The Top Ten Security Practices
May 2017
Knowledge is power. And, in this case, that power enables us to protect ourselves, our organizations, our families, and our friends. Check out our collection of top ten lists and see how they can be applied to your everyday life at work, at home, and on the go. Remember that each and every one of us has it in ourselves to be a strong human firewall and combat cybercrime.
- 2016 set an all-time high in data breaches with how many records exposed globally? (4 billion)
- A cyber thief spoofing the email of a high-level executive and requesting sensitive information is an example of what? (CEO Fraud or Business Email Compromise)
- If your Android phone is stolen, you can use this to remote erase your data. (Android Device Manager)
- If your iPhone is stolen, you can use this to remote erase your data. (Find My iPhone)
- By always doing this, everyone within our organization becomes a security asset and strengthens our resistance to cybercrime. (Following policy.)