Treat business information as personal information. Business information typically includes a mix of personal and proprietary data. While you may think of trade secrets and company credit accounts, it also includes employee personally identifiable information (PII) through tax forms and payroll accounts. Do not share PII with unknown parties or over unsecured networks.
Use strong passwords at work, as well as home. As “smart” or data-driven technology evolves, it is important to remember that security measures only work if used correctly by employees. Smart technology runs on data, meaning devices such as smartphones, laptop computers, wireless printers, and other devices are constantly exchanging data to complete tasks. Take proper security precautions and ensure correct configuration to wireless devices in order to prevent data breaches.
If you see something, say something. Your workplace depends on you to keep an eye on things that could lead to a vulnerability. If you notice that your software is not up-to-date, you receive a security alert, or you click on an email link that in afterthought seems suspicious, bring these issues to the attention of the person in your company in charge of security. Your participation could make all the difference.
Social media is part of the fraud toolset. By searching Google and scanning your organization’s social media sites, cybercriminals can gather information about your partners and vendors, as well as human resources and finance departments. Employees should avoid oversharing on social media and should not conduct official business, exchange payments, or share PII on social media platforms.
It only takes one time. Data breaches do not typically happen when a cybercriminal has hacked into an organization’s infrastructure. Many data breaches can be traced back to a single security vulnerability, phishing attempt, or instance of accidental exposure. Be wary of unusual sources, do not click on unknown links, and delete suspicious messages immediately.
If you are approached on the telephone, by email or on social media by someone claiming to be a manager of your company, a government agency or other authority figure double-check before you release personal or business information. If the request is legitimate your employer will appreciate that you are thorough. If the approach is fraudulent you may have just saved yourself and your employer a great deal of grief and expense.