Knowledge Sharing - Computer Security
Knowledge Sharing - Computer Security
System
Security
1. Limit employees' access to only the specific resources they need to do their jobs;
train new employees and contractors on security awareness before allowing them to access
the network.
2. Incorporate information about unintentional and malicious insider threat awareness into
regular security training.
3. Set up contractors and other freelancers with temporary accounts that expire on specific
dates, such as the dates their contracts end.
4. Implement two-factor authentication, which requires each user to provide a second piece
of identifying information in addition to a password.
5. Install employee monitoring software to help reduce the risk of data breaches and the
theft of intellectual property by identifying careless, disgruntled or malicious insiders.
In phishing attacks, hackers attempt to get users to take some recommended action,
such as clicking on links in emails that take them to fraudulent websites that ask for
personal information or install malware on their devices. Opening attachments in
emails can also install malware on users' devices that are designed to harvest sensitive
information, send out emails to their contacts or provide remote access to their
devices.