The protection and security of company information is a significant responsibility of each employee. The practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction – relies largely on our employees awareness of the daily threats.
The ITS / Help Desk Team is available to assist in many ways to help prevent successful cyber attacks, however it is you (the employee) who can significantly reduce or prevent intrusions of personal and/or company information.
We have highlighted several critical aspects of protecting company and personal information. Regardless of your cyber security awareness, please review each section below and discuss it with others…
As an employee, the company entrusts you with a company username and password used to access computer/network and email. Your username and password provides access that should be kept secure and not shared with anyone. Here are few important reminders as it relates to your company username and password:
Phishing email messages, websites, and phone calls are designed to steal personal or company information as well as money.
Cybercriminals use social engineering to convince you to install malicious software or hand over your personal information under false pretenses. They might email you, call you on the phone, or convince you to download something off of a website. While our networks have firewalls and email filters, they will not prevent 100% of these attacks.
Your awareness of these attacks will greatly increase our protection.
How to recognize phishing email messages and links:
Windows Server Update Services (WSUS) enables information technology administrators to deploy the latest Microsoft product updates to computers that are running the Windows operating system. By using WSUS, administrators can fully manage the distribution of updates that are released through Microsoft Update to computers in their network.
When you see the pop up window stating you need to RESTART, please do so before you go home that day.
Malware, short for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. ‘Malware’ is a general term used to refer to a variety of forms of hostile or intrusive software.
Malware includes computer viruses, ransomware, worms, trojan horses, rootkits, keyloggers, dialers, spyware, adware, malicious BHOs, rogue security software and other malicious programs; the majority of active malware threats are usually worms or trojans rather than viruses. In law, malware is sometimes known as a computer contaminant, as in the legal codes of several U.S. states. Malware is different from defective software, which is a legitimate software but contains harmful bugs that were not corrected before release. However, some malware is disguised as genuine software, and may come from an official company website in the form of a useful or attractive program which has the harmful malware embedded in it along with additional tracking software that gathers marketing statistics.
Malware Training and Documentation
Click on the following links below to learn more about what Security looks like on your computer: