Podcast
Questions and Answers
What is a requirement for corporate laptops?
What is a requirement for corporate laptops?
What is a requirement for corporate smartphones?
What is a requirement for corporate smartphones?
How often should passwords be changed?
How often should passwords be changed?
What should users do if they suspect their password has been compromised?
What should users do if they suspect their password has been compromised?
Signup and view all the answers
What is a requirement for access to IT systems?
What is a requirement for access to IT systems?
Signup and view all the answers
What should be done when a user's access needs to be revoked or changed?
What should be done when a user's access needs to be revoked or changed?
Signup and view all the answers
What is a requirement for access to third-parties?
What is a requirement for access to third-parties?
Signup and view all the answers
What is a recommended security practice for mobile devices?
What is a recommended security practice for mobile devices?
Signup and view all the answers
What should be reviewed periodically for all users?
What should be reviewed periodically for all users?
Signup and view all the answers
What should be used to encrypt files with confidential data before sending them?
What should be used to encrypt files with confidential data before sending them?
Signup and view all the answers
What should be contacted when a user wants to install an application not included in the baseline configuration?
What should be contacted when a user wants to install an application not included in the baseline configuration?
Signup and view all the answers
What is the primary purpose of ESET Endpoint Protection?
What is the primary purpose of ESET Endpoint Protection?
Signup and view all the answers
What is the recommended storage location for corporate files?
What is the recommended storage location for corporate files?
Signup and view all the answers
What is the primary purpose of KeePass?
What is the primary purpose of KeePass?
Signup and view all the answers
What should be done when a user wants to uninstall or disable ESET Endpoint Protection?
What should be done when a user wants to uninstall or disable ESET Endpoint Protection?
Signup and view all the answers
What is the maximum storage capacity of a OneDrive account for personal files?
What is the maximum storage capacity of a OneDrive account for personal files?
Signup and view all the answers
What is the primary purpose of a firewall in a network?
What is the primary purpose of a firewall in a network?
Signup and view all the answers
What is the recommended method for sharing small data files (< 25MB) externally?
What is the recommended method for sharing small data files (< 25MB) externally?
Signup and view all the answers
What is the recommended approach to handle email attachments?
What is the recommended approach to handle email attachments?
Signup and view all the answers
What is the purpose of encrypting confidential data prior to sending it via email?
What is the purpose of encrypting confidential data prior to sending it via email?
Signup and view all the answers
What is the recommended approach to sharing confidential data via the same channel of communication?
What is the recommended approach to sharing confidential data via the same channel of communication?
Signup and view all the answers
What is the purpose of the IT Admin team authorizing devices that access the EXUS network?
What is the purpose of the IT Admin team authorizing devices that access the EXUS network?
Signup and view all the answers
What is the recommended method for sharing big data files (> 25MB) externally?
What is the recommended method for sharing big data files (> 25MB) externally?
Signup and view all the answers
What is the recommended approach to handling emails asking for personal information?
What is the recommended approach to handling emails asking for personal information?
Signup and view all the answers
Study Notes
Mobile Devices
- Corporate laptops are encrypted and pre-configured, with no changes allowed without prior IT approval.
- Corporate smartphones are password or PIN protected, pre-configured with EXUS Mobiles account, and have EXUS approved apps only.
- Personal smartphones should be password or PIN protected and have access to EXUS approved apps.
- Immediately report loss or theft of mobile devices to the IT Admin team.
Passwords
- Use a mixture of lower and uppercase letters, numbers, and symbols in passwords.
- Passwords must be at least 12 characters long and not contain usernames.
- Change passwords every 180 days and store up to 6 passwords in history.
- Use strong authentication (MFA/2-Way) whenever possible.
- Never use the same password for different accounts.
Access Management
- Users access only what they need to access, based on job position.
- Team Leads/Managers inform the IT Admin team of access changes or revocations.
- Access to third-parties is provided only based on contractual agreements.
- Access management is monitored through the EXUS Internal Helpdesk.
Encryption and Keys Management
- Corporate laptops are encrypted with BitLocker.
- Users must not disable encryption without prior contact with the IT Admin team.
- Passwords of systems and applications are managed with KeePass.
- Encrypt files with confidential data using 7zip prior to sending.
Endpoint Protection
- Corporate and private workstations and specific smartphones run ESET Endpoint Protection.
- ESET Endpoint Protection protects endpoints against malware, blocks malicious sites, and scans corporate email.
Systems Configuration and Changes Management
- Corporate workstations are delivered with a baseline configuration that must not be altered.
- Contact the IT Admin team for installing applications not included in the baseline configuration.
- Changes on IT systems are registered and monitored through Jira.
Data Backup
- Use SharePoint document library to store corporate files.
- Use OneDrive for backing up local personal files (max storage capacity is 10GB).
- Backup of IT infrastructure is based on a schedule.
Networks
- Firewall controls flow of incoming and outgoing network traffic.
- Use VPN connection (with 2FA) to access EXUS network remotely.
- EXUS network is segmented into VLANs (VPN and Infrastructure).
- IT Admin team authorizes devices that access the EXUS network.
Files Secure Transfer
- Use email to share small data files (< 25MB), encrypting confidential data before sending.
- Use SFTP to share big data files (> 25MB).
- Use SharePoint or OneDrive to share files with sensitive or confidential information.
Email Security
- Never include confidential data in email bodies.
- Always encrypt confidential data prior to sending via email (using 7zip).
- Set built-in email permissions to “Do Not Forward” or “Encrypt-Only” to encrypt whole email messages.
- Beware of emails asking for personal information and handle email with care.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
This quiz covers the security procedures for mobile devices in the EXUS IT environment, including laptops and smartphones. It outlines the configuration and usage guidelines for corporate devices.