{"id":5647,"date":"2020-06-18T11:09:00","date_gmt":"2020-06-18T15:09:00","guid":{"rendered":"https:\/\/www.citationcanada.com\/?p=4783"},"modified":"2024-01-02T07:06:29","modified_gmt":"2024-01-02T12:06:29","slug":"the-password-is-password-steps-everyone-should-take-for-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.citationcanada.com\/fr\/blog\/article\/the-password-is-password-steps-everyone-should-take-for-cybersecurity\/","title":{"rendered":"The Password Is \u2018Password\u2019: Steps Everyone Should Take for Cybersecurity"},"content":{"rendered":"\n<p>As attacks on technological infrastructure have become more prevalent, legislators and regulators have imposed strict responsibilities on organizations to maintain appropriate safeguards for data under their control. The wealth of medical, financial, and personal information that some organizations maintain about their patients, clients, or patrons is often all too tempting a target for hackers, and failing to take adequate steps can ruin a business, even if there are no specific legal consequences. While legislation generally explains that organizations must have plans and programs for safeguarding information, there is often a lack of detail regarding exactly what those plans and programs should look like.<\/p>\n\n\n\n<p>Phishing attempts are a more common type of hack where hackers attempt to collect personal information or deliver a malicious attack through fraudulent websites, texts, or e-mails. <\/p>\n\n\n\n<p>Some phishing attempts can be very convincing, so employees must be skeptical when they receive an unexpected e-mail and know how to spot common tricks. In our featured <a href=\"https:\/\/www.citationcanada.com\/canadian-hr-content\/online-training-courses\/\">online training course<\/a>, we do exactly that \u2013 provide your employees with the tactics and tools to help them develop the skepticism needed to identify these threats.<\/p>\n\n\n\n<p>Training is just part of the bigger cybersecurity picture as there are other ways hackers attempt to get your organization\u2019s information. Most of them are beyond the average user\u2019s control and would fall under the IT department\u2019s responsibility. All employees, though, must do their part by following guidelines set by IT for using virtual private networks (VPNs), updating passwords, using personal devices, and so on.<\/p>\n\n\n\n<p>Even if you don\u2019t think of your organization as being involved in technology, chances are good you still have some vulnerable data or systems that need protection. Download our&nbsp;<a href=\"https:\/\/offers.hrdownloads.com\/cybersecurity-101-guide-july-2019?__hstc=44907643.07516d16d0d4e0d46230882d362c6a9d.1683119820818.1684331847366.1684335948422.13&amp;__hssc=44907643.2.1684335948422&amp;__hsfp=1136147948\" target=\"_blank\" rel=\"noreferrer noopener\">FREE Cybersecurity 101 Guide<\/a>&nbsp;for the basic aspects you should continually monitor to help protect your organization from potential threats.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As attacks on technological infrastructure have become more prevalent, legislators and regulators have imposed strict responsibilities on organizations to maintain appropriate safeguards for data under their control. The wealth of medical, financial, and personal information that some organizations maintain about their patients, clients, or patrons is often all too tempting a target for hackers, and&hellip;<\/p>\n","protected":false},"author":16,"featured_media":4785,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[41],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/www.citationcanada.com\/fr\/wp-json\/wp\/v2\/posts\/5647"}],"collection":[{"href":"https:\/\/www.citationcanada.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.citationcanada.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.citationcanada.com\/fr\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.citationcanada.com\/fr\/wp-json\/wp\/v2\/comments?post=5647"}],"version-history":[{"count":1,"href":"https:\/\/www.citationcanada.com\/fr\/wp-json\/wp\/v2\/posts\/5647\/revisions"}],"predecessor-version":[{"id":6474,"href":"https:\/\/www.citationcanada.com\/fr\/wp-json\/wp\/v2\/posts\/5647\/revisions\/6474"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.citationcanada.com\/fr\/wp-json\/wp\/v2\/media\/4785"}],"wp:attachment":[{"href":"https:\/\/www.citationcanada.com\/fr\/wp-json\/wp\/v2\/media?parent=5647"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.citationcanada.com\/fr\/wp-json\/wp\/v2\/categories?post=5647"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.citationcanada.com\/fr\/wp-json\/wp\/v2\/tags?post=5647"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}