Computer Security Day first started in 1988 as a way for the Association for Computer Security to raise awareness concerning computer security issues. This may come as a surprise as this was a time when most people did not yet have a home computer, and WIFI was not yet even a distant thought.
Now, over 30 years later, the day seems to have a heightened sense of importance, with smartphones and laptops having become an extension of ourselves, giving us a portal into a digital world. But, with so much data on these devices from credit card details and addresses to personal photographs, what happens when these portals are not secure?
IT governance is essential in mitigating any cyber risks within the workplace. At Atalian Servest we adhere to ISO 27001, the international standard which issues policies, guidelines and best practices to help organisations manage their information security processes.
Based upon the standard, and on Computer Security Day, we are sharing our top tips for basic computer security, which will protect you and your workplace from cyber threats.
- Create and maintain strong passwords and change them every 60-90 days.
- Change your password immediately if you suspect that it has been compromised.
- Do not share your password or restricted information with anyone.
- Do not get caught up in phishing attempts, if something does not look right then report it to IT.
- Do not open any email attachments from unknown sources.
Surfing the Internet
- Do not download anything or install software if you do not trust the site.
- Be smart when browsing/surfing the internet and clicking links.
- Do not leave your computer or mobile device unattended in a public place. Lost or stolen equipment must be reported to the relevant department immediately.
- Lock your screen if you leave your desk or work area.
- Trust your instincts. If something does not look right, then report it.
Just a single data breach can have considerable detrimental effect on an organisation, which is why following the above-outlined guidance is important. In addition to the mentioned guidelines, individuals must also know precisely where their data is stored and encrypt all sensitive data to ensure only those with permissions can access the data.