Slack (Messenger) Security Best Practices

Slack (Messenger) Security Best Practices

While Slack gives us immense flexibility and convenience while connecting with

people, it gives a gateway to bad actors to infect or gain unauthorized access

to our systems or data in case an employee accepts external user connection

requests without validation or caution.

Do:

  1. Pay special attention while accepting slack invitations from third parties
  2. or external domains
  3. Connect to only trusted partners and people that you know
  4. Use a strong password to login on to Slack Workspace with 2FA
  5. Securely Connect to external organizations using Slack Connect Channel
  6. Report any suspicious invitation, message, or notifications

Don’t:

  1. Accept invitations from unknown sources
  2. Click the links / URLs you don't trust
  3. Share credentials, passwords, OTP, keys, etc. over Slack
  4. Share personal, sensitive information and customer data on slack
  5. Upload or download executable or non-standard documents and files
  6. Install or connect unauthorized apps from Slack App Store

要查看或添加评论,请登录

Rajeev kumar的更多文章

  • Network Security Attack Types

    Network Security Attack Types

    Glossary Description ARP spoofing is the process of linking an attacker’s MAC address with the IP address of a…

  • Apache Tomcat Security Best Practices:

    Apache Tomcat Security Best Practices:

    . Don't run Tomcat as the root user This line of er accounts with a high level of administrative access.

  • Indicators of Compromise

    Indicators of Compromise

    Indicators of Compromise Indicators of compromise (IOCs) serve as forensic evidence of potential intrusions, unusual…

  • Data Privacy

    Data Privacy

    Data Privacy Day, January 28 In 2006, the Council of Europe decided to launch a Data Protection Day, to be celebrated…

  • Spam vs Phishing

    Spam vs Phishing

    It is not surprising that most of us have encountered numerous spam and phishing emails in our inbox and believe it or…

  • Remote Workers - Cyber Security Advice

    Remote Workers - Cyber Security Advice

    Unfortunately, remote working and cybersecurity concerns go hand in hand. Individuals and corporations continue to face…

  • How To Handle Phishing Emails

    How To Handle Phishing Emails

    1. If you receive a phishing e-mail message, do not respond to it.

  • GCP - Security Best Practices

    GCP - Security Best Practices

    Summary of Topics A. Using IAM Securely B.

  • Firewall Rules – Best Practices

    Firewall Rules – Best Practices

    1. Document your firewall rules - Use Comments to Explain the Purpose of Special Rules Anyone who works on your IT…

  • Bypassing MFA

    Bypassing MFA

    Bypassing MFA Independent of which authentication technology you use, implementation flaws and misconfigurations can…

社区洞察

其他会员也浏览了