EXUS IT Security Procedures: Mobile Devices

TopsBagpipes avatar
TopsBagpipes
·
·
Download

Start Quiz

Study Flashcards

24 Questions

What is a requirement for corporate laptops?

They must be encrypted.

What is a requirement for corporate smartphones?

They must have EXUS approved apps only.

How often should passwords be changed?

Every 180 days

What should users do if they suspect their password has been compromised?

Change their password immediately

What is a requirement for access to IT systems?

Based on job position

What should be done when a user's access needs to be revoked or changed?

Inform the IT Admin team

What is a requirement for access to third-parties?

A contractual agreement

What is a recommended security practice for mobile devices?

Enable the Find My Device feature

What should be reviewed periodically for all users?

Users' access rights

What should be used to encrypt files with confidential data before sending them?

7zip

What should be contacted when a user wants to install an application not included in the baseline configuration?

IT Admin team

What is the primary purpose of ESET Endpoint Protection?

To protect endpoints against malware

What is the recommended storage location for corporate files?

Respective SharePoint document library

What is the primary purpose of KeePass?

To manage system and application passwords

What should be done when a user wants to uninstall or disable ESET Endpoint Protection?

Contact the IT Admin team

What is the maximum storage capacity of a OneDrive account for personal files?

10GB

What is the primary purpose of a firewall in a network?

To control the flow of incoming and outgoing network traffic

What is the recommended method for sharing small data files (< 25MB) externally?

Using email with 7zip encryption

What is the recommended approach to handle email attachments?

Open only email attachments from known sources

What is the purpose of encrypting confidential data prior to sending it via email?

To protect the data from unauthorized access

What is the recommended approach to sharing confidential data via the same channel of communication?

Share the minimum amount possible of confidential data

What is the purpose of the IT Admin team authorizing devices that access the EXUS network?

To restrict access to unauthorized devices

What is the recommended method for sharing big data files (> 25MB) externally?

Using SFTP

What is the recommended approach to handling emails asking for personal information?

Verify the authenticity of the email before responding

Study Notes

Mobile Devices

  • Corporate laptops are encrypted and pre-configured, with no changes allowed without prior IT approval.
  • Corporate smartphones are password or PIN protected, pre-configured with EXUS Mobiles account, and have EXUS approved apps only.
  • Personal smartphones should be password or PIN protected and have access to EXUS approved apps.
  • Immediately report loss or theft of mobile devices to the IT Admin team.

Passwords

  • Use a mixture of lower and uppercase letters, numbers, and symbols in passwords.
  • Passwords must be at least 12 characters long and not contain usernames.
  • Change passwords every 180 days and store up to 6 passwords in history.
  • Use strong authentication (MFA/2-Way) whenever possible.
  • Never use the same password for different accounts.

Access Management

  • Users access only what they need to access, based on job position.
  • Team Leads/Managers inform the IT Admin team of access changes or revocations.
  • Access to third-parties is provided only based on contractual agreements.
  • Access management is monitored through the EXUS Internal Helpdesk.

Encryption and Keys Management

  • Corporate laptops are encrypted with BitLocker.
  • Users must not disable encryption without prior contact with the IT Admin team.
  • Passwords of systems and applications are managed with KeePass.
  • Encrypt files with confidential data using 7zip prior to sending.

Endpoint Protection

  • Corporate and private workstations and specific smartphones run ESET Endpoint Protection.
  • ESET Endpoint Protection protects endpoints against malware, blocks malicious sites, and scans corporate email.

Systems Configuration and Changes Management

  • Corporate workstations are delivered with a baseline configuration that must not be altered.
  • Contact the IT Admin team for installing applications not included in the baseline configuration.
  • Changes on IT systems are registered and monitored through Jira.

Data Backup

  • Use SharePoint document library to store corporate files.
  • Use OneDrive for backing up local personal files (max storage capacity is 10GB).
  • Backup of IT infrastructure is based on a schedule.

Networks

  • Firewall controls flow of incoming and outgoing network traffic.
  • Use VPN connection (with 2FA) to access EXUS network remotely.
  • EXUS network is segmented into VLANs (VPN and Infrastructure).
  • IT Admin team authorizes devices that access the EXUS network.

Files Secure Transfer

  • Use email to share small data files (< 25MB), encrypting confidential data before sending.
  • Use SFTP to share big data files (> 25MB).
  • Use SharePoint or OneDrive to share files with sensitive or confidential information.

Email Security

  • Never include confidential data in email bodies.
  • Always encrypt confidential data prior to sending via email (using 7zip).
  • Set built-in email permissions to “Do Not Forward” or “Encrypt-Only” to encrypt whole email messages.
  • Beware of emails asking for personal information and handle email with care.

This quiz covers the security procedures for mobile devices in the EXUS IT environment, including laptops and smartphones. It outlines the configuration and usage guidelines for corporate devices.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser