Skip to main content

Lock and key representing cybersecurity

Three pillars of information security management

Last updated on September 2, 2022 in Compliance by Geotab Team |  2 minute read


Learn the basics of information security management and discover a few best practices for minimizing security threats.

Information security management and cybersecurity are an important part of running a business and help ensure systems, networks, and hardware are protected and secured. Although strategies to protect information may look different for every company, the main goal remains the same.

 

Continuously working on and having an effective cybersecurity strategy will help reduce possible cyber attacks. Here are three pillars and best practices to keep in mind to focus on when trying to stay protected .

Process

It is very important to review processes multiple times a year. Having best practices that your employees can work off of will help eliminate any confusion that can potentially be created, especially for those that are not familiar with the concept of security. Create simple and easy to read guidelines that clearly state what the dos and don'ts of your company are. This will keep everyone on track, and reduce the chance of cyber attacks.

 

If there are any changes to the process documents, notify the employees each time. To ensure the documents are being read, consider creating training sessions and/or quizzes. This is not a means to punish those who do not understand the documents, but to identify who may need extra training.

Technology

Technology refers to the actual software and hardware that is used for cybersecurity purposes. Once it has been identified what information needs to be protected and what the potential risks are, implement technology to help reduce them.

 

The technology that each company uses will vary. Do thorough research and create a pros and cons list for each technology to best weigh all options. As it can be costly, it is best to think it through before committing to a specific one. Set and identify goals, and once you have identified your goals and implemented the technology, you can feel safer and focus on other parts of the business.

People

People are extremely vital to your strategy. Staying safe is not only in the hands of the security team, but every employee in the company. With the help of technology, and processes put in place, it is now up to the people to use the knowledge they have learned to prevent security attacks from occurring.

 

The more up-to-date and knowledgeable employees are on cybersecurity, the less exposure there will be to cybersecurity threats. Regardless of what department each individual belongs to, ensure they are aware of how to stay protected from security breaches and understand the importance of the processes and technology that are put in place.

Best practices

Here are additional five tips to help your cybersecurity strategy:

  1. Know what a suspicious email looks like — Many times, phishing attacks leave users vulnerable to exposing personal information such as login information and passwords. Create examples of suspicious emails to educate employees on what they can expect a suspicious email to look like.
  2. Do not leave devices unattended — When you are stepping away from your laptop or leaving your phone on a table, make sure to lock your screen. Explain the reasonings behind why this is important to your employees and create a culture where this becomes second nature.
  3. Strong passwords — While this may seem like an obvious task, it is crucial that strong passwords are being set to protect your device from being compromised.
  4. Update softwares regularly — Updating software regularly and whenever needed will help secure your device and patch any security issues.
  5. Organize security training — To help reestablish and remind employees about the importance of cybersecurity, organize training sessions where processes, best practices and tips are discussed. Encourage questions and discussions between employees regarding what it means to be a secure company.

Geotab’s strategy and certifications

Geotab prioritizes these three pillars and the maintenance of security, organizational and technical measures that are designed to keep customers’ data safe and secure.

 

Geotab has successfully achieved the International Organization for Standardization (ISO) 27001 certification. This confirms the integrity of its Information Security Management System for its telematics offering, including the global offering of the GO device and MyGeotab platform, and four office locations in North America.

 

Geotab also recently announced its FIPS 140-2 validation and FedRAMP certification, which confirm Geotab’s commitment to meet the highest standards of cybersecurity that is set by the U.S federal government.

 

To learn more about Geotab’s security and privacy policies, visit: https://www.geotab.com/security/.


If you liked this post, let us know!


Disclaimer

Geotab's blog posts are intended to provide information and encourage discussion on topics of interest to the telematics community at large. Geotab is not providing technical, professional or legal advice through these blog posts. While every effort has been made to ensure the information in this blog post is timely and accurate, errors and omissions may occur, and the information presented here may become out-of-date with the passage of time.

Get industry tips and insights

Sign up for Geotab's monthly newsletter to stay updated on news and tips from the world of telematics. You can unsubscribe at any time.

Republish this article for free

Other posts you might like

two people standing infront of a red truck

How telematics informs driver coaching for field service fleets

Telematics transforms driver coaching for field service fleets, boosting safety and efficiency with targeted, data-driven strategies and actionable insights.

October 7, 2024

Traffic in Paris France near Arc de Triomphe

Fleet Electrification: Time to Step Up For the Benefit of All!

Connectivity is the key to EV planning and greener fleets.

September 6, 2024

Hands on a steering wheel

Four major benefits of telematics for risk management in the public sector

Data-powered decisions help fleet managers mitigate risk in the public sector, where safety and efficiency are paramount.

July 9, 2024

Dash cam front view image

What is video telematics?

Video telematics uses AI dash cams and telematics data to provide near real-time insights into fleet operations. This technology enhances safety, improves driver performance, streamlines incident management, and boosts operational efficiency by offering actionable data.

July 3, 2024

View last rendered: 10/09/2024 15:51:21