clean desk policy

Lock before you walk

For all the sophisticated techniques hackers use to access sensitive data, there are some really simple steps you can take to protect yours: namely, keep your desk clean! 

In the info security biz this is called a “clean desk policy” and it’s exactly what it sounds like:

  1. Clean your desk. At the end of each day or if leave your workstation, remove all papers from view and lock up confidential information in a desk drawer or filing cabinet....
Read More
data breach

There's been a breach? Now what?

Data breaches happen. Just last week, the livestreaming video game site Twitch reported a massive data leak that included the platform’s source code, as well as payments made to thousands of streamers. Awkward.

...

Read More
Phishing image

So, about those phishing tests…

As you may already know, every so often, ITS throws a phishing test into the wild to see what happens. Sometimes, the WCM community is quick to identify a phishing attempt and doesn’t click on any links that look suspicious. Other times… well…

 

...
Read More