2025-03-26


SECURITY HINTS & TIPS:
Basics of Access control – Series – Part 2
Preventing Unauthorized Access
Here’s the thing about access: you have it; cybercriminals and scammers want it. They want to access networks or systems to steal confidential data, hack someone’s email account so they can send requests for wire transfers, and gain physical access to buildings and devices. Don’t let them get what they want. Prevent unauthorized access by putting these action items into practice.
Enable Multi-Factor Authentication (MFA):
MFA is a security feature that requires at least two forms of authentication before access is granted. The major benefit of MFA is that even if attackers steal a password, they’re less likely to have access to additional authentication factors. Therefore, the account or system in question will block their access.
Lock Devices
Locking workstations and devices may not sound like a big deal, but it is a simple yet vital part of security. Locking a computer takes mere seconds and can be done with the stroke of a few keys. Set up mobile devices to lock after a few seconds of inactivity or, more ideally, lock them immediately when not in use.
MGC CYBER
HEROES
Our Fantastic users help protect our organization every day by identifying and reporting phishing attempts using the Phish Alert Button (PAB). Cassandra Driscoll from Diamond Group recently identified a fraudulent email disguised as a legitimate voicemail designed to steal login credentials.
Thanks to Cassandra’s keen awareness and prompt action, our Cybersecurity team swiftly intervened, isolating the threat before any damage could occur. Her diligence and commitment to IT security protocols were instrumental in preventing this attack.
A huge thank you to Cassandra and all our Cyber Heroes for their continual efforts to safeguard our organisation!
Mind Your Surroundings
When you enter secured areas, make sure no one slips in behind you. Don’t let others use your ID or badge for any reason, and ensure doors remain locked and secured. If you work remotely or travel, always keep an eye on your belongings so they won’t be misplaced or stolen.
Be sure to report anything suspicious immediately. Doing so empowers your organization to investigate the incident and mitigate any potential damages.
Reference: ISMS 27001 – 05.15 ACCESS CONTROL POLICY
Manitoulin Group of Companies Security Team
Cybersecurity@manitoulingroup.
Stop, Look, and Think. Don’t be fooled.