Why YOU need an Acceptable Use Policy

frustrated

An acceptable Use Policy reinforces a company’s commitment to protecting their employees, partners, and the company from illegal or damaging actions by individuals, either knowing or unknowingly.  Although most companies realize the need for an Acceptable Use Policy, did you realize that it is just as important for the employee?

Internet Safety Tips

  • An average U.S. business is hit with an attack 100 times a day
  • 1 in 30 people will have their identity stolen
  • 95% of U.S. companies have their computers compromised every day
  • 73% of Americans have been cybercrime victims
  • 10 million Americans had their data stolen last year
  • 11.6% of identity theft occurs online
  • 9,000 malicious websites are created worldwide each day

How does a company create a safe cyber environment?  A good start is through employee education.  Just as a cyber-security conscious company will take precautions, so should their employees.  Although the following is not an exhaustive list, here are some basic tips to share with your fellow employees.

E-mail & Spam

  • Create A Unique Password
    Password security is key to keeping your account secure. Use different passwords for different accounts. Make sure your passwords are 10+ characters, do not include words, consist of upper and lowercase letters, and include special characters and numbers. It’s not impossible for a password that fits these criteria to be hacked, but it inhibits most hackers from being able to crack the password.
  • Beware Of Phishing Scams
    Most legitimate companies will never send you an email requesting personal information. Should you come across an email like this DO NOT OPEN IT.
  • Links Are Dangerous…Don’t Click Them Unless You Know They’re Safe!
    More often than not links are malicious and will take you to a site infected with malware, spyware, Trojans, or botnets, which are bad news for you and your company’s security.

Social Networking

  • Be Careful When Opening Links
    Links can always be dangerous and are most often the opening a hacker needs to get inside your network perimeter. Make sure you know who sent the link and that it seems like something they would send.
  • Don’t Accept Friend Requests From People You Don’t Know
    Hackers troll these sits under fake accounts in order to exploit a large variety of different attack vectors. Know your friends and lower your risk.
  • Don’t Post Personal Information & Disable Geo-Coordinate Tags From Photos.
    Many times your photos, posts and tweets are all a hacker needs to guess your password. Example: You love your dog and use his/her name as your password,but then you post a picture of your dog with his/her name as a tag.

Internet Browsing

  • Update, Update, Update
    Most updates released for software are a direct response to a security threat that was discovered. Software developers patch these threats regularly. Keeping your browser and its plug-ins updated will help keep you secure while browsing your favorite sites.
  • Google The Site Before Your Go To It
    Google warns users before sending them to a known malicious site. Google is good at protecting their users and can always be used to help weed out the bad sites.
  • Disable Non-Crucial Plug-ins
    Most browser plug-ins are insecure by design. The developers’ frantically release updates and within days/weeks new vulnerabilities are discovered. Don’t use plug-ins unless you absolutely need them and make sure it’s on a site you trust. Plug-ins open a gaping hole in your security and quickly lead to a compromised system if you go to a bad site.

Mobile Devices

  • Don’t Download Free Apps From Unofficial Marketplaces
    App marketplaces for unlocked devices generally contain malicious code in the back end of the software. The best practice is to simply not download anything from these sites.
  • Install a Premium Anti-Virus
    There are a few free anti-viruses on the app stores, but they don’t offer good protection. Your devices are fully functional computers and need a full AV suite.
  • Take Time To Install Updates
    Updates contain important security patches. Back up your data and update your phone every time these updates are released.
  • Password Protect Your Phone
    This is simple security mechanism, but it’s as important as the password on your laptop or desktop. Do Not Jailbreak Your Phone

Interweave Technologies has a limited amount of INTERNET SAFETY TIPS posters that you can display in your employee break room.  Please contact Chalaun Allen at 256-837-2300.