<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://doc.heinfricke.team/index.php?action=history&amp;feed=atom&amp;title=Security_Best_Practices</id>
	<title>Security Best Practices - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://doc.heinfricke.team/index.php?action=history&amp;feed=atom&amp;title=Security_Best_Practices"/>
	<link rel="alternate" type="text/html" href="https://doc.heinfricke.team/index.php?title=Security_Best_Practices&amp;action=history"/>
	<updated>2026-04-14T11:11:00Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.0</generator>
	<entry>
		<id>https://doc.heinfricke.team/index.php?title=Security_Best_Practices&amp;diff=354&amp;oldid=prev</id>
		<title>Suraj.mali@heinfricke.team: /* 2. Strong Password Practices */</title>
		<link rel="alternate" type="text/html" href="https://doc.heinfricke.team/index.php?title=Security_Best_Practices&amp;diff=354&amp;oldid=prev"/>
		<updated>2025-11-24T11:36:41Z</updated>

		<summary type="html">&lt;p&gt;&lt;span class=&quot;autocomment&quot;&gt;2. Strong Password Practices&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 11:36, 24 November 2025&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l5&quot;&gt;Line 5:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 5:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== 2. Strong Password Practices ==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== 2. Strong Password Practices ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Use long, unique, and complex passwords (minimum &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;12 &lt;/del&gt;characters).&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Use long, unique, and complex passwords (minimum &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;8 &lt;/ins&gt;characters).&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Avoid predictable patterns like names, dates, or simple combinations.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Avoid predictable patterns like names, dates, or simple combinations.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Change your password before it expires (every 30 days).&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Change your password before it expires (every 30 days).&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l39&quot;&gt;Line 39:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 39:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Lock your screen whenever you leave your desk (Windows + L).&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Lock your screen whenever you leave your desk (Windows + L).&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Use company assets only for official work.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Use company assets only for official work.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Do not install software without &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;manager/&lt;/del&gt;IT approval.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Do not install software without IT approval.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Keep your laptop updated with the latest patches (IT-managed).&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Keep your laptop updated with the latest patches (IT-managed).&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Never connect unknown USB drives or devices.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Never connect unknown USB drives or devices.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Suraj.mali@heinfricke.team</name></author>
	</entry>
	<entry>
		<id>https://doc.heinfricke.team/index.php?title=Security_Best_Practices&amp;diff=353&amp;oldid=prev</id>
		<title>Suraj.mali@heinfricke.team: Created page with &quot;== 1. Importance of Security == To protect company systems, data, and intellectual property, all employees must follow strict security best practices. These rules are mandatory and apply to all laptops, accounts, and applications. ----  == 2. Strong Password Practices ==  * Use long, unique, and complex passwords (minimum 12 characters). * Avoid predictable patterns like names, dates, or simple combinations. * Change your password before it expires (every 30 days). * Sto...&quot;</title>
		<link rel="alternate" type="text/html" href="https://doc.heinfricke.team/index.php?title=Security_Best_Practices&amp;diff=353&amp;oldid=prev"/>
		<updated>2025-11-24T11:33:38Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;== 1. Importance of Security == To protect company systems, data, and intellectual property, all employees must follow strict security best practices. These rules are mandatory and apply to all laptops, accounts, and applications. ----  == 2. Strong Password Practices ==  * Use long, unique, and complex passwords (minimum 12 characters). * Avoid predictable patterns like names, dates, or simple combinations. * Change your password before it expires (every 30 days). * Sto...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== 1. Importance of Security ==&lt;br /&gt;
To protect company systems, data, and intellectual property, all employees must follow strict security best practices. These rules are mandatory and apply to all laptops, accounts, and applications.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== 2. Strong Password Practices ==&lt;br /&gt;
&lt;br /&gt;
* Use long, unique, and complex passwords (minimum 12 characters).&lt;br /&gt;
* Avoid predictable patterns like names, dates, or simple combinations.&lt;br /&gt;
* Change your password before it expires (every 30 days).&lt;br /&gt;
* Store and manage all passwords inside &amp;#039;&amp;#039;&amp;#039;Bitwarden&amp;#039;&amp;#039;&amp;#039;, the company’s approved password manager.&lt;br /&gt;
* Never write down passwords or share them with anyone.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== 3. Multi-Factor Authentication (MFA) ==&lt;br /&gt;
MFA is required for accessing key applications such as:&lt;br /&gt;
&lt;br /&gt;
* Office 365 (Outlook, Teams)&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Best practices:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* Always complete MFA verification using the Microsoft Authenticator app.&lt;br /&gt;
* Never approve login prompts you did not initiate.&lt;br /&gt;
* Report unexpected MFA requests immediately to IT.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== 4. Safe Email &amp;amp; Communication Practices ==&lt;br /&gt;
&lt;br /&gt;
* Do not open attachments or links from unknown or suspicious emails.&lt;br /&gt;
* Be cautious of phishing attempts pretending to be HR, IT, banks, or known services.&lt;br /&gt;
* Double-check sender details before responding.&lt;br /&gt;
* Report any suspicious email to IT immediately.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== 5. Device Security ==&lt;br /&gt;
&lt;br /&gt;
* Lock your screen whenever you leave your desk (Windows + L).&lt;br /&gt;
* Use company assets only for official work.&lt;br /&gt;
* Do not install software without manager/IT approval.&lt;br /&gt;
* Keep your laptop updated with the latest patches (IT-managed).&lt;br /&gt;
* Never connect unknown USB drives or devices.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== 6. Safe Browsing ==&lt;br /&gt;
&lt;br /&gt;
* Access only trusted and work-related websites.&lt;br /&gt;
* Avoid downloading files from unverified sources.&lt;br /&gt;
* Do not use torrenting, gaming, or high-bandwidth websites on any network.&lt;br /&gt;
* Use VPN when working remotely or on public Wi-Fi.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== 7. Data Protection &amp;amp; Privacy ==&lt;br /&gt;
&lt;br /&gt;
* Store documents in OneDrive or SharePoint, not on the Desktop or Downloads.&lt;br /&gt;
* Do not email sensitive data without approval.&lt;br /&gt;
* Do not share internal documents outside the company without authorization.&lt;br /&gt;
* Follow the Clear Desk and Clear Screen policy at all times.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== 8. Physical Security ==&lt;br /&gt;
&lt;br /&gt;
* Keep your laptop safely locked in your drawer when leaving for the day.&lt;br /&gt;
* Do not allow unauthorized persons to tailgate into the office.&lt;br /&gt;
* Report lost or stolen devices immediately to IT and HR.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== 9. Reporting Incidents ==&lt;br /&gt;
If you notice anything unusual such as:&lt;br /&gt;
&lt;br /&gt;
* Unknown login attempts&lt;br /&gt;
* Suspicious emails&lt;br /&gt;
* System slowdown or unexpected pop-ups&lt;br /&gt;
&lt;br /&gt;
Immediately report it to the IT Helpdesk at: &amp;#039;&amp;#039;&amp;#039;support@heinfricke.services&amp;#039;&amp;#039;&amp;#039;&lt;/div&gt;</summary>
		<author><name>Suraj.mali@heinfricke.team</name></author>
	</entry>
</feed>