Subscribe Now

* You will receive the latest news and updates on the Canadian IT marketplace.

Trending News

Blog Post

Seven common information security myths

Seven common information security myths 

Only 31 per cent of the Canadian C-Suite provides security training more than once a year, while 39 per cent of small business owners report never training employees at all. This means Canadian employees don’t know how to stay compliant with their industry’s legal requirements for the storage and destruction of confidential information.

“Without training and education on how to safely manage, store and destroy confidential information employees may be unaware of their responsibilities and how their actions can open their business or customers to fraud,” said Andrew Lenardon, Global Director at Shred-it International. “Businesses need to help their teams become more aware of the risks associated with mishandling confidential information to avoid penalties, fines or damages to their reputation caused by poor information security practices.”

Myth 1: Erasing data from a hard drive completely removes the information.

Fact: Confidential information must be removed and destroyed before the device is resold, recycled or disposed.

Myth 2: It is safe to dispose of confidential information, as long as the paper is torn into little pieces.

Fact: Employees must be careful to not leave torn paper in an unsecure bin, where it could be pieced back together. Companies should implement locked disposal consoles and establish a policy to discern what is and is not confidential.

Myth 3: You can confidentially enter personal information on a website if you recognize the source or the sender that sent you the link.

Fact: Business and personal information should never be entered into a link received by email. Instead, employees should type the website in directly or navigate to it using bookmarks.

Myth 4: You can use your own smart phone or another device at work, as long as it is password protected.

Fact: All devices should be encrypted to protect confidential information. Bring your own device (BYOD) policies and programs should be in place to protect the pathway between personal and corporate systems.

Myth 5: Keeping material on the desk at work is safe.

Information left on a desk is vulnerable to snooping and data theft. A Clean Desk policy will ensure that all documents are stored in locked filing cabinets so that they remain secure even when the employee is not at their desk.

Myth 6: Messages on smartphones and laptops are private.

Visual hacking can still occur through prying eyes. Organizations should implement privacy screens for all devices.

Myth 7: Public Wi-Fi is safe if it is password protected.

Data thieves and hackers can still infiltrate public Wi-Fi. Use only trusted networks for work purposes.

Source: Shred-it Resource Centre

Related posts