Nilex is a leader in the geosynthetics
industry providing innovative solutions
1.800.667.4811
NILEX.COM
Roads & Rail
Containment
MSE Walls & Slopes
Water Management
Erosion & Sediment Control
Failure to follow these policies could put your organization at a high level
of risk and cost. An example of this is “shadow-IT,” where systems and services
are setup by non-IT employees that ignore standards and guidelines
established by the business.
Stay alert
Be consciously aware of what is normal or acceptable in your business’s
operations. Talk to your co-workers about unusual things you experience
while online – whether at work or at home. Anything out of the ordinary
should be acknowledged and investigated/addressed.
When travelling, make sure to avoid public discussions regarding confidential
business – online and in person – and watch for people trying to
read documents off your device’s screen. When logging onto your corporate
network in a public place, ensure you protect your login information
and avoid public Wi-Fi. All these incidents could lead to a security breach
at your organization.
Be suspicious
Treat every new email as an “unknown” until you can determine they are
from a known contact or entity. Check the time it was sent; if it was sent
during non-business hours, be careful. Watch out for links sent in emails.
Always hover over them to make sure the link is taking you to where
you expect.
Every email or phone contact should be treated as suspicious if you are
not expecting it. If you don’t trust the information, then call the person or
business using a known phone number (not the one in the email or the one
they give you as this could be a direct link to the criminal).
Continuous improvement
An effective Human Firewall requires ongoing education to support proactive,
habit-forming behaviour and to create awareness about new tactics
and threats.
The new tips and techniques learned from security awareness training
should be put into practice to effectively ward off criminals and their attempts
to compromise security layers.
For more information, go to www.src.sk.ca/blog.
SASKATCHEWAN RESEARCH COUNCIL
Watch out for links
sent in emails.
Always hover over
them to make sure
the link is taking you
to where you expect.
40 | Quarter 2 2020 | saskheavy.ca
/blog
/NILEX.COM
/blog
/saskheavy.ca