In Part One of my blog series aimed at breaking down each section of Online’s security
As the world continues to become more interconnected, more and more of our communications are taking place electronically. I mean, when is the last time you actually wrote someone a letter? In doing so, our work and personal lives continue to become more intertwined and it’s easy to lose sight of what’s confidential (e-mails sent through a work account) versus what’s personal (e-mails sent through a personal account). With that said, and this should come as no surprise, it is of vital importance that you treat company information (heck, even your own sensitive information) in a way that keeps it reasonably protected.
All users must apply the right amount of security controls to the data they are communicating. Keep in mind that any company data is owned by the company and not by you, even if it happens to sit on the laptop or mobile device that you’re carrying around as we speak. Most organizations reserve the right to monitor and review any message sent, created, or received by you through company accounts. This is not a ‘big brother’ thing – if you are using company resources, company data, or company systems (including e-mail), then any company practicing proper due diligence ought to reserve this right.
If you are using company e-mail and other messaging systems, remember that anything you write via email, even if it was intended to go to just one recipient, could end up in the hands of many people (have you ever hit ‘reply all’ by mistake?) or worse yet, in the hands of competitors or rogue states. You have to always be careful about what you write, not only on company resources, but even on your personal e-mail/social media. Windows is not just an Operating System – in the world of interconnectivity, we all live in glass houses.
What does this mean for me?
Many of us are technologists at heart and we are interested in the next awesome tool to allow us to do more with less. That said, do not be the first one to attempt using new tools, platforms, SAAS solutions, etc., without conferring with your security team - It only takes one well-intentioned but badly executed move to put the entire company in jeopardy.
In my next blog, I will be covering the acceptable use portion of security policies.
Are you looking for guidance on creating or reviewing your organization’s security policies? Feel free to reach out to me directly or leave a comment below.