2025-10-27

SECURITY HINTS & TIPS:

Human Firewall

What is a Human Firewall?
Whether you know it or not, you are a human firewall. That is not up for debate. It’s just a matter of how good you are at being one. A good human firewall has strong situational awareness, uses common sense to spot potential threats, and applies street smarts to information security. Just like actual firewalls on our networks that can control much of the incoming and outgoing data, you control what is allowed to come in and out of our organization, your computers, your devices, and your home (in both the cyber and physical domains).

🚨 Human Firewall Manifesto
⚠️ IDENTIFY THREATS
Many attackers use deception and manipulation to scam people out of money or information. Human firewalls know how to recognize the subtleties of these scams by staying alert for warning signs and thinking before clicking or responding.

🪪🏢 MAINTAIN PHYSICAL SECURITY
Security isn’t only a concern in cyberspace. Human firewalls understand that physical security is just as important. It includes simple actions such as locking workstations and properly storing physical copies of confidential information.

🎣💣 REPORT INCIDENTS
When a suspected security incident occurs, human firewalls serve as the first responders by reporting the incident immediately. Timely reporting empowers organizations to investigate what happened and mitigate potential damages.

Be a MGC Cyber Hero

MGC CYBER
HEROES

Thanks to our amazing users, who play a crucial role in keeping our organization safe every day by spotting and reporting phishing attempts through the Phish Alert Button (PAB). Recently, Alex Kelly from the Near North Customs Team detected a deceptive email posing as a tech support staff member aiming to steal login credentials.

Thanks to Alex’s keen eye for detail and swift action, our Cybersecurity team was able to take prompt action to isolate the threat and prevent any harm. Her vigilance and dedication to being a human firewall were key in stopping this attack.

A big thank you to Alex and all our Cyber Heroes for your ongoing commitment to protecting our organization! 🚀🔒

🧠💡 USE COMMON SENSE
Protecting people (and data) doesn’t require a strong technical focus. Instead, it involves a commitment to common sense habits such as using strong passwords for every account and never sharing login credentials or badges.

🛡️ FOLLOW POLICY
Policies exist to protect people, data, and systems. Always following those policies is perhaps the simplest way to maintain security and privacy, and is one of the top responsibilities shared by every member of an organization.

  • ISMS 27001 : 05.26 PROCESS OF REPORTING SECURITY INCIDENTS
  • ISMS 27001 : 05.15 ACCESS CONTROL POLICY
  • ISMS 27001: 06.7.2 MOBILE AND DEVICES TELEWORKING POLICY
  • ISMS 27001: 06.7.0 REMOTE NETWORK ACCESS

Manitoulin Group of Companies Security Team
Cybersecurity@manitoulingroup.com

Stop, Look, and Think. Don’t be fooled.