Tips of Security
Protecting private information
Information is the lifeblood of most, if not all, modern organisations, so protecting (this) information against unauthorised disclosure, modification or erasure is a basic requirement of management. Executives and staff in all organisations rely on the timeliness and accuracy of information in order to operate in the most efficient and effective manner. Increasingly, with advances in technology, there is the danger that this information may be unavailable or may be corrupted, either accidentally or deliberately. There are frequent reports of computer hacking (unauthorised access to computers), viruses and other disasters that can affect information such as fires, power failures or simple human error.
What Is Sensitive Information
Sensitive information can be many different kind of information, like:
* Name, address, phone number
* Date of birth
* Social Security Number (SSN)
* Credit card numbers
* Driver's license number (DL)
* Banking and financial information
* Medical information
* Employment/education information
* Patient, Student and Faculty records
* Grades
* Intellectual property (your creation)
* Proprietary information (unique data)
* Trade secrets (Coke)
* Passwords and access codes
Protecting Information In Your Office Area
A few basic steps to secure information in your office:
* Documents that include sensitive information need to be secured during printing, transmission, storage, and disposal.
* Don't leave paper documents containing sensitive information unattended. Credit card slips or paper checks should not be sent through intercampus mail.
* Be aware of the potential of others to overhear sensitive information. Don't discuss confidential information outside of the office.
* Verify identities of all visitors and escort them; verify identities of those requesting sensitive information.
* Lock your office, desks, and file drawers when unattended. Don't store keys in easily accessible areas.
Protecting Your Computer And Its Information
Simple steps to protect your computer and its information:
* Lock down PCs, laptops, PDAs, flat panel displays, printers, and other high-value items.
* Avoid allowing strangers or visitors to use your computer. Be aware of who can see your screen, especially when viewing sensitive information.
* Create strong passwords or pass-phrases. Use a combination of letters and numbers, and don't use dictionary words.
* Change your passwords when prompted by the system and never share them or write them down.
* Avoid discussing confidential information, accepting downloads or authorizing transactions or payments on IM, IRC or other chat programs.
* Privacy and confidentiality of email messages is not guaranteed. Information can be opened or read by someone other than the intended recipient. Exercise caution in using email to communicate confidential or sensitive information.
* Use only approved and necessary software applications.
* Make sure anti-virus software is installed on every computer you use.
* Make a backup copy (to a removable disk or flash drive) of your most important files and store the backup in a safe place, preferably in a different location. Backup your files at least on a weekly basis.
* Delete files you no longer need.
* Don't accept unsolicited downloads.
* Don't use P2P or file-sharing systems.
* Log off when not using your computer or at least use a screen saver that requires a password.
* Turn your computer off when leaving for the night.
* Follow all LTS and University IT policies and procedures regarding information technology security. Immediately advise an LTS supervisor of any suspicious activity on University computers.
Protecting Your Trash Can
Also be careful with your Trash can:
* Avoid careless disposal. Shred any discarded materials containing sensitive or confidential information.
* If you find sensitive information carelessly discarded in a public place, notify your manager.
Protecting Your Privacy
Never give out personally-identifying information unless you know:
* Who is receiving the information
* Why the information is needed
* What specific elements of information are needed
* How the information will be used, and by whom
* With whom the information will be shared
* How the information will be protected
Article source: InfoSecurityLab
Related Tags: information security awareness, information security awareness training, tips of security, protecting private information
Information security awareness training
Your Article Search Directory : Find in ArticlesRecent articles in this category:
- What Is Spyware?
If you use a computer then there are certain things that you have to be educated about. Spyware is o - There's No Such Thing As The Perfect Password
Even though you can get advice on how to create the perfect password, it's important to realize that - Shopping Online For Contacts: Security And Privacy
The Fairness to Contact Lens Consumer Act, signed into law in 2004, empowered lens wearers with the - Step-by-step Procedure Of Ssl Certificate Installation
SSL certificates are used to transfer the private data entered on the user computer to the website o - Software Protection Versus Code Obfuscation - Stable Software Protection
Security of intellectual property is crucial for every business in today's modern reality. Competiti - Portable Mini Digital Video Recorder
Portable Mini Digital Video Recorder is one of the world's smallest high-resolution mini Digital Vid - Protecting Domain Name From Cyber Squatting And Hijacking
Before I go into details about protecting domain name you should first know that there is no busines - Finding Email Senders Using Reverse Email Lookup
Most of our email inboxes are flooded with so many solicited and unsolicited messages that it's ofte - Confidentiality With Secure Email
Confidentiality, in any business, is among the most significant key in order to keep a client. There - Covering Your Computer's Footprints
When you delete a file, email, or piece of internet history on your computer, where do you think it
Most viewed articles in this category:
- How Does Ssl Fit Into the Over Scheme of Internet Security?
Internet has become an integral part of our life. Most of us prefer to do maximum amount of transact - Internet Attack Methods
The U.S. Government's National Information Assurance Glossary defines Information Security as: Prote - Your Security Awareness Iq
Article about security awareness: Are you aware of the need for security? Your awareness o - Information Security Endangered
Sour time is coming. Spy programs are stealing information more easily. The reason is weak algorithm - Computer Viruses
In information security , computer virus is a manmade program or piece of code that is loaded onto y - In Reality, Spyware is Always a Threat
I received a spam email the other day and the subject said "Tired of reality shows? Make your ow - The Top 7 Threats to your Computer in 2007
Now that the holidays are behind us, the cost-conscious among us will be looking for those "post-hol - Security Using Public Internet Array Access
Internet comes to peoples lives and then suddenly comes truth, that WE CAN'T LIVE WITHOUT INTERNET. - Enslaving the Airwaves: the Repercussions of Insecure Wireless Networks
There is no doubt that wireless technology has evolved the way we communicate. With the popular 2.4 - Anti-virus Software Comparison Test
Virus.gr tested quite a few different software companies to see how they would stack up against each