INFORMATION SECURITY
MANAGEMENT
1
CLEAN DESK Important! After office hours, do not leave the following in your office: › Confidential documents › Notes › Business card › › › › › › ›
CDs and DVDs Mobile devices Papers Notebooks USB flash drives Unprotected equipment Unlocked workstations
2
MEETING ROOMS Important! At the end of a meeting, make sure to: › Remove or destroy flipchart papers used and other notes › Clean the boards › Dispose of files copied in equipment installed in the rooms › Put videoconferencing equipment in idle mode › Turn off projectors and/or LCD monitors
3
WORKSTATIONS Important! Workstations – prints – passwords
WORKSTATION › Lock the equipment each time you leave your office. › Leave the laptop protected in the office. PRINTS › If you are sending confidential prints, make sure to wait near the printer until the end of the process. › Always remove the contents to be printed. Never leave them unattended. › Destroy any prints you are disposing of. PASSWORDS › Do not reveal your passwords. › Do not share it with your coworkers or with thrid parties. › Do not leave any notes pasted on the equipment or peripherals.
4
E-MAILS Important! If you receive an email that appears to be suspicious
› Do not open emails whose sender address is suspicious › Do not reply or open attached documents › Do not access links if you are unsure › Report it immediately to the Help Desk › Check the source of the information. Do not automatically reply to any email requesting personal or financial data. › Type the address into your Internet browser instead of clicking the link provided in the email. › Ensure that the website entered is a safe address. To do this, make sure it begins with https:// and that there is a small closed lock on the status bar of your browser. › Check your accounts regularly to detect any irregular transactions or transfers. › Keep in mind that banks do not request confidential data over insecure channels, such as emails.
FOR A SAFE USE OF MOBILE TELEPHONY, FOLLOW THESE RECOMMENDATIONS. • Do not open SMS or MMS from unidentified contacts. • Do not download applications received by text. • Disable bluetooth connection in public places. • Avoid the use of the device in places susceptible to theft.
IMPORTANT! In case of loss or theft, immediately contact the Help Desk.
If you have any doubts on how to proceed in specific situations, consult your manager or Communications for instructions. Your contributions for this document are welcome: write to seginfo@intercement.com and send your suggestion.