Information Management Guidelines
- Create and follow a security policy.
- When in doubt, check it out! Check the leading anti-virus Websites for security alerts and as a general reference source.
- Assume security is someone else’s job.
- Think that you know everything there is to know about security. Technology changes quickly and new threats surface almost every day.
- Make sure that you know who you are speaking with and suggest legitimate ways outside callers can obtain the information they seek.
- Offer to return calls from unknown or suspicious callers after first checking to ensure the caller is legitimate. By offering to return the call, you can buy yourself time to check out the caller’s authenticity.
- Give unknown or unauthorized callers any information.
- Be intimidated by a caller who is a “name dropper” or claims to be a VIP.
- Pick up printouts and faxes promptly.
- Use a cover page when sending faxes.
- Label confidential information and handle it in a manner appropriate to its sensitivity.
- Lock up confidential information when you leave your work area.
- Dispose of confidential information in secure trash bins or by shredding.
- Leave confidential information on the printer or fax machine.
- Fax confidential information without speaking with the intended recipient first.
- Disclose secret or sensitive information to anyone not authorized to see it.
- Leave confidential information out on your desk when you’re gone, or in public areas at any time.
- Throw confidential information into open trash bins, at work or at home.
- Be aware of your surroundings and take precautions to protect confidential information.
- Use a Virtual Private Network (VPN) when working with confidential information.
- Use secure e-mail for confidential information.
- Ensure that all computers you use to access the Internet or your company’s network have anti-virus software running.
- Install security-related software patches as soon as they are available.
- Whenever possible, encrypt sensitive or secret information that is stored on your hard drive.
- Use cable locks to secure portable devices.
- Keep your laptop and mobile device with you at all times.
- Use a password-protected screen saver and logout of your company’s network at the end of the day.
- Display confidential information on your computer screen in public areas.
- Send confidential information in ordinary e-mail.
- Open e-mail attachments you weren’t expecting, even if they’re from someone you know.
- Set up your own wireless LAN or have a modem that can accept an incoming call while your computer is connected to the Internet or your company’s network.
- Put sensitive or secret information on a laptop and mobile device in plain text.
- Leave portable devices unsecured when you’re not there.
- Leave a laptop and mobile device unattended in a public place.
- Leave your computer logged into your company’s network and the display on when you’re gone.
- Use strong passwords on your accounts. Check the password guidelines.
- Use different passwords for each account
- Change your password regularly.
- Memorize your password.
- Keep your password secret.
- Use your name, your family’s names, your pet’s name, or a word in a dictionary as your password.
- Change your password in predictable ways.
- Write it down.
- Tell anyone your password, for any reason.