Cybersecurity has been a buzzword across many industries over the last few years. As data is moved into the cloud, Operational (OT) and Information (IT) technologies merge creating an increase in the development of digital innovation along with the competitive nature of the global commodities market coupled with the fluctuation of geopolitical climates, this all contributes to an increase in destructive cyber-attacks and cyber espionage.
After spending 24 years in the Army watching technology develop and an increase of data and platforms that run every aspect of the military, we have all had to learn our place in keeping the personal, sensitive, and intelligence data stored on our computers and databases secure. Though the information and secrets that are on your computer may not jeopardize lives as it does in the military, it still jeopardizes your company’s bottom line, which affects your pay and job. Here are some security tips that you the end user can do to help your IT, IS personnel keep your systems secure.
Security tips everyone can follow
- Follow corporate specific guidance at all times.
- Proper password management, mix letters, numbers, and special characters. Do not use the same password for multiple things.
- Use caution when opening attachments or links.
- Never leave your computer unlocked or on when unattended.
- When your computer has updates (System or Anti-Virus) run the updates. Don’t let them pile up.
- Your social media says a lot about yourself, keep it secure and do not share information that could jeopardize you or your company. Do not share details of that project you are working on. A good corporate espionage expert can piece together information from multiple employees to find a ripe target to go after.
- Everyone is a target don’t be a victim!
With 2017 shaping up to be a huge year for the mining industry, there are a lot of companies that are integrating new technologies across all spectrums of their organizations. These technologies are becoming more and more interlocked with each other and becoming more complex. This has started a boom in IT and Information Security (IS) positions due to the mining industry being behind the power curve when it comes to cybersecurity. The question is what are you and your company doing to combat this data mining?