Have some tips? Write it down and share it to your friends!
Click Login Now button to start!
Your face or fingerprint are examples of biometric information that can be used to log into apps or unlock your phone. These are typically much faster and more secure than entering a password. But biometrics aren't completely secure, and a stranger might still be able to unlock your phone. Although it's not quite as quick, a PIN is probably the safest approach to protect your data because they're very difficult to guess or crack.
Remember that it's always safe to combine two or more authentication methods.
Got questions? Submit a ticket at [PB8324.3] Data Security Support.
February 27, 2023 20:38 (on 2/28/23) | 0 | QR Ready | 1 minute read
Make sure your device doesn't automatically seek and connect to Bluetooth or open wireless networks. This makes it possible for online criminals to remotely access your device and obtain crucial data. Moreover, this can lead to unauthorized access and Bluetooth attacks. These networks can be used by attackers to steal your personal information, intercept your internet traffic, or even take over your device. Disable these functions to give yourself the option of connecting to a secure network.
If you have any questions, please submit a ticket at [PB8324.3] Data Security Support.
February 26, 2023 21:29 (on 2/27/23) | 0 | QR Ready | 1 minute read
Working from anywhere has numerous benefits, but it also poses a serious security risk. If you decide to leave the house to work in a public area, you should be aware of who can see your laptop screen. Additionally, when working in public, you should avoid talking about private company matters. Doing so could result in the leakage of sensitive information, including personal and financial data, or confidential business information. This information may be exploited for ransom, fraud, blackmail, or other malicious purposes, so it's important to always be careful.
Got questions? Submit a ticket at [PB8324.3] Data Security Support.
February 26, 2023 20:30 (on 2/27/23) | 0 | QR Ready | 1 minute read
Due to their portability, laptops are relatively easy to steal. You should always keep your laptop close and bring it with you when working in a public setting. When traveling, it is best to keep your electronics in your carry-on bag rather than in your checked luggage. This advice also applies to external hard drives and USB flash drives, which are both types of data storage. It can be challenging to determine with certainty what potentially sensitive information was on a lost or stolen device due to how easily it can be lost or stolen.
Got questions? Submit a ticket at [PB8324.3] Data Security Support.
February 26, 2023 20:20 (on 2/27/23) | 0 | QR Ready | 1 minute read
Mixing personal and company information can lead to a cybersecurity attack. If you combine company data such as customer records or financial information with personal details like social security numbers, credit card data, or medical records - and fail to secure this information adequately - it could result in a data breach. This, in turn, could lead to financial losses, identity theft, harm to one's reputation, and legal troubles. It's crucial to keep personal and business information separate and to implement proper security measures.
Got questions? Submit a ticket at [PB8324.3] Data Security Support.
February 26, 2023 20:52 (on 2/27/23) | 0 | QR Ready | 1 minute read
It's easy to let your guard down when working in the comfort of your own home or office. To prevent inadvertent data loss or leakage, you should still maintain the habit of locking your computer when you're not using it. All it takes is a moment of carelessness for a family member, co-worker, or malicious individual to accidentally or intentionally cause damage or access critical information they are not authorized to see.
Got questions? Submit a ticket at [PB8324.3] Data Security Support.
February 26, 2023 20:11 (on 2/27/23) | 0 | QR Ready | 1 minute read
Cybercriminals also use social media platforms to perform their attacks. To ensure our safety, we must be on the lookout for social media fraud such as solicitations for personal information or phony freebies. These frauds can result in identity theft or monetary loss. Always think twice and don’t click on links that look malicious from an untrusted sender.
Got questions? Submit a ticket at [PB8324.3] Data Security Support.
February 26, 2023 19:34 (on 2/27/23) | 0 | QR Ready | 1 minute read
Installing an untrusted app on a company device can have serious repercussions, such as data loss, malware infestations, unstable systems, policy violations, and legal troubles. It is essential to adhere to corporate rules and regulations and only download trustworthy software for use on your provided workstations. If you require software for your work, please contact the Data Security Team to verify its security before installation.
Got questions? Submit a ticket at [PB8324.3] Data Security Support.
February 26, 2023 19:52 (on 2/27/23) | 1 | QR Ready | 1 minute read
Two-factor authentication utilizes both forms: (1) something you know, like a username or password, and (2) something you have, like an authenticator app on your phone. Apps like these serve as an extra layer of security to confirm if the account owner is the one trying to access it. Once it is set up, be certain not to delete the app that you used; otherwise, you risk being locked out of your account.
March 8, 2023 19:14 (on 3/9/23) | 2 | QR Ready | 1 minute read
If your work involves accessing sensitive information, it is crucial to take all necessary precautions to protect it. All sensitive data must be kept in pre-approved networks to ensure proper control and monitoring. Avoid storing confidential information on your computer's hard drive or in unauthorized cloud storage accounts. It is also recommended to refrain from sending sensitive information via email, group chat, or personal devices. It is best recommended to share it personally or face-to-face with the only people you trust. By taking these precautions, you can help safeguard sensitive information and prevent any unauthorized access or data breaches.
Got questions? Submit a ticket at [PB8324.3] Data Security Support.
February 26, 2023 20:36 (on 2/27/23) | 0 | QR Ready | 1 minute read