Categories: Blog

Data Security Rules for the Office

A trusted client recently forwarded an outline of computer security rules that he asked his organization to follow. Some of the rules are obvious, but often ignored.

Here are his data security rules, supplemented with a few of our own.

Computer Security 101

Passwords

  1. Do not put passwords on Post-it Notes near your computer. If you must use them, keep them far away from the computer and locked away, if possible.
  2. Do not share your passwords with anyone.
  3. Add numbers and symbols. Passphrases (the first letter of each word in a favorite saying or lyric) are harder to crack, but easier to remember than random letters and numbers.
  4. Change passwords 3 to 4 times per year.

Attachments

  1. Do not open any attachments unless they are from a known and reputable party.
  2. Be wary of an attachment from a known person if it serves no business purpose. It is possible the virus has copied your email address book.
  3. Use https email encryption for all sensitive communication.

Cookies

  1. Beware of cookies and the possibility of security breaches.
  2. Check out browser alerts requesting plug-in installation.
  3. Do not install any software without the consent of the boss.

Telecommuting

  1. Avoid unsecure Wi-Fi connections for sensitive information in coffee shops, airports or hotels.
  2. Turn off file and printer sharing when using public Wi-Fi hot spots.
  3. Keep track of all devices. It only takes a few minutes of physical access to gain permanent access to your system. Mind where you leave portable units unlocked or readily available.
  4. Encrypt all information and data transmitted or stored on laptops, mobile devices, USB drives and SIM cards.

Desk

  1. Log off and lock your computers when stepping away, even for a few minutes.
  2. Power off or disconnect your computer from the internet when finished for the day.
  3. Keep confidential information off your desk and in a secure place.

Social Media

  1. Never post confidential information on social media.
  2. Don’t criticize the organization or its officers or employees in a post.
  3. Visit only company approved social networking sites at approved times.

General

  1. Download software updates as soon as they become available.
  2. Beware of social engineering attacks using coercion or persuasion to gain access.
  3. Store data only on company servers and approved cloud storage provider accounts.

Security is more than data security rules.

The above cover most of the bases, but remember that a security-first mindset that is communicated regularly to employees is essential to preventing data loss or theft.

In addition, be aware that wireless networks are a common point of attack, so secure wireless networks properly. And, make regular, secure, off-site backups of critical business data.

The best thing to do to ensure data security is to hire a data security expert to help you develop security policy and acquire the right technology. In the long-run it will save time, money and potential catastrophic data loss.

 

Cloud Services New York City

Recent Posts

Step Up Your Threat Response With Security Copilot

As we move deeper into 2025, you are probably focusing on ways to expand your…

1 day ago

Watch Out for the Cyber Security Menace

As we move deeper into 2025, you are probably focusing on ways to expand your…

1 day ago

The Rise of AI Agents: Simplifying Tasks and Connecting Technologies

Introducing eCare Bot: Your Intelligent IT Support Assistant  In today's fast-paced world, the emergence of…

3 days ago

Server Simplified

At eMazzanti Technologies, we recognize that stable, effective, and expandable servers are essential to the seamless operation of enterprises. For this reason, we collaborate with Hewlett Packard Enterprise (HPE) to offer our clients the best server solutions possible, customized to meet their unique requirements. HPE servers provide the performance and  flexibility required for small and big businesses to manage data, support apps, and manage             workloads with ease. Customers may choose the best HPE servers for their organization with the assistance of our team of specialists. We take the time to comprehend the particular needs of every client, including those related to processing speed, storage capacity, and security features. Whether our clients require a general-purpose ProLiant server or a…

1 week ago

How to Make Your AI Copy Sound Authentic: Writing Like a Human, Not a Machine

AI writing tools have become popular for creating content quickly. But many readers can spot…

1 week ago

Data Analytics for Old-School Business Owners: Turning Dusty Ledgers into Gold Mines

Data analytics is changing the game for businesses of all types, including old-school industries that…

1 week ago