Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Be Secure:

Information Protection and Cyber Security

Only connect authorized


devices and use encryption

Only connect authorized devices …


… provided by the company to the BASF network and
infrastructure, because they ensure the right level of security.
If not, there is a high RISK of security breaches …

Damage to IT systems Information leak due to malware Unauthorized storing of


business information

Connecting an unknown USB Using a private computer to work A non-BASF printer may store
stick to the computer may on sensitive data increases the risk print jobs on the device’s hard
introduce viruses of information being spied out drive

- According to a study in
70% of commonly used devices It typically takes victims months
2014, unapproved hardware
contain serious vulnerabilities or more to learn they’ve been
was identified as one of the
breached
top three internal threats
Source: PwC Global State of Information Security Survey 2015 Source: Verizon Data Breach Investigations Report 2014 Source: Verizon Data Breach Investigations Report 2014

Use encryption because …


… it is the strongest level of protection against unauthorized access to your sensitive information.
Encryption scrambles the contents of your data so that ONLY the right people with the right
password are able to decode it.

How can I encrypt information correctly?


Use authorized hardware with integrated encryp-
1.
tion, for example a hardware encrypted USB stick

Here, remember to use a strong password so that


information on the device is inaccessible to
unauthorized persons
Use additional software to encrypt sensitive data
2. before storing them on an ordinary storage device

For example, you can use the encryption option of


Winzip together with a strong password

Only by using both, authorized devices and encryption, you can ensure that sensitive information
does not get into the wrong hands.

What does this mean for you?

Don’t
Don't connect unknown, found or private
non-BASF devices (e.g. USB sticks) to BASF
Encrypting Data computers or infrastructure

Don’t leave wireless connections active when


not in use

Don’t use portable devices as the single


storage location for important information

Don’t use the USB port of your BASF computer


to recharge your private devices like mobile

Do
phones or cameras. Similarly, do not recharge
your BASF mobile phone using your private
computer

Don’t leave printouts, copies and/or originals


lying in the printer, copier or fax machine
Only use authorized devices and preferably
encrypted USB sticks for business purposes

Use encryption when storing (strictly) confidential


information on mobile devices

Delete the memory of mobile phones and restore


them to factory settings before passing them on

Follow locally existing processes for deletion of


content on and disposal of mobile devices

Use the PIN function when printing documents

Questions or incidents?
Get help from IS Service Desk and your Information Protection Officer.

be-secure.basf.net

You might also like