The Importance of Information Security for Parkers Office

  • Slides: 13
Download presentation
The Importance of Information Security for Parkers Office Products

The Importance of Information Security for Parkers Office Products

Why Is Protecting Parker’s Information Important • Company liability • Employee liability • Risks

Why Is Protecting Parker’s Information Important • Company liability • Employee liability • Risks from Parker’s competition

Common Practices and Habits That Put Information At Risk • Sharing passwords • Using

Common Practices and Habits That Put Information At Risk • Sharing passwords • Using company devices and email for personal use • Using unsecure internet access • Leaving company devices or assets unattended • Discussion of company information with 3 rd parties, eavesdropping, and “Blabbermouth”

Sharing Passwords Reasons or excuses for this: • “It was just too busy…. .

Sharing Passwords Reasons or excuses for this: • “It was just too busy…. . ” • “I wasn’t there and letting them do it was easier…. ” • “It’s always been ok……. ”

Sharing Passwords Cont. What this can lead too: • Conflicts with management and employees

Sharing Passwords Cont. What this can lead too: • Conflicts with management and employees • “He said, she said” situations • Possibility of misuse, i. e. : theft, access to confidential information, etc.

Using Company Devices for Personal Use This includes: • Personal internet browsing/use • Personal

Using Company Devices for Personal Use This includes: • Personal internet browsing/use • Personal use of company email • Gaming

Using Company Devices for Personal Use Continued Risks this incurs: • Cyber attacks: viruses,

Using Company Devices for Personal Use Continued Risks this incurs: • Cyber attacks: viruses, malware, etc. • Spam in company email accounts • Sharing of company and employee confidential information

Using Unsecure Internet Access Unsecure or Public internet access: • Restaurants • Stores •

Using Unsecure Internet Access Unsecure or Public internet access: • Restaurants • Stores • Libraries • Schools This can lead to: • Cyber attacks • 3 rd party eavesdropping or others seeing information on the screen

Leaving Company Assets Unattended • Leaving a device unattended while logged in • Leaving

Leaving Company Assets Unattended • Leaving a device unattended while logged in • Leaving a device in a vehicle • Lack of diligence while using company vehicles

Discussion of Parker’s Information With 3 rd Parties Discussion of information with: • •

Discussion of Parker’s Information With 3 rd Parties Discussion of information with: • • • Employees Family Friends Customers Competitors

Eavesdropping Eliminate eavesdropping: • • Be aware of who’s listening Speak softly, especially when

Eavesdropping Eliminate eavesdropping: • • Be aware of who’s listening Speak softly, especially when emotional If need be, take your conversation elsewhere If you can hear another conversation that’s confidential, remove yourself immediately

“Blabbermouth” • Keep confidential information, CONFIDENTIAL! • No one ever wins or benefits from

“Blabbermouth” • Keep confidential information, CONFIDENTIAL! • No one ever wins or benefits from gossip • 3 rd party discussion, eavesdropping, and blabbermouth can lead to termination, liability, etc. • Can lead to loss of business

Summary • Do not share passwords, for any reason • Do not misuse company

Summary • Do not share passwords, for any reason • Do not misuse company devices or services • Always use a secure internet access • Do not discuss company info with 3 rd parties • Eliminate eavesdropping and blabbermouth