https://youtu.be/SIp8FMU1L8A
Introduction to Cybersecurity
Introduction to Cybersecurity

Cybersecurity Policies at ACME

Duplicate
Duplicate this video in your Synthesia account.
Full course
In this final lesson, we will cover best practices for protecting Acme's confidential data & tech infrastructure. Learn about data types, device security, password management, and safe data transfer methods. Follow these guidelines to keep our company's information secure.

In this final lesson, we will cover best practices for protecting Acme's confidential data & tech infrastructure. Learn about data types, device security, password management, and safe data transfer methods. Follow these guidelines to keep our company's information secure.

Video script

In this video, you will learn more about our cybersecurity policies. By acknowledging and following these policies, you are helping to protect your data and Acmes' technical infrastructure.

Examples of confidential data:

  • Classified financial information.
  • Customer data.
  • Data about partners.
  • Data about suppliers.
  • Patents, formulas or new technologies Device security.
  • Use of personal devices

Logging into any of the company's accounts using personal devices such as cell phones, tablets or laptops may pose a risk to our company's data. We discourage accessing company data from personal devices. If this is unavoidable, employees are required to keep their devices in a secure location where they cannot be accessed by others.

We recommend that you follow these best practices:

  • Keep the password of all electronic devices secure.
  • Log in to company accounts only through secure networks.
  • Install security updates regularly.
  • Update your anti-virus software regularly.
  • Never leave your devices unprotected or unsecured.
  • Lock your computers when you leave your desk

Manage your passwords To prevent your company account password from being hacked, follow these best practices for setting up passwords: - At least 8 characters (including upper and lower case letters, numbers and symbols).

  • Do not write down the password or leave it unprotected.
  • Do not share credentials that have not been requested or approved by your supervisor.
  • Change passwords every 3 months Data transfer Data transfer is one of the most common forms of cybercrime.

Follow these best practices when transferring data:

  • Avoid transmitting personally identifiable information, such as confidential customer and employee information.
  • Comply with the law on personal data protection.
  • Share data only through the corporate network

Follow all cybersecurity policies and procedures, even when working remotely. If you suspect that an email you received is a phishing attempt, contact your cybersecurity team immediately and wait for further instructions.

Recommended videos
See all examples