industrial grade security

Awareness of over-sharing in social media quizzes and similar: “your pet’s name followed by the name of the first street you ever lived in, is your gullible fool name!” Just don’t do it! All these kinds of questions are typically used to recover access to accounts in password resets, and should never be casually commented on in the public domain. How to secure personal devices appropriately, if they are used for business communications. Ringover’s range of apps is great for enabling BYOD working and supporting users to collaborate from anywhere via their favorite tools, but with this versatility comes some user responsibility, in managing those endpoints securely. Awareness of how to handle casual requests for information, about themselves, the business, or their customers. It is illegal to disclose personal information to a third party without a specific reason for doing so under relevant data protection law — so, no, you can’t confirm your boyfriend’s registered birthday so as to help someone plan a surprise treat. Understanding of how to verify requests for information, and confirm that enquirers are who they say they are.

This final point can be actively tested and mystery shopped, and this is a good way to put theory into practice and identify remediation training needs. For example, a caller says they are from the IT department and need to check your password, or your bank phones to confirm details of a recent transaction — how does the recipient respond?
More info: it engineering