Advanced Search
Search Results
16 total results found
New Page
Insert Archive Lotus Notes
If you had an archive of your mails while using the IBM Lotus Notes application, even if there were multiple databases, you can import those files into Outlook Exchange. DIA has already copied all archives on the computers the last few weeks and converted them...
Strong Passwords Everywhere
Using weak or reused passwords (even on personal accounts) can expose your work accounts. Don’t reuse your work password anywhere else Use long, unique passwords or a password manager Enable Multi-Factor Authentication (MFA) Change your Network Login Password...
Think Before You Click (Phishing Awareness)
Phishing emails don’t just target work emails—they often start in personal inboxes. Be cautious with links and attachments (e.g. don't open an invoice if you hadn't bought anything) Verify senders before responding (hover your mouse on the sender's e-mail to ...
Secure Your Devices (Work & Personal)
Your personal phone or laptop can be a gateway into our work systems. Always lock your devices, even at home Keep software and apps updated (DIA updates all computers via WSUS) Install apps only from trusted sources on home computer/laptop Only DIA (with Mana...
Use Safe Networks
Public or unsecured Wi-Fi is a major risk—especially if you access work systems. Avoid logging into work accounts on public Wi-Fi (they're usually open and free) Use VPN as much as possible when not at work or home Secure your home Wi-Fi with a strong passwor...
Be Careful What You Share Online
Social media can reveal more than you think. Don’t share work-related information publicly Be mindful of photos, badges, QR-codes or screens in the background Avoid posting travel/work absences Departments can request blocking of social media use at work for ...
Be Careful with USB Devices & External Media
Unknown USB drives or external devices can carry hidden malware. Never plug in unknown USB drives (even if found or gifted) Only use approved devices from your IT department Scan external media before opening files 👉 A single infected USB can compromise an e...
Protect Sensitive Information (Data Handling)
Careless handling of information—at work or home—can lead to serious breaches. Don’t store work files on personal devices or cloud accounts Avoid printing sensitive documents unless necessary Always log out of shared or public computers 👉 Data leaks can dama...
Keep Work and Personal Use Separate
Mixing personal and work activities increases risk. Don’t use work email for personal registrations (or even your payslip) Avoid logging into personal accounts on work devices Use separate browsers or profiles if needed 👉 A compromised personal account can b...
Report Incidents Immediately
Delaying reporting can make a small issue much worse. Report suspicious emails, links, or activity right away (contact your Funtioneelbeheerder or superior) Don’t try to fix security issues yourself, you might make it worse, don't reply. Report even if you’re...
Stay Aware & Keep Learning
Cyber threats are constantly evolving; awareness is your best defense. Stay updated with IT guidelines and training Stay alert for new types of scams (AI, deepfake, SMS phishing, etc.) Learn from real incidents shared within your organization Pay attention to...
Lock Your Screen When Away
It only takes seconds for someone to access your computer. Always lock your screen (CTRL-ALT-DEL) when leaving your desk Don’t leave devices unattended in public or shared spaces Lock your screen even in “trusted” environments (colleagues, offices) Be cautiou...
Be Careful with File Sharing
Sharing files the wrong way can expose sensitive information. Use approved platforms for sharing work documents Double-check recipients before sending emails Avoid “reply all” when sharing sensitive information Never send sensitive files via personal email or...
Watch for Social Engineering
Not all attacks are technical—many target people directly. Be cautious of unexpected calls or messages asking for info Be cautious of calls claiming to be from IT, banks, or management Never share passwords/PIN or sensitive data Verify identity before giving ...
Secure Work Email on Personal Devices (BYOD Awareness)
Using your personal phone or tablet for work email adds convenience—but also risk. Always enable screen lock (PIN, fingerprint, or face ID) Do not share your device with others when work email is accessible Enable device encryption (most modern phones support...