SlideShare ist ein Scribd-Unternehmen logo
1 von 13
IT Security DOs and DON’Ts
From your helpful IT Team
A note for you
We have created this presentation for you, the outstanding employee who has
IT security on the brain.

We want to help you spread the word about IT security, so we’re giving you our
top 10 IT Security DOs and DON’Ts to help you in that effort.

Take this content and tailor it to your business. Use it for new employee
training, quarterly IT updates, or even general company meetings. It’s up to you.

And we’d love to hear your feedback on how we can make this better.
Visit www.sophos.com/staysafefeedback

Your friends @ SOPHOS
1. Don’t be tricked into giving
away confidential information
• Don’t respond to emails or phone calls requesting
  confidential company information
• Always keep in mind that bad guys are successful
  because they are convincing.
• Recent news stories out of Canada reported scammers
  were tricking people into giving away information with
  fake tech support calls claiming to help.
• Keep on guard and report any
  suspicious activity to IT.

Video tip 1: Don’t get tricked
2. Don’t use an unprotected
computer
• When you access sensitive information from a non-secure
  computer you put the information you’re viewing at risk.
• Malicious software exists that allows people to easily
  snoop on what you’re doing online when accessing
  unprotected sites.
• If you’re unsure if the computer you’re using
  is safe, don’t use it to access corporate or
  sensitive data.
                            Keep your personal computer safe with
                                   Sophos Virus Removal Tool or
                           Sophos Anti-virus for Mac Home Edition



Video tip 2: Stay secure
3. Don’t leave sensitive info lying
around the office
• Don’t leave printouts containing private information on your
  desk. It’s easy for a visitor to glance at your desk and see
  sensitive documents.
• Keep your desk tidy and documents locked away or
  shredded when no longer needed.
• It makes the office look more organized, and reduces the
  risk of information leaks.




Video tip 3: Put things away
4. Lock your computer and
mobile phone when not in use
• Always lock your computer and mobile phone when you’re
  not using them. You work on important things, and we want
  to make sure they stay safe and secure.
• Locking these devices keeps both your personal
  information and the company’s data and contacts safe
  from prying eyes.




Video tip 4: Lock it
5. Stay alert and report suspicious
activity
• Sometimes suspicious activity isn’t as obvious as we think.
• A recent news story reported that a supermarket manager,
  who was randomly befriended by a mysterious woman on
  Facebook, ended up on a “date” with two men who
  overpowered him and robbed his store.
• Be cautious of people you don't know
  asking for things, especially online.
• Always report any suspicious activity
  to IT. If something goes wrong, the
  faster we know about it, the faster we
  can deal with it.
Video tip 5: Stay alert
6. Password-protect sensitive
files and devices
• Always password-protect sensitive files on your
  computer, USB flash drive, smartphone, laptop, etc.
• Losing a device can happen to anyone. But by protecting
  your device with strong passwords, you make it difficult for
  someone to break in and steal data.




Video tip 6: Protect it
7. Always use hard-to-guess
passwords
• Many people use obvious passwords like “password,” “cat,”
  or obvious character sequences on the qwerty keyboard
  like “asdfg.”
• Create complex passwords by including different letter
  cases, numbers, and even punctuation.
• Try to use different passwords for
  different websites and computers.
  So if one gets hacked,
  your other accounts aren’t
  compromised.

Video tip 7: Use strong passwords
8. Be cautious of suspicious
emails and links
• Hackers try to steal email lists from companies, which
  happened recently to Toshiba. Company email addresses
  are valuable to attackers, allowing them to create fake
  emails from "real people.“
• Always delete suspicious emails from people you don't
  know. And never click on the links.
• Opening these emails or clicking on
  links in them can compromise your
  computer without you ever knowing it.

Video tip 8: Think first
9. Don’t plug in personal devices
without the OK from IT
• Don’t plug in personal devices such as USBs, MP3 players
  and smartphones without permission from IT.
• Even a brand new iPod or USB flash drive could be
  infected with a nasty virus.
• These devices can be compromised
  with code waiting to launch
  as soon as you plug them into
  a computer.
• Talk to IT about your devices and
                                       Protect your personal Android device with
  let them make the call.                   Sophos Mobile Security Free Edition

Video tip 9: Don't plug it in
10. Don’t install unauthorized
programs on your work computer
• Malicious applications often pose as legitimate programs
  like games, tools or even antivirus software.
• They aim to fool you into infecting your computer
  or network.
• If you like an application and think it will be useful,
  contact us and we’ll look into it for you.




Video tip 10: Don’t install it
Get more
IT Security DOs and DON’Ts
View the online handbook at www.sophos.com/securitytips

Get quick tips to create strong passwords



Connect with us:
facebook.com/securitybysophos
twitter.com/Sophos_News
Sophos on Google+
linkedin.com/company/sophos

Weitere ähnliche Inhalte

Was ist angesagt?

Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
DallasHaselhorst
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Randy Bowman
 
IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTs
IT Tech
 

Was ist angesagt? (20)

Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
IT Security DOs and DON'Ts
IT Security DOs and DON'TsIT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTs
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Anti phishing presentation
Anti phishing presentationAnti phishing presentation
Anti phishing presentation
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 

Ähnlich wie IT Security DOs and DON'Ts

Module5 desktop-laptop-security-b
Module5 desktop-laptop-security-bModule5 desktop-laptop-security-b
Module5 desktop-laptop-security-b
BbAOC
 
Your smartphone can help protect itself – and
Your smartphone can help protect itself – andYour smartphone can help protect itself – and
Your smartphone can help protect itself – and
RandyBett
 
Online reputation
Online reputationOnline reputation
Online reputation
esl2m
 

Ähnlich wie IT Security DOs and DON'Ts (20)

Securitytips
SecuritytipsSecuritytips
Securitytips
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
Edu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crsEdu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crs
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Module5 desktop-laptop-security-b
Module5 desktop-laptop-security-bModule5 desktop-laptop-security-b
Module5 desktop-laptop-security-b
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnum
 
Internet
InternetInternet
Internet
 
Your smartphone can help protect itself – and
Your smartphone can help protect itself – andYour smartphone can help protect itself – and
Your smartphone can help protect itself – and
 
Personal cyber security tips remote work
Personal cyber security tips remote workPersonal cyber security tips remote work
Personal cyber security tips remote work
 
How to be safe on the internet. Group 2 of Tulip Made by the group two of se...
How to be safe on the internet. Group 2 of Tulip  Made by the group two of se...How to be safe on the internet. Group 2 of Tulip  Made by the group two of se...
How to be safe on the internet. Group 2 of Tulip Made by the group two of se...
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Keep Your Computers Safe And Secure
Keep Your Computers Safe And SecureKeep Your Computers Safe And Secure
Keep Your Computers Safe And Secure
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 
Essential Technologies for Psychologists
Essential Technologies for PsychologistsEssential Technologies for Psychologists
Essential Technologies for Psychologists
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 

Mehr von Sophos

When Malware Goes Mobile
When Malware Goes MobileWhen Malware Goes Mobile
When Malware Goes Mobile
Sophos
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
Sophos
 

Mehr von Sophos (18)

Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection Overview
 
Your Money or Your File! Highway Robbery with Blackhole and Ransomware
Your Money or Your File! Highway Robbery with Blackhole and RansomwareYour Money or Your File! Highway Robbery with Blackhole and Ransomware
Your Money or Your File! Highway Robbery with Blackhole and Ransomware
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report Presentation
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
2013 Security Threat Report
2013 Security Threat Report2013 Security Threat Report
2013 Security Threat Report
 
4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings
 
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionPreparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless Protection
 
Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?
 
Get the Most From Your Firewall
Get the Most From Your FirewallGet the Most From Your Firewall
Get the Most From Your Firewall
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop
 
When Malware Goes Mobile
When Malware Goes MobileWhen Malware Goes Mobile
When Malware Goes Mobile
 
Exposing the Money Behind Malware
Exposing the Money Behind MalwareExposing the Money Behind Malware
Exposing the Money Behind Malware
 
BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your School
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security Box
 
Complete Security
Complete SecurityComplete Security
Complete Security
 
IT Security DOs und DON’Ts (Italian)
IT Security DOs und DON’Ts (Italian)IT Security DOs und DON’Ts (Italian)
IT Security DOs und DON’Ts (Italian)
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 

IT Security DOs and DON'Ts

  • 1. IT Security DOs and DON’Ts From your helpful IT Team
  • 2. A note for you We have created this presentation for you, the outstanding employee who has IT security on the brain. We want to help you spread the word about IT security, so we’re giving you our top 10 IT Security DOs and DON’Ts to help you in that effort. Take this content and tailor it to your business. Use it for new employee training, quarterly IT updates, or even general company meetings. It’s up to you. And we’d love to hear your feedback on how we can make this better. Visit www.sophos.com/staysafefeedback Your friends @ SOPHOS
  • 3. 1. Don’t be tricked into giving away confidential information • Don’t respond to emails or phone calls requesting confidential company information • Always keep in mind that bad guys are successful because they are convincing. • Recent news stories out of Canada reported scammers were tricking people into giving away information with fake tech support calls claiming to help. • Keep on guard and report any suspicious activity to IT. Video tip 1: Don’t get tricked
  • 4. 2. Don’t use an unprotected computer • When you access sensitive information from a non-secure computer you put the information you’re viewing at risk. • Malicious software exists that allows people to easily snoop on what you’re doing online when accessing unprotected sites. • If you’re unsure if the computer you’re using is safe, don’t use it to access corporate or sensitive data. Keep your personal computer safe with Sophos Virus Removal Tool or Sophos Anti-virus for Mac Home Edition Video tip 2: Stay secure
  • 5. 3. Don’t leave sensitive info lying around the office • Don’t leave printouts containing private information on your desk. It’s easy for a visitor to glance at your desk and see sensitive documents. • Keep your desk tidy and documents locked away or shredded when no longer needed. • It makes the office look more organized, and reduces the risk of information leaks. Video tip 3: Put things away
  • 6. 4. Lock your computer and mobile phone when not in use • Always lock your computer and mobile phone when you’re not using them. You work on important things, and we want to make sure they stay safe and secure. • Locking these devices keeps both your personal information and the company’s data and contacts safe from prying eyes. Video tip 4: Lock it
  • 7. 5. Stay alert and report suspicious activity • Sometimes suspicious activity isn’t as obvious as we think. • A recent news story reported that a supermarket manager, who was randomly befriended by a mysterious woman on Facebook, ended up on a “date” with two men who overpowered him and robbed his store. • Be cautious of people you don't know asking for things, especially online. • Always report any suspicious activity to IT. If something goes wrong, the faster we know about it, the faster we can deal with it. Video tip 5: Stay alert
  • 8. 6. Password-protect sensitive files and devices • Always password-protect sensitive files on your computer, USB flash drive, smartphone, laptop, etc. • Losing a device can happen to anyone. But by protecting your device with strong passwords, you make it difficult for someone to break in and steal data. Video tip 6: Protect it
  • 9. 7. Always use hard-to-guess passwords • Many people use obvious passwords like “password,” “cat,” or obvious character sequences on the qwerty keyboard like “asdfg.” • Create complex passwords by including different letter cases, numbers, and even punctuation. • Try to use different passwords for different websites and computers. So if one gets hacked, your other accounts aren’t compromised. Video tip 7: Use strong passwords
  • 10. 8. Be cautious of suspicious emails and links • Hackers try to steal email lists from companies, which happened recently to Toshiba. Company email addresses are valuable to attackers, allowing them to create fake emails from "real people.“ • Always delete suspicious emails from people you don't know. And never click on the links. • Opening these emails or clicking on links in them can compromise your computer without you ever knowing it. Video tip 8: Think first
  • 11. 9. Don’t plug in personal devices without the OK from IT • Don’t plug in personal devices such as USBs, MP3 players and smartphones without permission from IT. • Even a brand new iPod or USB flash drive could be infected with a nasty virus. • These devices can be compromised with code waiting to launch as soon as you plug them into a computer. • Talk to IT about your devices and Protect your personal Android device with let them make the call. Sophos Mobile Security Free Edition Video tip 9: Don't plug it in
  • 12. 10. Don’t install unauthorized programs on your work computer • Malicious applications often pose as legitimate programs like games, tools or even antivirus software. • They aim to fool you into infecting your computer or network. • If you like an application and think it will be useful, contact us and we’ll look into it for you. Video tip 10: Don’t install it
  • 13. Get more IT Security DOs and DON’Ts View the online handbook at www.sophos.com/securitytips Get quick tips to create strong passwords Connect with us: facebook.com/securitybysophos twitter.com/Sophos_News Sophos on Google+ linkedin.com/company/sophos