Wednesday, December 6, 2017

Keep your Information safe in your Computer & Mobile, Lesson 6 of 25

Information Security Regulation

Information Security Incident Management Reporting System is to report any incidents that occur or are suspected to target information or information processing facilities owned or managed.
Example to report IS Incident: 
Loss or theft of paper records, data or equipment e.g. laptops, smartphones or memory sticks, on which data is stored.


The assessment of the implementation status covering the following:
 Information Asset Register
 Data Classification
 Labeling & Handling
 Awareness of Information Security Policies and Procedures

Sample Incidents – Phishing / 
SPAM / Malware
Do not click to unsolicited web links from SPAM mails,
Avoid Enabling Macro, Editing and Content for received Office (doc, xls ..) files from external emails.
Perform AV scan before extracting or executing the content of compressed files; 
Do not open attachments or files from unknown or suspicious senders
Do not open any suspicious Attached file : .docm ,.7s, .rtf , .ace, .jar
Avoid clicking in images or links in attached PDF files from external emails.


Thanks for Read,
Please "SHARE" our post that your friends can read and learn and "COMMENT" us so that we can make our blogbeautiful.

Please Follow us.
Facebook Profile
Twitter
Google+
facebook Page
Youtube
E-mail

No comments:

Post a Comment

Learn how hackers are stealing passwords to protect your own

Fixing the Leak: See How Hackers Are Stealing Your Passwords There is no way you are going to win a battle you are not prepared for. By pr...