Download presentation
Presentation is loading. Please wait.
1
Join In Be Secure Presentation
Information Protection & Cyber Security Internal
2
Why Should I Be Secure? Cyber Security and Information Protection play an increasingly important role in everyday work as our interconnected world harbors many risks. We are detecting new types of threats every day. Attacks on BASF have more than doubled in one year! Information is our advantage and must be protected. IT systems cannot do this alone: Every employee plays an active role in protecting our information – every day. Join in and adopt the 9 secure behaviors to have an impact on Information Protection and Cyber Security within BASF Group. Internal
3
Secure Behaviors Everyday, users are confronted with situations in which their actions have an impact on security and Information Protection at BASF. The following behaviors will help to handle each of them in a secure way. 1. 2. 3. 4. Starting the machine Accessing information Handling information Sharing information Join in: Your behavior makes the difference Use strong passwords Classify information Respect the Need-to-know principle 9. 8. 7. 6. 5. Questions or incidents Working outside the office Using devices Opening files and hyperlinks Using web services Get help from IS Service Desk and your IPO Connect to BASF network when working outside the office Only connect authorized devices and use encryption Check received files and hyperlinks before opening Use public web services carefully Internal
4
Join In: Your behavior makes the difference
Your behavior is the most important security asset at BASF! You make a huge impact on Information Protection and Cyber Security by joining in to protect our information. Take your physical and digital environment into account Take security warnings and updates seriously Be aware of the impact of your actions inside and outside of work While… 80% is Human Effort BASF has IT systems in place to provide Cyber Security and protect our information… but we should never rely on them exclusively. Effective Information Protection and Cyber Security follows the 80/20 principle: You Only… 20% Technology Internal
5
Further information Be Secure including videos, infographics, FAQs and e-learnings Information Protection Minimum Requirements Do you need more information? Contact us: Your Information Protection Officer Be Secure Internal
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.