{"id":16528,"date":"2023-10-11T15:44:16","date_gmt":"2023-10-11T15:44:16","guid":{"rendered":"https:\/\/businessadapter.es\/information-security-decalogue\/"},"modified":"2024-12-11T10:44:30","modified_gmt":"2024-12-11T10:44:30","slug":"information-security-decalogue","status":"publish","type":"post","link":"https:\/\/businessadapter.es\/en\/information-security-decalogue\/","title":{"rendered":"Information Security Decalogue"},"content":{"rendered":"\n<h1><span style=\"color: #800000;\"><strong>Information Security Decalogue<\/strong><\/span><\/h1>\n<p style=\"text-align: justify;\"><strong>Information security<\/strong> in the workplace is of vital importance to protect personal data, ensure the confidentiality of corporate information and maintain the integrity of systems.<\/p>\n<p>We remind you that a <a href=\"https:\/\/businessadapter.es\/en\/do-you-know-what-to-do-in-the-event-of-a-security-breach\/\">security breach<\/a>, in addition to jeopardizing the continuity of any business, can have serious reputational effects and penalties.<\/p>\n<p>The following is a list of <strong>best practices for employees and companies in information security<\/strong>:<\/p>\n<h2><span style=\"color: #800000;\"><strong>Best Practices for Employees<\/strong><\/span><\/h2>\n<h3><strong>Secure passwords:  <\/strong><\/h3>\n<p>Use strong passwords with 14 characters combining uppercase, lowercase, numbers and special characters (\u00bf = % &amp;).<\/p>\n<p>Change it at least twice a year.<\/p>\n<p>Do not share or write down your passwords in visible places.<\/p>\n<h3><strong>Two-factor authentication (2FA):<a href=\"https:\/\/businessadapter.es\/en\/\"><img decoding=\"async\" class=\"wp-image-11775 alignright\" src=\"https:\/\/businessadapter.es\/wp-content\/uploads\/2023\/04\/castle-1419280_1920-300x200.jpg\" alt=\"\" width=\"645\" height=\"430\" srcset=\"https:\/\/businessadapter.es\/wp-content\/uploads\/2023\/04\/castle-1419280_1920-300x200.jpg 300w, https:\/\/businessadapter.es\/wp-content\/uploads\/2023\/04\/castle-1419280_1920-1024x683.jpg 1024w, https:\/\/businessadapter.es\/wp-content\/uploads\/2023\/04\/castle-1419280_1920-768x512.jpg 768w, https:\/\/businessadapter.es\/wp-content\/uploads\/2023\/04\/castle-1419280_1920-1536x1024.jpg 1536w, https:\/\/businessadapter.es\/wp-content\/uploads\/2023\/04\/castle-1419280_1920-900x600.jpg 900w, https:\/\/businessadapter.es\/wp-content\/uploads\/2023\/04\/castle-1419280_1920-scaled.jpg 1200w\" sizes=\"(max-width: 645px) 100vw, 645px\" \/> <\/a><\/strong><\/h3>\n<p>Enable <a href=\"https:\/\/businessadapter.es\/riesgos-de-una-contrasena-debil-y-soluciones-practicas\/\">two-factor<\/a> authentication whenever possible to add an additional layer of security.<\/p>\n<h3><strong>Security education:  <\/strong><\/h3>\n<p>Participate in <a href=\"https:\/\/businessadapter.es\/servicios\/proteccion-de-datos\/formacion-proteccion-datos-valencia\">training<\/a>, awareness and sensitization <a href=\"https:\/\/businessadapter.es\/servicios\/proteccion-de-datos\/formacion-proteccion-datos-valencia\">programs<\/a> on information security and data protection, to be aware of threats and best practices.<\/p>\n<h3><strong>Device protection:  <\/strong><\/h3>\n<p>Keep the software of your PC and mobile devices up to date.<\/p>\n<p>Use antivirus and firewall software and make sure they are always up to date.<\/p>\n<h3><strong>Secure use of e-mail:  <\/strong><\/h3>\n<p>Be careful when opening e-mails, especially if they contain attachments or unknown links.<\/p>\n<h3><strong>Safe navigation:  <\/strong><\/h3>\n<p>Avoid unsafe websites and do not click on suspicious links.<\/p>\n<h3><strong>Cleaning policy:  <\/strong><\/h3>\n<p>Clear personal and confidential data from your desktop and screen before you leave your workstation.<\/p>\n<h3><strong>Backup copies:<\/strong><\/h3>\n<p>Ask your IT department if there is a backup policy and if your information can be restored in the event of a security breach.<\/p>\n<p>If necessary, request authorization for regular backups of your important files and store them securely (password-protected external devices or authorized cloud servers).<\/p>\n<h3><strong>Security breach reporting:  <\/strong><\/h3>\n<p>If you observe suspicious activity or believe you have been the victim of an attack, notify the company&#8217;s IT or security department immediately.<\/p>\n<h3><strong>Security policy:<\/strong><\/h3>\n<p>Know and follow your company&#8217;s security policies.  <\/p>\n<h2><span style=\"color: #800000;\"><strong>Best practices for the Company<\/strong><\/span><\/h2>\n<h3><strong>Security policies:  <\/strong><\/h3>\n<p>Approve and enforce clear and effective information security policies, and ensure that all employees know and follow them.<\/p>\n<p>If you need help in developing security policies, <a href=\"https:\/\/businessadapter.es\/en\/\">ask experts for help<\/a>.<\/p>\n<h3><strong>Data protection:<\/strong><\/h3>\n<p>Adapt your company to comply with the Data Protection Regulation, through <a href=\"https:\/\/businessadapter.es\/en\/\">expert advice<\/a>.<\/p>\n<p>Properly classifies and protects sensitive and confidential data.<\/p>\n<h3><strong>Controlled access:<\/strong><\/h3>\n<p>Limits access to systems and information to employees who need it to perform their duties.<\/p>\n<p>Forces employees to change passwords at least quarterly.<\/p>\n<h3><strong>Software updates:<\/strong><\/h3>\n<p>Keep all systems and software up to date with the latest security patches.<\/p>\n<h3><strong>Network security:<\/strong><\/h3>\n<p>Secures the company&#8217;s network with firewalls, intrusion detection systems and other security measures.<\/p>\n<h3><strong>Contingency and recovery:<\/strong><\/h3>\n<p>Develop a disaster recovery plan and perform regular backups.<\/p>\n<h3><strong>Security education:<\/strong><\/h3>\n<p>Provide <a href=\"https:\/\/businessadapter.es\/servicios\/proteccion-de-datos\/formacion-proteccion-datos-valencia\">information security and data protection training<\/a> to employees and keep them updated on current threats.<\/p>\n<h3><strong>Policy updates:<\/strong><\/h3>\n<p>Review and update information security policies as threats and technologies evolve. As well as when significant changes occur at your information system or corporate level. <\/p>\n<h3><strong>Response to security breaches:  <\/strong><\/h3>\n<p>Prepare an incident response plan to effectively address any <a href=\"https:\/\/businessadapter.es\/brechas-violaciones-de-seguridad\/\">security breaches<\/a> that occur.<\/p>\n<h3><strong>Cybersecurity and Information Security Auditing:  <\/strong><\/h3>\n<p>Make sure your company has sufficient measures in place. Implement monitoring and auditing systems to detect unusual or malicious activity on the network. <\/p>\n<h5>As a Business Adapter\u00ae customer, you get a <span style=\"color: #800000;\">FREE<\/span> audit<strong>. <\/strong> <\/h5>\n<h5>Request it by email: <a href=\"mailto:info@businessadapter.es,%20\">info@businessadapter.es, <\/a> you can also call <a href=\"http:\/\/tel.961318804\">96 131 88 04<\/a>, or leave your message in this form:<\/h5>\n<p> <\/p>\n<p><strong>[su_button url=&#8221;https:\/\/businessadapter.es\/contacto&#8221; target=&#8221;blank&#8221; background=&#8221;#f6f903&#8243; color=&#8221;#181818&#8243; size=&#8221;7&#8243; center=&#8221;yes&#8221; icon_color=&#8221;#000000&#8243;]Contact us, we will be pleased to help you.[\/su_button]<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information Security Decalogue Information security in the workplace is of vital importance to protect personal data, ensure the confidentiality of [&hellip;]<\/p>\n","protected":false},"author":1373,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[75],"tags":[82,88,83,94],"class_list":["post-16528","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-compliance-with-lopd-and-rgpd","tag-cybersecurity","tag-security-measures","tag-workers"],"_links":{"self":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/posts\/16528","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/users\/1373"}],"replies":[{"embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/comments?post=16528"}],"version-history":[{"count":1,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/posts\/16528\/revisions"}],"predecessor-version":[{"id":16530,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/posts\/16528\/revisions\/16530"}],"wp:attachment":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/media?parent=16528"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/categories?post=16528"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/tags?post=16528"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}