Hints

Awa­re­ness Hints

11 tips for fast ISO 27001 certification

We would like to provide valuable tips for the implementation of ISO 27001 for all companies that are aiming for certification. The ISO 27001 standard describes the requirements of an information security management system (ISMS), which also includes having a person responsible for information security. This person is often called the information security officer [...]

By |2022-11-06T09:38:55+01:0008.11.2021|Blog EN, Hints, ISMS tools|

Tip #5: Clear Desk Policy

Clear Desk Policy: Unprotected documents at the workplace can very easily be viewed or copied by unauthorized persons in your absence. Therefore, keep sensitive documents in a secure lockable location while you are away. If you work with internal or confidential data, you need an access system at the office door and a lockable box [...]

By |2022-11-06T10:02:22+01:0002.04.2017|Hints|

Tip #4: Cau­ti­on Social Engineering

Social engineering exploits human behavior such as helpfulness or respect for authority to obtain confidential information. When communicating with unknown people, be careful what information you disclose. Places and media used for social engineering: public transportation at the lunch table at business events in the company parking lot by telephone by e-mail online surveys through [...]

By |2022-11-06T10:02:29+01:0002.04.2017|Hints|

Tip #3: Always super­vi­se visitors

The entry of visitors or guests without supervision poses a risk to the protection of information. Always pick up visitors from the doorman and escort them while they are in the company. If there are guest badges, ask your visitors to wear them, especially if they are allowed to move freely around the company. Do [...]

By |2022-11-06T10:02:36+01:0002.04.2017|Hints|

Tip #2: A sti­cky note is no place for passwords

Sticky notes or Post-it's® are not a suitable place for the permanent storage of passwords. Any password written down allows identity theft and subsequently unauthorized access to information. Therefore, keep your passwords in a safe place. Even if it is difficult in everyday life, access codes should not be written down here: Post-it's® notebooks the [...]

By |2022-11-06T10:02:46+01:0002.04.2017|Hints|

Tip #1: Think befo­re you click!

Fake emails are used to spread malware and trick recipients into revealing sensitive information. Do not fall into the trap and be skeptical of unknown senders. Hence the advice to "Think before you click!". Typical deceptions that can cause harm by a click / click: Letter from the bank to update the account data, for [...]

By |2022-11-06T10:02:54+01:0002.04.2017|Hints|
Go to Top