Information Security Policies⚓︎
General Cybersecurity Guidelines⚓︎
- Limit the use of company technology to work purposes.
- Only respond to emails and other forms of communication that are from a trusted party.
- Verify the sender of emails to prevent phishing and report as spam when found.
Email Spoofing
Phishing attempts will often spoof the email address of a known contact in an effort to trick you. Notice how the email address doesn't match the name displayed in the image below.
- Never click on suspicious links when using a company device.
- Report suspicious behavior to your management and Bitstream.
Example
A visitor attempting to connect to a network wallplate or using a company device.
Access Controls⚓︎
- Access to Main Distribution Frames and Intermediate Distribution Frames (i.e. Network Racks) is prohibited. Staff may only interact with the network equipment at the instruction of Bitstream.
- Access to computers, printers, and mobile devices is restricted to employees.
- The use of Credit Card terminals is restricted to users that have been trained and authorized to use them.
- All user accounts are limited user accounts. Administrator privileges must be provided by Bitstream on an as-needed basis.
- Visitors must be monitored and not permitted to interact with computers or network equipment.
- All computers and network devices, with the exception of mobile devices, are to remain on company property at all times.
Passwords⚓︎
- Passwords must be no less than 7 characters
- Passwords must contain letters and numbers
- Passwords must be changed every 90 days
- Avoid the reuse of any of the previous 4 passwords
- Change your password if you suspect it has been exposed
- Don't give your password to outside parties
Be sure to read our additional IT policies and procedures