cybersecurity

Welcome to the Cyber Security Information,Training & Reporting Platform

Report a cyberthreat

Insider threat

If your organisation employs staff (full time or as contractors), there is a possibility they could leak data by mistake or maliciously. The potential damage from a leak of documents cannot be underestimated. Use these tips to mitigate the size of any data leak.
• Educate your team to be alert to issues and minimise careless mistakes.
• Limit how much data staff has access to. The principle of ‘least privilege access’ should apply to all IT systems. Only provide
staff with the minimum access they need to do their roles.
• Control the use of portable storage devices, such as USB memory keys, portable hard drives and media players.
• Consider using applications in certain situations to monitor staff behaviour − who copies what.
In all these areas it is key to remember that alongside technology, well-developed processes, procedures and staff training go a long way to protecting your valuable data. For example, if someone leaves your employment, make sure you remove their access. The reality today is that you should
protect your digital assets with the same vigilance as you do when locking your office door at the end of the day

Test your cybersecurity Knowledge

/5
0
Created on

Uncategorized

Cyber

1 / 5

Category: Uncategorized

Which of the following should you do to restrict access to your devices and data?

2 / 5

Category: Uncategorized

What kind of cybersecurity risks can be mitigated by using a VPN?

3 / 5

Category: Uncategorized

Turning off the GPS of your device prevents any tracking of your location.

4 / 5

Category: Uncategorized

Cybercriminals access someone's system and encrypt their personal data and files. The user is unable to access data unless they pay cybercriminals to decrypt the files. It is known as

5 / 5

Category: Uncategorized

Which of these is an example of a phishing attack?

Your score is

The average score is 0%

0%