(Document Title) Notice: Version No. Date Type of Changes Owner/Author Date of Review / Expiry
(Document Title) Notice: Version No. Date Type of Changes Owner/Author Date of Review / Expiry
NOTICE
The information contained in this document is not to be used for any purpose other than the purposes for which this document is furnished by Genpact, nor
is this document (in whole or in part) to be reproduced or furnished to third parties or made public without the prior express written permission of Genpact.
Version Control
Version No. Date Type of Changes Owner/Author Date of review / expiry
2
Genpact Confidential
Information Security awareness training
• If an unauthorized user obtains your username and password, he/she can wreak havoc on
our system
• Denial of Service Situations
• Virus, worm, and Trojans could spread like wildfire across the networks, infecting large
numbers of PC’s
• As a employee, it is YOUR responsibility to actively insure the protection and proper use
of our information and technology assets.
• Each one of you plays a crucial role in security. Remember, it only takes one weak link to
break the chain
Your Role in protecting the Information Security
• Ensure that all employees are aware of and comply with the policies
• Ensure that all employees are required to undergo security trainings
• Maintain compliance with requirements specified by Data Owners, for handling of the
system data
•
Data Owner
• Data Owner –responsible for the policy and practice decisions regarding data
• Ensure that all data entered in the information system is valid and complies with data
standards
• Ensure that data classification is in place
• Ensure that all the users are aware of the data security guidelines in the organization
System Administrator
• Read and comply with all IT security program requirements defined in the organization
policies
• Report breaches of IT security, actual or suspected to the respective members
• Take reasonable steps to protect the security of IT systems and data to which they have
access
• Ensure that everyone has completed security awareness trainings
As you can see, everyone has a clearly defined and important role in security. We all have to
do our part. Know the policies! Know the standards! Know the risk!
We need to be successful in protecting our data 100% of the time. The hacker only needs to
succeed once!
Steps for securing the Infrastructure Assets
• When selecting a password, you may naturally want to choose something easy to
remember. But, if it is easy for you, it may be easy for some one else to crack!
• A password should not be:
• Your name or any family members name, to include pets!
• Your street name, car type, favorite singer, etc.
• Any easily guessed or recognized name or word
• Your previous password with a sequentially increased number at the end.
• A password should be:
• A mixture of letters (both upper and lower case) and numbers and/or special
characters
• At least eight characters long, preferably longer
• – for example iH8TDieTs is a very good password. It has capitals, lower case, and
numbers. AND…. It isn’t too tough to remember. Just say: I hate diets.
• A password should never be:
• …Taped to a monitor or keyboard or desk or desk accessory or any where visible
• …Shared with ANY ONE
• Enforce “need-to-know”
• Authenticate confidential access
• Encrypt vulnerable data
Email Usage
• Email Usage
• Email is the fastest, most-effective method of spreading malicious code to the largest
number of users. It is also a large source of wasted technology resources.
• Examples of Waste:
• Electronic Greeting Cards
• Chain Letters
• Jokes and graphics
• Spam and junk email
• Ensure that only legitimate emails are only read and opened
• Never open any unsolicited or suspicious mails
• Ensure that only attachments are opened only from the known or reliable sources
• Ensure that all mails and attachments from unknown sources are quarantined or scanned
before reading them
• Never open any chain mails or spam mails and if found route them to the security team
Licensing
• Software Licensing
• Backup of System
• Your PC, Your Data, Your Responsibility. If you don’t back it up, It’s your problem!
• Physical Security
• Common file storage can be provided on network storage devices so that users
can access the relevant data based on their permissions
• These devices must be protected and used prudently
• Only business or official data needs to be stored on the shared file storage
• Personal and un authorized data should not be stored in eh shared file storage
location
• Periodically shared file storage access reviews needs to be performed
• All the un approved data present if any should be deleted and employees needs
to be trained regarding the perils of storing the same
• Thank You
CONTACT INFORMATION
IT Team
EMAIL of IT Team
telephone number
www.genpact.com
© 2009 Copyright Genpact. All trademarks appearing herein belong to their respective owners.