brand new iPod or USB flash drive could be
  infected with a nasty virus.
• These devices can be compromised
  with code waiting to launch
  as soon as you plug them into
  a computer.
• Talk to IT about your devices and
                                       Protect your personal Android device with
  let them make the call.                   Sophos Mobile Security Free Edition

Video tip 9: Don't plug it in
10. Don’t install unauthorized
programs on your work computer
• Malicious applications often pose as legitimate programs
  like games, tools or even antivirus software.
• They aim to fool you into infecting your computer
  or network.
• If you like an application and think it will be useful,
  contact us and we’ll look into it for you.




Video tip 10: Don’t install it
Get more
IT Security DOs and DON’Ts
View the online handbook at www.sophos.com/securitytips

Get quick tips to create strong passwords



Connect with us:
facebook.com/securitybysophos
twitter.com/Sophos_News
Sophos on Google+
linkedin.com/company/sophos

More Related Content

PPTX
IT Security DOs and DON'Ts
PPT
New Hire Information Security Awareness
PPTX
IT Security DOs and DON'Ts
PPTX
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
PPTX
Digital safety
PDF
Employee Security Awareness Program
PPTX
Cybersecurity Awareness Training
PDF
Cybersecurity Awareness Training Presentation v2024.03
IT Security DOs and DON'Ts
New Hire Information Security Awareness
IT Security DOs and DON'Ts
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Digital safety
Employee Security Awareness Program
Cybersecurity Awareness Training
Cybersecurity Awareness Training Presentation v2024.03

What's hot (20)

PDF
End-User Security Awareness
PPTX
Basic Security Training for End Users
PPTX
It security and awareness training 5 10-2018
PPTX
Information security awareness - 101
PDF
Cybersecurity: Dos and Dont's
PDF
CyberSecurity Awareness Training Presentation v2024.09
PDF
Microsoft Sentinel- a cloud native SIEM & SOAR.pdf
PPTX
Hyphenet Security Awareness Training
PDF
14 tips to increase cybersecurity awareness
PPTX
Securityawareness
PPTX
IOS security
PPTX
Cybersecurity Awareness Training for Employees.pptx
PDF
Security Awareness Training
PDF
Presentation cisco iron port email & web security
PDF
Information Security Awareness for everyone
PDF
Raising information security awareness
PPTX
Information Security Awareness Training Open
PPT
Information security Lecture slides .ppt
PDF
Cybersecurity Awareness Infographics
PPTX
Cyber Security Awareness Session for Executives and Non-IT professionals
End-User Security Awareness
Basic Security Training for End Users
It security and awareness training 5 10-2018
Information security awareness - 101
Cybersecurity: Dos and Dont's
CyberSecurity Awareness Training Presentation v2024.09
Microsoft Sentinel- a cloud native SIEM & SOAR.pdf
Hyphenet Security Awareness Training
14 tips to increase cybersecurity awareness
Securityawareness
IOS security
Cybersecurity Awareness Training for Employees.pptx
Security Awareness Training
Presentation cisco iron port email & web security
Information Security Awareness for everyone
Raising information security awareness
Information Security Awareness Training Open
Information security Lecture slides .ppt
Cybersecurity Awareness Infographics
Cyber Security Awareness Session for Executives and Non-IT professionals
Ad

Similar to IT Security DOs and DONTs (20)

PPT
Cyber Security Awareness Training by Win-Pro
PPT
Securitytips
PPTX
ICT and end user security awareness slides
PPT
Basic Digital Security
PDF
Building a culture of security
PPTX
Internet
PDF
Security-Awareness for work form home user
PDF
10 most important cyber security tips for your users
PPTX
Online reputation
PPTX
Online reputation
PPTX
Edu352 week1discussion2technologysafetyoct2011crs
PPTX
AHADCYBER SAFETY AHADCYBER SAFETYAHADCYBER SAFETYAHADCYBER SAFETYAHADCYBER SA...
PPT
informtion_security_standards_and_methods.ppt
PPTX
Cybersecurity awareness session.pptx
PDF
Information Security Awareness Training
PPTX
Cyber pledge infoMagnum
PPT
it-security.ppt
PDF
089 generictoptipsposter
PPTX
Cyber Security
PPT
Cyber Security and Cyber Awareness
Cyber Security Awareness Training by Win-Pro
Securitytips
ICT and end user security awareness slides
Basic Digital Security
Building a culture of security
Internet
Security-Awareness for work form home user
10 most important cyber security tips for your users
Online reputation
Online reputation
Edu352 week1discussion2technologysafetyoct2011crs
AHADCYBER SAFETY AHADCYBER SAFETYAHADCYBER SAFETYAHADCYBER SAFETYAHADCYBER SA...
informtion_security_standards_and_methods.ppt
Cybersecurity awareness session.pptx
Information Security Awareness Training
Cyber pledge infoMagnum
it-security.ppt
089 generictoptipsposter
Cyber Security
Cyber Security and Cyber Awareness
Ad

Recently uploaded (20)

PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Modernizing your data center with Dell and AMD
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Encapsulation theory and applications.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPT
Teaching material agriculture food technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Machine learning based COVID-19 study performance prediction
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Cloud computing and distributed systems.
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Modernizing your data center with Dell and AMD
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Encapsulation theory and applications.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Empathic Computing: Creating Shared Understanding
Advanced methodologies resolving dimensionality complications for autism neur...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Understanding_Digital_Forensics_Presentation.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Chapter 3 Spatial Domain Image Processing.pdf
Teaching material agriculture food technology
Unlocking AI with Model Context Protocol (MCP)
Review of recent advances in non-invasive hemoglobin estimation
Machine learning based COVID-19 study performance prediction
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Cloud computing and distributed systems.

IT Security DOs and DONTs

  • 1. IT Security DOs and DON’Ts From your helpful IT Team
  • 2. 1. Don’t be tricked into giving away confidential information • Don’t respond to emails or phone calls requesting confidential company information • Always keep in mind that bad guys are successful because they are convincing. • Recent news stories out of Canada reported scammers were tricking people into giving away information with fake tech support calls claiming to help. • Keep on guard and report any suspicious activity to IT. Video tip 1: Don’t get tricked
  • 3. 2. Don’t use an unprotected computer • When you access sensitive information from a non-secure computer you put the information you’re viewing at risk. • Malicious software exists that allows people to easily snoop on what you’re doing online when accessing unprotected sites. • If you’re unsure if the computer you’re using is safe, don’t use it to access corporate or sensitive data. Keep your personal computer safe with Sophos Virus Removal Tool or Sophos Anti-virus for Mac Home Edition Video tip 2: Stay secure
  • 4. 3. Don’t leave sensitive info lying around the office • Don’t leave printouts containing private information on your desk. It’s easy for a visitor to glance at your desk and see sensitive documents. • Keep your desk tidy and documents locked away or shredded when no longer needed. • It makes the office look more organized, and reduces the risk of information leaks. Video tip 3: Put things away
  • 5. 4. Lock your computer and mobile phone when not in use • Always lock your computer and mobile phone when you’re not using them. You work on important things, and we want to make sure they stay safe and secure. • Locking these devices keeps both your personal information and the company’s data and contacts safe from prying eyes. Video tip 4: Lock it
  • 6. 5. Stay alert and report suspicious activity • Sometimes suspicious activity isn’t as obvious as we think. • A recent news story reported that a supermarket manager, who was randomly befriended by a mysterious woman on Facebook, ended up on a “date” with two men who overpowered him and robbed his store. • Be cautious of people you don't know asking for things, especially online. • Always report any suspicious activity to IT. If something goes wrong, the faster we know about it, the faster we can deal with it. Video tip 5: Stay alert
  • 7. 6. Password-protect sensitive files and devices • Always password-protect sensitive files on your computer, USB flash drive, smartphone, laptop, etc. • Losing a device can happen to anyone. But by protecting your device with strong passwords, you make it difficult for someone to break in and steal data. Video tip 6: Protect it
  • 8. 7. Always use hard-to-guess passwords • Many people use obvious passwords like “password,” “cat,” or obvious character sequences on the qwerty keyboard like “asdfg.” • Create complex passwords by including different letter cases, numbers, and even punctuation. • Try to use different passwords for different websites and computers. So if one gets hacked, your other accounts aren’t compromised. Video tip 7: Use strong passwords
  • 9. 8. Be cautious of suspicious emails and links • Hackers try to steal email lists from companies, which happened recently to Toshiba. Company email addresses are valuable to attackers, allowing them to create fake emails from "real people.“ • Always delete suspicious emails from people you don't know. And never click on the links. • Opening these emails or clicking on links in them can compromise your computer without you ever knowing it. Video tip 8: Think first
  • 10. 9. Don’t plug in personal devices without the OK from IT • Don’t plug in personal devices such as USBs, MP3 players and smartphones without permission from IT. • Even a brand new iPod or USB flash drive could be infected with a nasty virus. • These devices can be compromised with code waiting to launch as soon as you plug them into a computer. • Talk to IT about your devices and Protect your personal Android device with let them make the call. Sophos Mobile Security Free Edition Video tip 9: Don't plug it in
  • 11. 10. Don’t install unauthorized programs on your work computer • Malicious applications often pose as legitimate programs like games, tools or even antivirus software. • They aim to fool you into infecting your computer or network. • If you like an application and think it will be useful, contact us and we’ll look into it for you. Video tip 10: Don’t install it
  • 12. Get more IT Security DOs and DON’Ts View the online handbook at www.sophos.com/securitytips Get quick tips to create strong passwords Connect with us: facebook.com/securitybysophos twitter.com/Sophos_News Sophos on Google+ linkedin.com/company/sophos