SlideShare a Scribd company logo
1 of 8
1
Information SecurityInformation Security
Toolbox Talk
This document is made available on the condition that it is used solely to assist you in the preparation of your own safety training
material. Use for resale or similar commercial activity to third parties is strictly forbidden. This document was produced for our
internal use only, and therefore it may not be suitable or sufficient for your purposes. No guarantees whatsoever can be given as to
their legal compliance or comprehensiveness, and you are responsible for obtaining professional advice and verification as to the
correctness or suitability of any training or documents which you produce which are based wholly or in part on these. No liabilities
whatsoever are accepted. It has been made available purely for information to others who may find them useful when formulating
their own safety training and procedures.
© A. Groves & Océ (UK) Ltd
2
Rule 1Rule 1
 Always keep to our Policies
 Keep to our information security policies.
 Obey the customer’s information security rules.
 Respect the law and privacy legislation.
 Use approved hardware and licensed software only.
3
Rule 2Rule 2
 Handle information with care
 Keep your desk / work area clear.
 Keep confidential information
protected (under lock & key) during
breaks and when going home.
 Remove printed matter from printers,
copiers and faxes immediately
 Dispose of documents and
digital media securely
4
Rule 3Rule 3
 Keep your passwords and PINs secret
 Use quality passwords and PINs, and change them
regularly
 Keep your password and PINs secure
and don’t share them with anyone.
 Use password-protected screensavers.
 Log off and switch the PC off before
going home.
5
Rule 4Rule 4
 Know whom you’re dealing with
 Exercise caution in conversations and professional
interactions.
 Ensure that you know who you are communicating with on
the phone, the internet or via e-mail.
 Use your best professional judgement when getting or
giving information.
Not everything is true.
6
Rule 5Rule 5
 Use e-mail and the Internet with care
 Use e-mail and the Internet primarily
for business purposes.
 Don’t open any strange e-mails or
attachments and be careful when
downloading information.
 Don’t send strictly confidential
information via e-mail unless it is encrypted.
 Don’t access, download, store and send illegal or offensive
materials.
7
Rule 6Rule 6
 Pay attention to physical security and
mobile equipment
 Escort guests and make sure they
wear their visitor badges.
 Question strangers about their
presence in your department.
 Protect your mobile equipment with a
password or PIN and don’t leave it
unattended.
 Avoid the use of non-company equipment on the company
network.
8
Rule 7Rule 7
 Report incidents like viruses, thefts and
losses.
 Report suspicious activity at your workstation / area
immediately.
 Report all security incidents like thefts, losses, etc. to your
manager and security co-ordinator.

More Related Content

What's hot

20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network SecurityPatten John
 
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" InfographicDavid McHale
 
10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out10 Tips to Keep Criminals Out
10 Tips to Keep Criminals OutNeil Kemp
 
Pure retail training presentation v2
Pure retail training presentation v2Pure retail training presentation v2
Pure retail training presentation v2kaspersky-lab
 
Pure retail training non animation
Pure retail training non animationPure retail training non animation
Pure retail training non animationkatelyn-fogarty
 
Pure retail training presentation
Pure retail training presentationPure retail training presentation
Pure retail training presentationkatelyn-fogarty
 
Secure your public WiFi
Secure your public WiFiSecure your public WiFi
Secure your public WiFiMartin Keg
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe onlineShirley Diniz
 
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08Michael Boman
 
10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must FollowQuick Heal Technologies Ltd.
 
Network basic security
Network basic  securityNetwork basic  security
Network basic securityMohamed Radji
 
ReputationDefender - Your Privacy Demands Protection
ReputationDefender - Your Privacy Demands ProtectionReputationDefender - Your Privacy Demands Protection
ReputationDefender - Your Privacy Demands ProtectionReputationDefender
 
Austen Security Centre Presentation
Austen Security Centre PresentationAusten Security Centre Presentation
Austen Security Centre PresentationFrancois Brill
 

What's hot (19)

20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
 
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
 
10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out
 
Pure retail training presentation v2
Pure retail training presentation v2Pure retail training presentation v2
Pure retail training presentation v2
 
Pure retail training non animation
Pure retail training non animationPure retail training non animation
Pure retail training non animation
 
Pure retail training presentation
Pure retail training presentationPure retail training presentation
Pure retail training presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Van 231 safe
 Van 231 safe Van 231 safe
Van 231 safe
 
Secure your public WiFi
Secure your public WiFiSecure your public WiFi
Secure your public WiFi
 
Cyber security and crime
Cyber security and crimeCyber security and crime
Cyber security and crime
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
 
10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
 
HMA
HMAHMA
HMA
 
ReputationDefender - Your Privacy Demands Protection
ReputationDefender - Your Privacy Demands ProtectionReputationDefender - Your Privacy Demands Protection
ReputationDefender - Your Privacy Demands Protection
 
6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi
 
Austen Security Centre Presentation
Austen Security Centre PresentationAusten Security Centre Presentation
Austen Security Centre Presentation
 
How much should you reveal on social media
How much should you reveal on social mediaHow much should you reveal on social media
How much should you reveal on social media
 

Viewers also liked

Accident investigation presentation by stuart would
Accident investigation presentation by stuart wouldAccident investigation presentation by stuart would
Accident investigation presentation by stuart wouldMuthurv Venkatachalam
 
Corporate manslaughter and_corporate_homicide_act_2007
Corporate manslaughter and_corporate_homicide_act_2007Corporate manslaughter and_corporate_homicide_act_2007
Corporate manslaughter and_corporate_homicide_act_2007Muthurv Venkatachalam
 
Construction independant tied_scaffold
Construction independant tied_scaffoldConstruction independant tied_scaffold
Construction independant tied_scaffoldMuthurv Venkatachalam
 
Behavioural safety program_by_simon_holmes
Behavioural safety program_by_simon_holmesBehavioural safety program_by_simon_holmes
Behavioural safety program_by_simon_holmesMuthurv Venkatachalam
 
Aa asbestos training presentation version for h&s website
Aa asbestos training presentation version for h&s websiteAa asbestos training presentation version for h&s website
Aa asbestos training presentation version for h&s websiteMuthurv Venkatachalam
 
Basic principles of electrical safety
Basic principles of electrical safetyBasic principles of electrical safety
Basic principles of electrical safetyMuthurv Venkatachalam
 
Ms pipe internal cleaning (2)
Ms pipe internal cleaning (2)Ms pipe internal cleaning (2)
Ms pipe internal cleaning (2)Iqbal Mohammad
 

Viewers also liked (20)

Welcome heath safety
Welcome heath safetyWelcome heath safety
Welcome heath safety
 
Btfacultyorientation
BtfacultyorientationBtfacultyorientation
Btfacultyorientation
 
15 electro staticdischarge1g
15 electro staticdischarge1g15 electro staticdischarge1g
15 electro staticdischarge1g
 
15 electro staticdischarge1g
15 electro staticdischarge1g15 electro staticdischarge1g
15 electro staticdischarge1g
 
16 info securitytoolbox1g (1)
16 info securitytoolbox1g (1)16 info securitytoolbox1g (1)
16 info securitytoolbox1g (1)
 
13 lone workingtoolbox1g
13 lone workingtoolbox1g13 lone workingtoolbox1g
13 lone workingtoolbox1g
 
Accident investigation presentation by stuart would
Accident investigation presentation by stuart wouldAccident investigation presentation by stuart would
Accident investigation presentation by stuart would
 
Backcare5 g
Backcare5 gBackcare5 g
Backcare5 g
 
Altered and job made tools bst
Altered and job made tools   bstAltered and job made tools   bst
Altered and job made tools bst
 
Corporate manslaughter and_corporate_homicide_act_2007
Corporate manslaughter and_corporate_homicide_act_2007Corporate manslaughter and_corporate_homicide_act_2007
Corporate manslaughter and_corporate_homicide_act_2007
 
Construction independant tied_scaffold
Construction independant tied_scaffoldConstruction independant tied_scaffold
Construction independant tied_scaffold
 
Basics hf +_ergonomics
Basics hf +_ergonomicsBasics hf +_ergonomics
Basics hf +_ergonomics
 
Construction basics
Construction basicsConstruction basics
Construction basics
 
Case law slideshow
Case law slideshowCase law slideshow
Case law slideshow
 
Behavioural safety program_by_simon_holmes
Behavioural safety program_by_simon_holmesBehavioural safety program_by_simon_holmes
Behavioural safety program_by_simon_holmes
 
Aa asbestos training presentation version for h&s website
Aa asbestos training presentation version for h&s websiteAa asbestos training presentation version for h&s website
Aa asbestos training presentation version for h&s website
 
Safe operating of forklift
Safe operating of forkliftSafe operating of forklift
Safe operating of forklift
 
Construction site induction
Construction site inductionConstruction site induction
Construction site induction
 
Basic principles of electrical safety
Basic principles of electrical safetyBasic principles of electrical safety
Basic principles of electrical safety
 
Ms pipe internal cleaning (2)
Ms pipe internal cleaning (2)Ms pipe internal cleaning (2)
Ms pipe internal cleaning (2)
 

Similar to 16 info securitytoolbox1g (1)

Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online NetiquetteZoro18
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection ProgramsMichael Annis
 
Personal cyber security tips remote work
Personal cyber security tips remote workPersonal cyber security tips remote work
Personal cyber security tips remote workChinmayee Behera
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information SecurityKen Holmes
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Work from home policy
Work from home policyWork from home policy
Work from home policyHanees UK
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxvasidharta
 
Module4 policies&procedures-b
Module4   policies&procedures-bModule4   policies&procedures-b
Module4 policies&procedures-bBbAOC
 
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...Insurance Technologies Corporation (ITC)
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteGab Billones
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Security and Wearables: Success starts with security
Security and Wearables: Success starts with securitySecurity and Wearables: Success starts with security
Security and Wearables: Success starts with securityStephen Cobb
 
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...Jack Pringle
 

Similar to 16 info securitytoolbox1g (1) (20)

Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online Netiquette
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Poicy 121
Poicy 121Poicy 121
Poicy 121
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection Programs
 
Personal cyber security tips remote work
Personal cyber security tips remote workPersonal cyber security tips remote work
Personal cyber security tips remote work
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
it-security.ppt
it-security.pptit-security.ppt
it-security.ppt
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Work from home policy
Work from home policyWork from home policy
Work from home policy
 
Online Safety.pptx
Online Safety.pptxOnline Safety.pptx
Online Safety.pptx
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
 
Module4 policies&procedures-b
Module4   policies&procedures-bModule4   policies&procedures-b
Module4 policies&procedures-b
 
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Security and Wearables: Success starts with security
Security and Wearables: Success starts with securitySecurity and Wearables: Success starts with security
Security and Wearables: Success starts with security
 
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
 

More from Muthurv Venkatachalam (11)

heat stress
heat stressheat stress
heat stress
 
Civil law and criminal law
Civil law and criminal lawCivil law and criminal law
Civil law and criminal law
 
Campaign posters
Campaign postersCampaign posters
Campaign posters
 
Welcome heath safety
Welcome heath safetyWelcome heath safety
Welcome heath safety
 
Powered industrial trucks osha std
Powered industrial trucks osha stdPowered industrial trucks osha std
Powered industrial trucks osha std
 
Forllift safety
Forllift safetyForllift safety
Forllift safety
 
Fork lifts drive
Fork lifts driveFork lifts drive
Fork lifts drive
 
Working safely with work equipment by donald a mackay
Working safely with work equipment by donald a mackayWorking safely with work equipment by donald a mackay
Working safely with work equipment by donald a mackay
 
03 display screenequiptoolbox1g
03 display screenequiptoolbox1g03 display screenequiptoolbox1g
03 display screenequiptoolbox1g
 
13 lone workingtoolbox1g
13 lone workingtoolbox1g13 lone workingtoolbox1g
13 lone workingtoolbox1g
 
Breast cancer
Breast cancerBreast cancer
Breast cancer
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

16 info securitytoolbox1g (1)

  • 1. 1 Information SecurityInformation Security Toolbox Talk This document is made available on the condition that it is used solely to assist you in the preparation of your own safety training material. Use for resale or similar commercial activity to third parties is strictly forbidden. This document was produced for our internal use only, and therefore it may not be suitable or sufficient for your purposes. No guarantees whatsoever can be given as to their legal compliance or comprehensiveness, and you are responsible for obtaining professional advice and verification as to the correctness or suitability of any training or documents which you produce which are based wholly or in part on these. No liabilities whatsoever are accepted. It has been made available purely for information to others who may find them useful when formulating their own safety training and procedures. © A. Groves & Océ (UK) Ltd
  • 2. 2 Rule 1Rule 1  Always keep to our Policies  Keep to our information security policies.  Obey the customer’s information security rules.  Respect the law and privacy legislation.  Use approved hardware and licensed software only.
  • 3. 3 Rule 2Rule 2  Handle information with care  Keep your desk / work area clear.  Keep confidential information protected (under lock & key) during breaks and when going home.  Remove printed matter from printers, copiers and faxes immediately  Dispose of documents and digital media securely
  • 4. 4 Rule 3Rule 3  Keep your passwords and PINs secret  Use quality passwords and PINs, and change them regularly  Keep your password and PINs secure and don’t share them with anyone.  Use password-protected screensavers.  Log off and switch the PC off before going home.
  • 5. 5 Rule 4Rule 4  Know whom you’re dealing with  Exercise caution in conversations and professional interactions.  Ensure that you know who you are communicating with on the phone, the internet or via e-mail.  Use your best professional judgement when getting or giving information. Not everything is true.
  • 6. 6 Rule 5Rule 5  Use e-mail and the Internet with care  Use e-mail and the Internet primarily for business purposes.  Don’t open any strange e-mails or attachments and be careful when downloading information.  Don’t send strictly confidential information via e-mail unless it is encrypted.  Don’t access, download, store and send illegal or offensive materials.
  • 7. 7 Rule 6Rule 6  Pay attention to physical security and mobile equipment  Escort guests and make sure they wear their visitor badges.  Question strangers about their presence in your department.  Protect your mobile equipment with a password or PIN and don’t leave it unattended.  Avoid the use of non-company equipment on the company network.
  • 8. 8 Rule 7Rule 7  Report incidents like viruses, thefts and losses.  Report suspicious activity at your workstation / area immediately.  Report all security incidents like thefts, losses, etc. to your manager and security co-ordinator.