Nilex is a leader in the geosynthetics  
 industry providing innovative solutions  
 1.800.667.4811 
 NILEX.COM 
 Roads & Rail 
 Containment 
 MSE Walls & Slopes 
 Water Management  
 Erosion & Sediment Control 
 Failure to follow these policies could put your organization at a high level  
 of risk and cost. An example of this is “shadow-IT,” where systems and services  
 are setup by non-IT employees that ignore standards and guidelines  
 established by the business. 
 Stay alert 
 Be consciously aware of what is normal or acceptable in your business’s  
 operations. Talk to your co-workers about unusual things you experience  
 while online – whether at work or at home. Anything out of the ordinary  
 should be acknowledged and investigated/addressed. 
 When travelling, make sure to avoid public discussions regarding confidential  
 business – online and in person – and watch for people trying to  
 read  documents off your device’s screen. When logging onto your corporate  
 network in a public place, ensure you protect your login information  
 and avoid public Wi-Fi. All these incidents could lead to a security breach  
 at your organization. 
 Be suspicious 
 Treat every new email as an “unknown” until you can determine they are  
 from a known contact or entity. Check the time it was sent; if it was sent  
 during non-business hours, be careful. Watch out for links sent in emails.  
 Always  hover  over  them  to  make  sure  the  link  is  taking  you  to  where  
 you expect. 
 Every email or phone contact should be treated as suspicious if you are  
 not expecting it. If you don’t trust the information, then call the person or  
 business using a known phone number (not the one in the email or the one  
 they give you as this could be a direct link to the criminal). 
 Continuous improvement 
 An effective Human Firewall requires ongoing education to support proactive, 
  habit-forming behaviour and to create awareness about new tactics  
 and threats. 
 The new tips and techniques learned from security awareness training  
 should be put into practice to effectively ward off criminals and their attempts  
 to compromise security layers.  
 For more information, go to www.src.sk.ca/blog. 
 SASKATCHEWAN RESEARCH COUNCIL 
 Watch out for links  
 sent in emails.  
 Always hover over  
 them to make sure  
 the link is taking you  
 to where you expect. 
 40  |  Quarter 2 2020  |  saskheavy.ca 
 
				
/blog
		/NILEX.COM
		/blog
		/saskheavy.ca