Research conducted by American experts in the field of data security and computer systems indicates that over 80% of threats in the IT system are generated by its users. The FORDATA team is aware that even well-secured infrastructure has no chance against any infection resulting from human error. That is why at FORDATA we pay special attention to safety policy and each employee knows and complies with applicable safety rules perfectly.
10 golden rules for Employee safety
- Report information security incidents ASAP
- Protect FORDATA information (ensure its confidentiality, integrity and availability)
- Make information public with permission from:
Commissioner for Information Security
Owner of Appropriate Resources - Follow the clean desk, screen and printer rule
# delete saved flipcharts after meetings
# lock the computer screen after leaving the desk - When working remotely, remember to:
# lock your computer during breaks and not leave it unattended
# secure your home internet network and not share your company computer with third parties
# avoid working in public places where there is a high risk of disclosure - You are personally responsible for the confidentiality of all access passwords to IT systems
# recommended password consists of min. 8 characters: including 1 lowercase a, 1 uppercase A, 1 digit and a special character
# password is periodically changed (at least once every six months) - Observe the safety rules when using e-mail:
# do not open letters and attachments that may contain a virus
# don’t post harmful or offensive content via email - Use only the FORDATA network. Protect FORDATA electronic media
# delete outdated data and keep current data with due care
# in case the data cannot be deleted from the medium, mechanically destroy it - Back up to FORDATA external disk
- Use a laptop and FORDATA mobile devices, you may use them only to perform your business tasks
# use systems and applications that increase the security of processed information
# when using mobile devices (phones, smartphones, tablets), use anti-virus software
Did you like the article?
How many heads, so many ideas. That's why each of us contributes to making the content on our blog attractive and valuable for you. Discover a source of knowledge and inspiration for your business with Fordata.
Do you want to exchange knowledge or ask a question?
Write to me : #FORDATAteam page opens in new window
Reach the new level of information security
SUBSCRIBE US SUBSCRIBE US-
01 . Safe alternative to Dropbox in Due Diligence
Why should I pay for VDR when I can use Dropbox?’ – our clients ask this question sometimes. Yet the answer is not that straight…
26.01.2024
-
02 . Can Microsoft One Drive or Google Drive replace VDR?
Can Microsoft’s and Google’s Drive replace VDR? Popular storage clouds are convenient but can they provide the same level of security?
29.12.2023
-
03 . VDR in due diligence process
M&As are a permanent element of the economic world. Their goal is to achieve strategic and financial benefits by expanding markets, diversifying products and production processes.
27.05.2023
-
04 . Cloud data encryption - what to know before choosing a provider?
Technically and practically speaking, all popular cloud-based tools are securely encrypted. In fact, this means that we do not have to worry about the problem of data encryption…
22.08.2022
-
05 . Cybersecurity - what should companies pay attention to?
Entrepreneurs today look at remote work without fear, although many could not imagine effective work outside the office earlier this year. The pandemic proved that…
30.09.2020
-
06 . Flexible office - how to respond to new needs?
Companies have returned to offices with new needs. Entrepreneurs are starting to look for flexible rental models thanks…
24.08.2020
-
07 . Are your email attachments safe?
The modern office cannot function without email. According to the Radicati group, a statistical employee receives 121 messages per…
02.03.2020
-
08 . How to black out text in a PDF document correctly?
Document redaction has many faces – it may turn out that overwriting of the text in our document, which at first glance looks…
27.02.2020
-
09 . Safe cloud and the user - a marriage of convenience
According to a report on cloud computing prepared by McAfee, up to 87% of the companies surveyed believe that…
03.02.2020
-
10 . Dropbox security - what should your business know?
Dropbox makes collaboration and sharing of documents easier but is the platform secure enough for our company to process confidential information with it? What to…
18.10.2019
-
11 . Fake software aggregators – how to identify them?
Fake software aggregators and Virtual Data Room industry. See how developers try to deceive their customers with fake software comparison websites.
14.08.2019
-
12 . Cloud Data Storage And File Security
The internet has become a common thing in companies’ lives. The enormity of dedicated services, fast transfers and increasing mobility…
31.07.2019
-
13 . FORDATA wins the 2019 Premium Usability and Rising Star Award
FORDATA has earned the prestigious 2019 Premium Usability and Rising Star Award from FinancesOnline, a popular B2B software…
30.04.2019
-
14 . Due Diligence audit using Virtual Data Room - security in your company
The process of sharing confidential information can be greatly improved by using Virtual Data Room. Preparing for an audit?
14.01.2019
-
15 . What is electronic data repository?
What is electronic data repository and why to use it? Maybe you already do? Read about the features and advatnages of a good online repository.
04.12.2018
-
16 . FORDATA recognized with 2 IT Security Software Awards!
FORDATA got Two Awards through a renowned organization FinancesOnline, a fastest growing independent review platform.
01.02.2018
-
17 . Virtual Data Room: Everything you need to know
What is a virtual data room? What benefits can we achieve by using the system in merger and acquisition transactions?
25.10.2017
-
18 . GPG standard - a word on encrypting confidential data
Some users want it 101% safe. If the files we share via cloud services really need that extra layer of protection, encrypting them with a GPG standard might be a good idea.
13.07.2016
-
19 . How can we help you with Due Diligence?
Time plays a major role in M&A transactions. Even the smallest improvement that saves time needed to prepare and perform Due Diligence…
10.03.2014