Home > Best Practices for Employees
Workplace Safety

Best Practices for Employees

Business Email Compromise

In today's digital world, employees are crucial in protecting their organization's information and systems. By adhering to best practices in cybersecurity, you can help defend against threats such as phishing, malware, and data breaches. Here are some essential guidelines to remember:

Be Suspicious of Email Links and Attachments

Phishing emails are a common tactic used by cybercriminals to gain unauthorized access to your network. These emails often trick you into clicking malicious links or downloading harmful attachments.

Tip: Always verify the sender's email address and avoid unexpected messages. If in doubt, contact the sender through a different communication channel.

Example: An email claiming to be from your bank asking you to verify your account details might be a phishing attempt.

Use Strong Passwords and Keep Them Private

Your password is a crucial defense against unauthorized access. A strong password is long, complex, and unique to each account.

Tip: Use a mix of uppercase and lowercase letters, numbers, and special characters. Consider using a password manager to generate and store strong passwords securely.

Example: Instead of "Password123," use a passphrase like "5Tr0ng&P@ssw0rd!"

Backup Your Files Regularly

Data loss can occur for various reasons, from hardware failures to cyberattacks. Regular backups ensure that you can recover your essential files.

Tip: Set up automatic backups to an external hard drive or a cloud service. Check your backups periodically to ensure they are working correctly.

Example: If you accidentally delete an important document, having a recent backup can save you from significant stress and lost work.

Be Careful When Using Public Wi-Fi

Public Wi-Fi networks are convenient but often unsecured, making them prime targets for cyber eavesdropping.

Tip: Use a Virtual Private Network (VPN) to encrypt your internet connection. Avoid accessing sensitive accounts or information on public Wi-Fi.

Example: While enjoying a coffee at a local café, use a VPN when checking your email to prevent potential data interception.

Use Password-Protected Screen Savers

Leaving your computer unattended can allow others to access sensitive information.

Tip: Set your computer to lock automatically after a few minutes of inactivity. You will need a password to unlock it.

Example: If you step away from your desk for a meeting, a locked screen ensures your data remains secure.

Download Only from Approved Sources

Downloading software from untrusted sites can expose your system to malware.

Tip: Stick to official app stores or your organization's approved software list. Be cautious of "free" software that might come with hidden threats.

Example: Downloading a "free" version of a popular game from an unknown website could install malware on your device.

Don't Give Out Information to Unverified Individuals

Social engineering attacks often rely on tricking employees into divulging sensitive information.

Tip: Always verify the identity of the person requesting information and ensure they have the right to access it. When in doubt, escalate the request to your manager or IT department.

Example: If someone calls claiming to be from IT and asks for your password, double-check their identity through official channels before complying.

 

Know and Follow Your Agency's Information Security Policies

Each organization has its security policies designed to protect its data and systems.

Tip: Familiarize yourself with your company's security guidelines and adhere to them strictly. Attend any training sessions provided to stay updated on the latest security practices.

Example: If your company prohibits using USB drives for data transfer, ensure you follow this policy to prevent data leaks.

Be Mindful of Social Media and Personal Devices

Using personal devices or social media for work can blur the lines between personal and professional data, increasing security risks.

Tip: Avoid sharing work-related information on social media. Ensure personal devices used for work have proper security measures, like updated antivirus software and strong passwords.

Example: Posting details about your work project on social media could provide attackers with valuable information for targeting your organization.

Report Suspicious Activities Promptly

Early detection of security incidents can prevent significant damage. Always report any suspicious activity or potential breaches immediately.

Tip: Know the procedure for reporting security concerns in your organization. Encourage a culture of vigilance and openness where employees feel comfortable reporting issues.

Example: If you receive a suspicious email, report it to your IT department instead of ignoring or deleting it.