Technology, the fuel that keeps your company fires burning, can also often be your worst enemy. One the one hand, technology advances allows instant access to infinite data, organizes and manages every department from finance to maintenance, keeps everyone in the communication, and enables remote monitoring, offices, etc. On the other hand, this instant information at everyone’s fingertips brings with the blessing a bane – the constant demanding need for hyper-vigilant security. It’s not enough to implement top-of-the-line security tools and practices. It requires commitment from every employee. Unfortunately, a simple breach of a password can create a tsunami effect on your cybersecurity, and bring with it economic devastation.
Take the time to ensure that every employee follows each of these do’s and don’ts.
Employee Must Do’s
Create passwords which include:
• 12-16 characters
• Uppercase letters
• Lowercase letters
Utilize these safety gauges – yes, this can be a bit annoying, but it can prevent a breach:
• Two-step authentification
• Quarterly password changes
• Veto password sharing among staff – including immediate team members
• Demand privacy when entering passwords
• Be vigilant – take care not to upload passwords into the cloud or inadvertently share when using online paste and screen-capture tools
Keep the gate closed:
• Lock all devices when leaving them in your office – during lunch, breaks, restroom visits, etc.
• Protect all devices with anti-virus/anti-malware software and use nothing else for professional work
• Change password immediately at the tiniest sign of possible compromise.
• Report any and all suspicious activity, or lost/stolen devices immediately!
Employee Absolute Don’ts’
Password protection – do not:
• Use the same or similar password for multiple accounts/documents
• Send login ID’s or passwords that must be shared via unencrypted email
• Use family names, house numbers, birth or anniversary dates, or any other personal info when creating passwords.
• Share your login ID
Password storage – do not store:
• On a piece of paper, card file, in a notebook, etc.
• On a web browser
• On an easily accessible document
Building a protective hedge – do not:
• Leave any device containing professional info unattended in public places
• Install unauthorized programs on work devices or work programs on unauthorized personal devices
• Open email from unknown sources
• Log in to principle accounts when utilizing public wi-fi
Ensure your company’s and your customers’ cybersecurity. Insist that your employees follow the above password guidelines and lead by example. In addition, implement the following.
• Eliminate any user account as soon as it becomes unnecessary. For example, when a project reaches completion, a client moves one, or a user leaves the company.
• Allow access appropriate to each employee’s position and responsibilities, but keep it within that realm. Don’t provide access that goes beyond the level required for the task.
Springborn Staffing cares about the details that ensure your company’s success. That’s why we share pertinent information. It’s also why we give nothing short of excellence when you need additional staff. From temp and temp-hire to direct placement, we listen to your needs and provide top quality talent. Contact us today and discover the advantage of working with Maines leading staffing firm – independent and locally owned.