10 Ways to look after your Information


15 Sep 2015

10 Ways to look after your Information

Information is important to all businesses and must be protected. Cyber criminals often try to get their hands on financial, customer or staff details. If they are successful, the damage that can be inflicted upon a company can be massive on both a monetary and reputational front.

This article looks at some of the simple ways to protect your information.

1 – Lock it up

Whenever you leave your laptop, PC, tablet or phone unattended make sure they are locked. Ideally you should never leave them unattended at all but sometimes that can be unavoidable. Portable devices such as USB sticks and external hard drives should always be put in a safe location, never leave them out in the open if you are not around. Make sure to password protect all of your devices and use strong passwords that will be difficult for a hacker to crack, but one that you can remember without writing down.

 

02 – Be Aware of Your Surroundings

When discussing confidential information be aware of your surroundings and ensure that you cannot be overheard. When printing sensitive documents make sure the printer is password protected. Always ensure to pick up the printed material straight away and never leave it lying about in the open. When sending emails or letters, double check that you are using the correct address before sending.

 

03 – Sending Information

When sending information ensure that it is protected by using strong passwords and encryptions. Double check that you are sending the information to the correct recipient. Double or even triple check if necessary.

04 - Who needs to know?

Before sending out information stop and think. Who needs to know? Does this information need to be shared? If it doesn’t then don’t send it.

05 – Destroying Sensitive Data

Make sure that you dispose of data, do not leave the information around for someone to find. Ensure that you delete the information once you’ve finished with it. Shred documents, wipe boards clean after use and get rid of any used flip chart paper. Don’t be lazy, dispose of data properly!

06 –Tough to crack?

Many people continue to use weak and easy to crack passwords, make sure you are not one of them. Ensure that the password is hard to crack, and never ever write it down.

07 – Be Discrete

Only share information with the relevant people and when you do make sure you do so discretely.

                                                       

08 – ID or no ID? That is the question

 

I.D badges exist for a reason. Anyone you see not wearing an I.D should be challenged, and any visitors should be accompanied at all times.

 

09 – Stick to the rules!

 

Company policy and rules exist for a very good reason, follow them. They are in place to protect computer systems, sensitive information, customers and most importantly, staff.

 

10 – Do something about it.

If you see anything suspicious report it. Security is everyone’s responsibility, and yes that includes you! Always be vigilant and ensure that you always think about security when using, storing or disposing of information.

 

Don’t become a target, invest in protection and seek the advice of the professionals at PGI Cyber.

 

Share this article

RISK PORTAL

Your free global geopolitical
risk dashboard

PGI’s Risk Portal tool provides daily intelligence feeds, country threat assessments and analytical insights, enabling clients to track, understand and navigate geopolitical threats.

The Risk Portal gives users up-to-date information and analysis on global affairs.

The Risk Portal allows users to visualise information in a unique and instantly understandable way. Mapping filters enable the visualisation of incidents by threat category, time period, perpetrator and target type.

Risk Portal users can upgrade their accounts to include the Report Builder and Country Profile Generator features. The Report Builder allows users to select information, data and images from the Risk Portal and create bespoke reports and emails.

Subscribers to PGI’s Bespoke services receive tailored analysis on specific sectors and geographies of interest, delivered at a frequency they determine.

Visit the Risk Portal

Subscribe to our Cyber Bytes Newsletter

Keep yourself in the loop with PGI by signing up to our Monthly Cyber Bytes email. You will receive updates, tips and narrative around what has been happening in the world of information security.

Get in touch today

For more information on how we can help you or your business, please contact us via:

Related News

CISMP, CISSP and CISM - what's in an acronym?

20 Mar 2017

There is a wide range of different security courses available, and a mind-boggling array of certific...

Read news article

International Womens Day - Pioneering Women in Tec...

08 Mar 2017

Pioneering Women in Technology – Katherine JohnsonThe Oscar season has been and gone. The...

Read news article

Law Firms and why they need cyber security

06 Mar 2017

Suffering a data breach can be devastating for any company but for law firms the impacts can be part...

Read news article
Back to the News Hub

Follow us

+44 (0)207 887 2699
©2017 PGI - Protection Group International Ltd. All rights reserved.
PGI - Protection Group International Ltd is registered in England & Wales, reg. no. 07967865
Registered address: Cascades 1, 1190 Park Avenue, Aztec W, Almondsbury, Bristol BS32 4FP