Do
* Install antivirus software and a firewall on your PC
* Use encryption to lock sensitive data on the mobile devices
* Use strong password, and change your password on a regular basis
* Scan all email attachments for viruses before opening them
* Be cautious if you are asked for personal information
* Install antivirus software and a firewall on your PC
* Use encryption to lock sensitive data on the mobile devices
* Use strong password, and change your password on a regular basis
* Clean up cache files in the browser after use of shared PCs
* Scan all email attachments for viruses before opening them
* Be cautious if you are asked for personal information
* Regularly backup your system and data, and store it securely
* Be accountable for your IT assets and data
* Stay alert and report suspicious activity
Do not
X Use easily‐guessed password, such as PAN card number, phone number, date of birth
Χ Share your IDs with others
Χ Leave your mobile computing devices unattended
Χ Download or accept programs and content from unknown or untrustworthy sources or
without permission of copyright owner or licensee
Χ Accept unsolicited file transfers from other devices via Bluetooth, etc.
Χ Visit untrustworthy sites out of curiosity, or access the URLs
Χ Use illegal/ unlicensed software and programs
Χ Leave sensitive information lying around the office
Χ Open email attachments from unsolicited sources
Χ Click on links embedded in spam mails
* Be accountable for your IT assets and data
* Stay alert and report suspicious activity
Do not
X Use easily‐guessed password, such as PAN card number, phone number, date of birth
Χ Share your IDs with others
Χ Leave your mobile computing devices unattended
Χ Download or accept programs and content from unknown or untrustworthy sources or
without permission of copyright owner or licensee
Χ Accept unsolicited file transfers from other devices via Bluetooth, etc.
Χ Visit untrustworthy sites out of curiosity, or access the URLs
Χ Use illegal/ unlicensed software and programs
Χ Leave sensitive information lying around the office
Χ Open email attachments from unsolicited sources
Χ Click on links embedded in spam mails
No comments:
Post a Comment