Make your work devices work for you: A guide for employees

 

  • Transcript

    Cyber Security Awareness Month

    Make your work devices work for you
    A guide for employees

    In some ways, our workplace devices are our favourite coworkers. But if we’re not careful, they can also expose us to serious threats.

    Here are some tips on how you can safely use your work devices, no matter where work is.

    Watch out for social engineers
    85% of organizations are the target of social engineering Social engineeringThe practice of obtaining confidential information by manipulation of legitimate users. A social engineer will commonly use the telephone or internet to trick people into revealing sensitive information. For example, phishing is a type of social engineering. attacks, like phishingNote i

    Confirm the identity of anyone making unusual email or text requests
    Be careful giving out info about your organization or its employees
    Report any suspicious activity to your supervisor ASAP

    Keep a professional relationship with your phone
    Mobile devices can be a cyber criminal’s window into your organization.

    Don’t leave your phone unlocked or unattended
    Keep sensitive work information off your personal devices
    Follow your organization’s social media Social mediaInternet-based tools that allow people to listen, interact, engage, and collaborate with each other. Popular social media platforms include Facebook, YouTube, LinkedIn, and Twitter. policy

    Online risks are just a click away
    Malware MalwareMalicious software ("malware") designed to infiltrate or damage a computer system, without the owner's consent. Common forms of malware include computer viruses, worms, Trojans, spyware, and adware. It can: • Intimidate you with scareware, which is usually a pop-up message that tells you your computer has a security problem or other false information. • Reformat the hard drive of your computer causing you to lose all your information. • Alter or delete files. • Steal sensitive information. • Send emails on your behalf. • Take control of your computer and all the software running on it. attacks cost organizations an average of $3.4 million each year.Note i

    Lock your computer when you leave your desk
    Back up your files to an external hard drive or cloud often
    Contact IT before installing any new software

    Connect safely, no matter where you are
    The internet makes your job easier — but it can also put you at risk.

    Use a VPN when working remotely
    Never share your organization’s Wi-Fi Wi-FiWi-Fi refers to a set of wireless communication protocols that can transmit traffic to Wi-Fi enabled devices within a local area. A Wi-Fi enabled device such as a laptop or tablet can connect to the internet when within range of a wireless network connected to the internet. An area covered by one or more Wi-Fi access points is commonly called a hotspot. password
    Never disable firewalls or anti-virus VirusA computer program that can spread by making copies of itself. Computer viruses spread from one computer to another, usually without the knowledge of the user.  Viruses can have harmful effects, ranging from displaying irritating messages to stealing data or giving other users control over the infected computer. apps

    And above all else, follow your organization’s cyber security policy.

    If you have any questions about staying cyber safe at work, contact your IT department or visit GETCYBERSAFE.CA


    1. i

      The Cost of Cybercrime, Accenture Security, 2019

Date modified: