• Don’t respond to emails or phone calls requesting confidential company information-including employee information, financial results or company secrets.
• Stay on guard to avoid falling for this scam, and report any suspicious activity to IT.
• When you access sensitive information from a non-secure computer, like one in an Internet café or a shared machine athome, you put the information you’re viewing at risk.
• Make sure your computer is running the latest approved security (patches, antivirus, firewall)
• Don’t leave printouts containing private information on your desk. Lock them in a drawer or shred them. It’s very easy for a visitor to glance down at your desk and see sensitive documents.
• Keep your desk tidy and documents locked away.
• This is applicable to working from home as well as the office.
•Always lock your computer and mobile phone when you’re not using them. You work on important things, and we want to make sure they stay safe and secure.
• Locking your phone and computer keeps your data safe from prying eyes.
• Always report any suspicious activity to the IT team. Part of our job is to stop cyber attacks and to make sure our data isn’t lost or stolen.
• All of our jobs depend on keeping our information safe. In case something goes wrong, the faster we know about it, the faster we can deal with it.
•Always password-protect sensitive files on your computer, USB, smartphone, etc.
• Losing items like phones, USB flash drives and laptops can happen to anyone. Protecting your devices with strong passwords means you make it incredibly difficult for someone to break in and steal data.
•Don’t use obvious passwords, like “password,” “cat,” or obvious character sequences on the qwerty keyboard, like “asdfg” and “12345.” It’s better to use complex passwords.* Include different letter cases, numbers, and even punctuation.
• Try to use different passwords for different websites and computers. So if one gets hacked, your other accounts aren’t compromised.
• Always delete suspicious emails and links. Even opening or viewing these emails and links can compromise your computer and create unwanted problems without your knowledge.
• MRemember, if something looks too good to be true it probably is. Don’t let curiosity get the best of you
• Don’t plug in personal devices like USB flash drives, MP3 players and smartphones without permission from IT.
• Devices can be compromised with code waiting to launch as soon as you plug them into a computer. Talk to IT about your devices and let us make the call.
• Malicious applications often pose as legitimate programs, like games, tools or even antivirus software.
• Malicious applications aim to fool you into infecting your computer or network. If you like an application and think it will be useful, contact IT to look into it for you before installing.
Zrmanjska 3,
11030 Belgrade,
Serbia
Find out more »
Hermina South Tower 8th floor 1146 Budapest, Hermina street 17
Jerozolimskie 178 Avenue 02-486 Warszawa
Leninskaya sloboda 26, bld. 28, office 313, 115280
169 Calea Floreasca Building P1, 2nd Floor, District 1 014459 Bucharest
03680, Bozhenko str., 86L, entrance 1.
4th Floor, 292 Vauxhall Bridge Road, London, SW1V 1AE
27 West 24th Street, Suite 407, New York 10010
907, Silvercord Tower 2, 30 Canton Road, Tsim Sha Tsui, Kowloon, Hong Kong, China