• Asignatura: Inglés
  • Autor: valevega30garzon
  • hace 8 años

recomendaciones o sugerencias para el uso correcto de las TIC (usar modales) en ingles

Respuestas

Respuesta dada por: samadymoreno789
0

Respuesta:

For people

1. Make regular backups, using the storage media provided by the organization.

2. Close the work session when you are not using the device.

3. Use double or triple factor authentication when making financial transactions.

4. Have an adequate space for teleworking, where there is no risk of losing information due to equipment damage, for example, from food handling.

5. Do not send files with information on the organization through unofficial means such as WhatsApp, Dropbox, Wetransfer or free domain emails, among others.

6. Optimize the use of the Internet and prioritize work activities at established times so that you do not suffer service falls.

7. Do not connect the cell phone to unknown USB ports and do not accept any link via USB without ensuring that the connection is reliable.

For businesses

1. Activate multi-factor authentication (it is a method in which a user is granted access to the system only after they present two or more different proofs of who they say they are) in email accounts and tools in order to confirm the identity of who agrees.

2. If you must enable any service facing the Internet, first assess the risk before carrying out the activity: that contingency actions do not affect data security.

3. Keep your operating system updated with the latest manufacturer-released security patches on all your devices.

4. Install and keep up-to-date antivirus software from a reputable manufacturer to prevent virus or malicious software infections on your computers.

5. Implement storage solutions like Onedrive and corporate Google Drive to save your collaborators' files.

6. Perform permanent monitoring of the infrastructure of the services used by employees who work from home, in order to analyze possible unauthorized actions.

7. Generate backup policies to avoid loss of information.

8. Implement encryption policies on computers, servers and transactional tools in order to maintain the protection of information.

9. Making use of device protection tools allows a comprehensive and centralized management of the company's security policy locally on employee devices.

Explicación:

Preguntas similares