Cyber Confidence in Defence

This month

Hooded person in background, with X over their eyes. Text 'Information Management'.

Information Management

Good information management is good security

Ever struggled to find the right file? Poor file naming and version control create confusion and security risks. Using clear, consistent naming conventions and managing versions effectively is crucial.

Think about it – a misplaced file could compromise sensitive information. Make sure your files are easy to find, and the correct version is being used. Good information management is good security.

Check Who Has Access

Do you know who has access to the files you are working on? Regularly reviewing file access and permissions is vital for security.

Ask yourself: does everyone on that list still need access? Removing unnecessary access reduces the risk of data breaches. Keep your information secure by regularly reviewing and updating access permissions. Contact iHub or your Local Security Officer for support.

Shared Drives and Network Folders

Shared drives and network folders are convenient, but they also present security risks. Regularly review the access and permissions on shared areas.

Are the permissions still appropriate? Outdated distribution lists can create vulnerabilities. Keep your shared areas secure by regularly reviewing and updating access permissions.

Security Is Everyone’s Responsibility

We're all in the data business, even if it's not in our job title. Protecting information isn't just the responsibility of the IT team; it's everyone's responsibility.

Good information management is a key part of our overall security posture. By following best practices, we create a more secure and efficient working environment. Let's all work together to protect our information.

For more information, visit the MOD Security & Resilience portal or Cyber Confident Defnet page or get in touch with the team at [email protected] or by clicking the button below!

Remember, the front line is you!

Cyber Sound Bytes Podcast

Image
Digital artwork for the Cyber Sound Bytes Podcast.

Cyber Sound Bytes

Want to know more about cyber security but it all seems too techy? Put your cyber security first and stay cyber smart with our Cyber Sound Bytes podcast.

Click below to find out more!