0% found this document useful (0 votes)
22 views4 pages

10 Golden Rules For Cybersecurity

The document outlines 10 golden rules for cyber security, emphasizing the importance of strong authentication, multifactor authentication, and the use of long, complex passwords. It advises on data backup, security updates, and precautions against phishing and unauthorized access to confidential information. Additionally, it stresses the need to report security incidents and to use official channels for software installation.

Uploaded by

chowdary26
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views4 pages

10 Golden Rules For Cybersecurity

The document outlines 10 golden rules for cyber security, emphasizing the importance of strong authentication, multifactor authentication, and the use of long, complex passwords. It advises on data backup, security updates, and precautions against phishing and unauthorized access to confidential information. Additionally, it stresses the need to report security incidents and to use official channels for software installation.

Uploaded by

chowdary26
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

10 GOLDEN RULES FOR

CYBER SECURITY
TEMPLATE
Authority and review

DOCUMENT CONTROL AND REVIEW

Document check
Author
Owner
Date created
Last revised by
Last revision date
.

VERSION MANAGEMENT

Version Date of approval Approved by Description of change


1.0

10 Golden rules for cyber security- Template 2


10 Golden Rules for cyber security

Protect your accounts with strong authentication!

Always use multifactor authentication (MFA) whenever possible!

• Long passwords are more efficient because they are more difficult for cybercriminals to crack,
given the many possibilities offered by the number of characters.

• Strong passwords are at least 14 characters long, are not easy to figure out and
contain: uppercase, lowercase, numeric characters, special characters (&,$,%,!,=,+...).

Use different passwords for professional and personal accounts

Store all your data in a system where backups are made regularly and centrally.

Run security updates on all your devices as soon as they become available

Never leave physical information (e.g. papers) or devices unattended at your desk

Avoid public Wi-Fi and use the organisation's Virtual Private Network (VPN)

Avoid phishing by asking yourself the following questions:

• Is the sender someone I know?

• Was I expecting a post on the topic mentioned?

• Does the message ask for information such as a username, password or bank account
number?

• Is it urgent?

• Where does the link lead? (just hover over it, don't click)

• Does the message contain a QR code?

• Am I being addressed personally?

• Are there any language errors in the message?

• Is the message in the Spam / Junkmail folder?

• Is someone trying to make me curious?

• Is payment requested?

How do you respond to a phishing email?

• Do not reply to them, do not open any attachments or click on the links.

• Never share bank details requested via SMS or e-mail.

• Report the phishing attempt to [IT department/provider] and delete the email/text.

10 Golden rules for cyber security- Template 3


Observe the following measures when handling internal or confidential information:

• Lock your computer if you leave it unattended.

• Do not leave computers or papers unattended on desks outside working hours.

• Do not leave papers unattended in printers.

• Always watch your surroundings when consulting or discussing confidential information in public
places. Try to isolate yourself wherever possible to prevent anyone overhearing a conversation

Use only official websites and platforms to download applications and software. Downloading software
should be avoided. Software is installed by the IT department/provider.

Report all information security incidents to your IT department/provider


Always contact [IT department/provider] when:

you have any questions or comments on this document;

• you notice anything contrary to this document;

• a suspected or confirmed incident occurs.

Contact details: [IT department/provider phone number] / [IT department/provider email].

10 Golden rules for cyber security- Template 4

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy