We protect our company assets
The physical and technology resources provided by the company to do our jobs every day are considered Cox company assets. Many of these resources contain our sensitive information assets — such as intellectual property, business records, and personal information of our employees or customers.
Each of us is responsible for protecting our assets from theft, loss, waste, or abuse. Cybercriminals regularly try to access our systems to steal our valuable information assets or do other harm. When you help protect our assets, you play a critical role in protecting our employees, customers, partners, and competitive advantage.
Protecting our information assets from theft or compromise depends on each of us protecting our technology assets from cyber threats.
- Keep passwords and PINs secure, and don’t share them with anyone. Contact the IT department for password manager tool suggestions to help you manage passwords and PINs.
- Ensure the physical security of technology assets assigned to you; maintain a clean and secure work area.
- Report suspicious or phishing emails or texts, unauthorized access to information, and suspected attacks on our technology systems.
- Only use secure networks and internet connections.
- Ensure that any person receiving information assets understands any restrictions on use.
- Handle sensitive information assets with care and disclose only to those with access rights and a valid business need.
- Lock your computer screen or mobile device when not in use and secure documents from common areas such as copiers and printers.
- Install unauthorized software, applications, hardware, or storage devices on company assets.
- Modify or disable services or applications deployed by Cox on assets or equipment.
- Access the company network through unauthorized applications or devices.
- Discuss information assets in public places where others could hear you.
- Download music or video files from peer-to-peer networks.