Sei sulla pagina 1di 1

Get ready for National Cybersecurity

Awareness Month

Posters Articles
10 Hang posters in common spaces or
10 Reinforce each cybersecurity topic
high-traffic areas. Replace them regularly to with brief, conversational articles with
keep employee attention and to highlight real-life examples. Add the articles to
each cybersecurity topic. your organization’s newsletter, security
portal or intranet.

Infographics
10 PowerPoint presentation
Expand on each cybersecurity topic with
in-depth infographics. Email them to
1 Use our pre-built presentation to reinforce
employees, add them to your intranet or use cybersecurity best practices for employees
them on digital signage. and stakeholders alike.

Secure IT.
Secure IT. IT’s up to you. Own IT.
IT’s up to you. IT’s up to you.

T YOU KNOW
HA
W

Protect IT. IT’s up to you. Own IT. IT’s up to you.


ashley123
Great Pyramid of Giza Public

Secure IT. IT’s up to you. Secure IT. IT’s up to you.


Longer and
Less is more
The less data you haveDitch
By the book
the digits?
Sharing isn’t caring A few good Bad share day To have and have not
stronger
Mix and match on It’s important to know the Never let someone else access sensitive data unless
A T Y OU A AT YOU HA friends Two locks Sync and personalize across

WH
your devices

WH
Do you like mixing languages or the less can be lost in
hand, policiesrules
for handling they are explicitly authorized and their identity has been proven. When you log into an account with a third-party app or
RE VE
are better
While your own organization’s may be
making up your own words? If service, information is being shared between that service Turn off sync... There are three different types of authentication: what you know, what you have and what
the event of a data breach customer
different, new federal guidancedata and be familiar
has advised Impostors may try to tell you a good story, but that data represents a
Shorter passwords are easier so, then you have an easy way to
and the less dangerthat forforcing users towith your
include role
lots in an emergency.
of symbols person’s life and safety. The best way to keep yourself and and your account. Keep a lid on your data by using you are. Mixing authentication types will give you stronger protection. If someone
Sign out
improve your password. If it only

than one Syncing ship


for hackers to break. NIST, the your information safe is to limit your individual login and not installing extensions. has stolen your password but not your cell phone, they’re out of luck!
National Institute for Standards makes sense to you,the customer.
it’s less
and numbers doesn’t necessarily increase
your friends list and restrict
password security. Focus on length and
and Technology, recommends that likely to appear in the cracked lists of
memorability instead. what you post to your friends only.
passwords be anywhere from
8 to 64 characters long.
passwords hackers use. Having two or more authentication steps
makes it harder for attackers to breach Disabling auto-sync forces
***********
an account. Most apps, devices and services
Coelophysis 25
have the option to enable multi-factor
someone who’s stolen your
Friendbook
Irezumi 3,400,523 views
authentication, and it’s always smart
account or device to enter your
to use it.
password, which will stop an
Family photo! Friends attacker who doesn’t know it.

Shred and buried


The eyes have it
Stacy Kingly

Thinking in sentences
When customer data is no longer

Lockdown
How do you remember a password that’s 64 characters long? Think in sentences,
Customer information needs protection.
Who goes there?
You need strong physical security
needed, the records should
be destroyed. Papers should
be shredded or pulped, and devices
Georgie Red Location unknown *********** Lockdown Biometric authentication, the “something you are” factor, can be anything from a signature
not words. A phrase or a sentence is easier to recall than a nonsensical A lock screen saves a lot match
of to a fingerprint, palm or even iris scan. Consider implementing biometrics to
Physical copies should be locked up in a secure location; to protect data as well: locks, If your location is known and being tracked by the phone in
if an extra layer of security.
storing electronic records thoroughly provide
combination of letters and numbers, and provides that all-important length to trouble in the long run. Even

Vacation Daze
digital information should be encrypted and kept under badge checks and confirming that erased. your pocket, then apps with that permission can access that
The Factor Families
make it harder to crack. your device is stolen, the attacker
strong passwords. personnel are authorized to Daryl Wentz data and follow you. Keep yourself hidden by turning
likely won’t know your password.
access the area. off your location data.
Enable encryption so
1V305Bz
1100101100101111010101011110111000101010101010101
jst4sm4llt0wngrl!lvnngn4l0nelyw0rld!!
0101010101010101010101010111111010000101011010101 What you know. What you have. What you are. Avoid password Sometimes you forget your privacy settings in your vacation that even if the lock screen
is subverted, the data is still
t00kth3mdnghttr4ng0ng4nwh3r3!!!_
1101101101010010101010101001110101010111011101011
daze. Change those settings and keep your info locked down, inaccessible.
011101110101010101011101010101011010101101010 theft by enabling multi-factor authentication.
and you won’t be vacationing in De Nile.
© 2019 Infosec. All rights reserved. A long password is a strong password. © 2019 Infosec. All rights reserved.

© 2019 Infosec. All rights reserved. © 2019 Infosec. All rights reserved.
© 2019 Infosec. All rights reserved.
© 2019 Infosec. All rights reserved.
© 2019 Infosec. All rights reserved.

Download Free Resources

© 2019 Infosec. All rights reserved.

Potrebbero piacerti anche