Your part in the Belden Incident Response team is to report any suspicious activities. The Belden incident response program is to minimize threat of damage resulting from intrusions to the Belden enterprise IT environment.
Your role in protecting Belden against cyber attacks.
Decide to take action no matter what
Please report any suspicious activity. This is not limited to a suspicious email or virus warning, it can also be an unknown person that is snooping through the office.
Trust, but Verify
Whether working in the office, from home or whilst travelling, you can carry confidential data. Always be aware and alert from entities that try to gain access to your data. If something does not add up, try to verify the entity prior to acting on their request.
Report it to the Service Desk
The service desk is your first point of contact for all incidents, includes security incidents. Providing the service desk with the right information is key for analysts to be able to respond quickly and adequately.
The threat continues
Please wait for response from either the service desk or the incident response team prior to acting on the threat. Reporting the threat does not eliminate the risk, the appropriate people have to analyze the threat and will respond to your notification.
Here at Belden we provide end-users the means to train themselves through exercises and courses. To gain more knowledge on your role in Incident Response Belden provides numerous resources via email and training. We kindly ask you to participate and read those resources when presented. Thank you.
Continue to be security minded
#1 Cyberattack: Phishing mails
A social engineering attack which uses fraudulent email to lure the recipient into divulging information or opening malicious attachment or links. Most appear to come from a legitimate entity and contain authentic-looking content. Be sure to know to signs of a Phishing mail, explained in the tripwire video, located in the Security Awareness Trainings portal.