Skip to content

Information Security Policies⚓︎

General Cybersecurity Guidelines⚓︎

  • Limit the use of company technology to work purposes.
  • Only respond to emails and other forms of communication that are from a trusted party.
  • Verify the sender of emails to prevent phishing and report as spam when found.

Email Spoofing

Phishing attempts will often spoof the email address of a known contact in an effort to trick you. Notice how the email address doesn't match the name displayed in the image below.

  • Never click on suspicious links when using a company device.
  • Report suspicious behavior to your management and Bitstream.

Example

A visitor attempting to connect to a network wallplate or using a company device.

Access Controls⚓︎

  • Access to Main Distribution Frames and Intermediate Distribution Frames (i.e. Network Racks) is prohibited. Staff may only interact with the network equipment at the instruction of Bitstream.
  • Access to computers, printers, and mobile devices is restricted to employees.
  • The use of Credit Card terminals is restricted to users that have been trained and authorized to use them.
  • All user accounts are limited user accounts. Administrator privileges must be provided by Bitstream on an as-needed basis.
  • Visitors must be monitored and not permitted to interact with computers or network equipment.
  • All computers and network devices, with the exception of mobile devices, are to remain on company property at all times.

Passwords⚓︎

  • Passwords must be no less than 7 characters
  • Passwords must contain letters and numbers
  • Passwords must be changed every 90 days
  • Avoid the reuse of any of the previous 4 passwords
  • Change your password if you suspect it has been exposed
  • Don't give your password to outside parties

Be sure to read our additional IT policies and procedures

Feeling lost? We're here to help.