Joke Collection Website - News headlines - How to strengthen the security management of computers and mobile phones under the new situation?

How to strengthen the security management of computers and mobile phones under the new situation?

Effectively strengthen the basic work of confidentiality. Strictly keep confidential the management of key departments and parts, conscientiously implement the requirements of superior units, strictly confirm the system of key departments and parts, update the work ledger in time, revise and improve relevant systems, improve civil air defense, physical defense and technical defense measures, and ensure the safety of key departments and parts; Conscientiously implement the confidentiality review system of government information disclosure, further clarify the review responsibilities and procedures, and promote the open, legal and compliant development of government affairs.

Around the responsibility, earnestly implement the responsibility system for confidentiality and password work. Strengthen the study, improve the sense of confidentiality, sign a letter of responsibility for confidentiality, and clarify the responsibility for confidentiality. In accordance with the requirements of the leadership responsibility system for confidentiality and password work, we should study the problems existing in the confidentiality work in time, take the confidentiality work as an important work to strengthen internal management and prevent potential risks, and constantly improve the responsibility system of first-level implementation and layer-by-layer implementation.

Extended data:

Precautions:

Computers involved in key positions such as production and operation, planning, finance and personnel. You must provide a startup and screen saver password. Computers involving enterprise core secrets must be physically isolated and not allowed to be networked.

Pay attention to the confidentiality of mobile storage electronic equipment. Do not use mobile electronic devices such as USB flash drives, mobile phones and hard disks to copy or duplicate confidential information at will. If it is really necessary for work, it must go through strict confidentiality review procedures.

Pay attention to the confidentiality of documents and materials. Standardize the use, printing and management procedures of documents and materials, and implement special management of important confidential documents and materials.

People's Daily Online-The Central Military Commission issued "Opinions on Doing a Good Job in Confidentiality under the New Situation"

People's Network-Strengthening Computer Security Management