The email Advisory | Information Security Training
Verified
Added on 2022/08/28
|4
|629
|16
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
The email Advisory Information security training This is an informative text regarding the training upcoming soon. The training will be touching on Advanced Technologies Inc. 's information security. As a general concept, information is what is conveyed by a particular sequence. Information can be electrical or physical. Information security, therefore, is the practice of preventing unauthorized infringement in the flow sequence of ideas conveyed. Information security ensures the prevention of unauthorized use, inspection, destruction, recording or access of information. This training is very important. It will highlight and remind each one in the Advanced Technologies Inc. company risks and threats around ever-advancing and evolving growth in information flow and cybersecurity. This also covers the need to know about deliberate moves by internal staff to illegally acquire companies’ sensitive information by any possible loopholes available and use to harm the firm. Availability, integrity, and confidentiality is the basic description of secure information. Misplaced Information or information falling into appropriate users’ hands contradicts basic description. This can lead to damage, misuse, stealing or even attacks hence a reiteration of the need of everyone in the organization knowing the risks and take appropriate action to ensure he/she doesn’t subject the firm to dangers and losses accrued with their action or inaction. The companies’ system can be secure enough but employees’ actions and inaction can be a major threat. There is the adoption ofNIST special publication 800-50 to help with the information security approach.For the case of action, the training will cover the essential actions on users to ensure each one knows their duties and possible outcomes. The training will also
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
notify trainees on possible actions by ATI on actions contravening the policies. On the other hand, inaction can also bring disaster to the firm. This includes careless handling of information and even writing sensitive information on sticky notes and leaving them unattended. There will be coverage on possible handling for safety. Crucial policies concerning data will be addressed. This includes; clean desk policy, social networking limits, Bring your own device policy(BYOD) and even data management. This will be a buildup on your perceived understanding of methods of ensuring security is upheld. Using strong passwords, logging out from emails and not leaving passwords in public computers is considered obvious knowledge you have. Training will touch on the roles and responsibilities of everyone. Although it is known that security is everyone’s responsibility, key persons hold special responsibilities to ensure good coordination of employees and IT security wings are in harmony. In the training managers, chief information officers and agency heads roles will be highlighted. In conclusion, it’s an essential training that will be reminding and informing everyone essential aspects of information security and their roles to play to achieve a secure and conducive working environment in Advanced Technologies Inc. DON’T MISS!!! The Bulletin Poster Critical messages
Did you know information security starts with you? The use of personal removable media on companies’ computers is prohibited. Do not download suspicious contents using companies’ computers Keep your desk clean always Comply with information security policies Do not open strange emails using the company’s network Do not share sensitive company’s information with unauthorized user Report any suspicious activity on information to IT security Ensure your own devices scanned and accepted before using the company’s network Always update your computer antivirus
The Presentation Information security awareness training.pptx