Information Security Regulation
Information Security Incident Management Reporting System is to report any incidents that occur or are suspected to target information or information processing facilities owned or managed.
Example to report IS Incident:
Loss or theft of paper records, data or equipment e.g. laptops, smartphones or memory sticks, on which data is stored.
The assessment of the implementation status covering the following:
Information Asset Register
Data Classification
Labeling & Handling
Awareness of Information Security Policies and Procedures
Sample Incidents – Phishing / SPAM / Malware
Do not click to unsolicited web links from SPAM mails,
Avoid Enabling Macro, Editing and Content for received Office (doc, xls ..) files from external emails.
Perform AV scan before extracting or executing the content of compressed files;
Do not open attachments or files from unknown or suspicious senders
Do not open any suspicious Attached file : .docm ,.7s, .rtf , .ace, .jar
Avoid clicking in images or links in attached PDF files from external emails.
Thanks for Read,
Please "SHARE" our post that your friends can read and learn and "COMMENT" us so that we can make our blogbeautiful.
Please Follow us.
Facebook Profile
Twitter
Google+
facebook Page
Youtube
E-mail
Subscribe to:
Post Comments (Atom)
Learn how hackers are stealing passwords to protect your own
Fixing the Leak: See How Hackers Are Stealing Your Passwords There is no way you are going to win a battle you are not prepared for. By pr...
-
Encryption Use encryption as prescribed in the Information Security Policies Use encrypted channels for on-line communications (HTTPS, ...
-
Social Engineering Be prepared for Social Engineering being skeptical than sorry. Be prepared to avoid a threat – be skeptical when it ...
No comments:
Post a Comment