10 Golden Rules For Cybersecurity
10 Golden Rules For Cybersecurity
CYBER SECURITY
TEMPLATE
Authority and review
Document check
Author
Owner
Date created
Last revised by
Last revision date
.
VERSION MANAGEMENT
• Long passwords are more efficient because they are more difficult for cybercriminals to crack,
given the many possibilities offered by the number of characters.
• Strong passwords are at least 14 characters long, are not easy to figure out and
contain: uppercase, lowercase, numeric characters, special characters (&,$,%,!,=,+...).
Store all your data in a system where backups are made regularly and centrally.
Run security updates on all your devices as soon as they become available
Never leave physical information (e.g. papers) or devices unattended at your desk
Avoid public Wi-Fi and use the organisation's Virtual Private Network (VPN)
• Does the message ask for information such as a username, password or bank account
number?
• Is it urgent?
• Where does the link lead? (just hover over it, don't click)
• Is payment requested?
• Do not reply to them, do not open any attachments or click on the links.
• Report the phishing attempt to [IT department/provider] and delete the email/text.
• Always watch your surroundings when consulting or discussing confidential information in public
places. Try to isolate yourself wherever possible to prevent anyone overhearing a conversation
Use only official websites and platforms to download applications and software. Downloading software
should be avoided. Software is installed by the IT department/provider.