In the Know

How Cyber Secure Are You?

We all have a role to play in keeping our personal information and Teck’s systems safe. Here are five tips to improve your cyber security at home, at work and on the go.

  1. Toughen up your passwords: Avoid using common words and common substitutions and instead use passwords that are long, and include a variation of lower case and upper case letters, numbers and symbols. Tools like password managers, such as LastPass, can also be used to manage multiple complicated passwords.

  2. Review your account’s privacy setting: Social media platforms collect a lot of personal information including current location, contact information, employment status and history, and personal interests. Review your privacy settings on your social media accounts and make sure you are aware of what you are sharing. Consider changing your accounts from public to private to keep your information more secure.

  3. Check your permissions: Many smart devices will have access to your location, cameras and microphones, even when they are not being used. Carefully review what personal information is being collected from your device and why it’s needed. Consider setting up different permissions for different users, with separate restricted accounts for children.

  4. Use multi-factor authentication: In today’s world of phishing and malicious attacks to gather your credentials, using a single username and password to access your information online can be perilous. Multi-factor authentication (MFA) involves using a second method of account authentication, such as: something you know (such as a password), something you have (such as a smartphone), and something you are (such as your fingerprint).

    Check to see if your financial institutions, online accounts and applications offer MFA. Apple and Google both offer MFA options for accessing your online accounts.

    Here at Teck we will soon launch DUO as our MFA method to secure Teck information accessed from non-Teck devices. See here for more information.

  5. See if you have been ‘pwned’: Have I Been Pwned is a free service that aggregates data breaches and helps people establish if they have been impacted by malicious activity on the internet. The site works by comparing your email address to databases of known security breaches. If a match is found, it gives information on what parts of your identity and data may have been exposed.

Thank You

Download Volume 26

Many thanks to those who contributed to and participated in this issue of Connect:

Catherine Adair, Community Relations Leader, Trail Operations; William Albornoz, Heavy Equipment Operator, Quebrada Blanca; Barbara Brice, Senior Human Resources Generalist, Pend Oreille Mine; Kimberley Christensen, Analyst, Technology and Innovation, Vancouver office; Solange Dussaubat, Superintendent, Water Resources, Santiago office; Rodrigo Ferreira, Communications Specialist, Social Responsibility, Quebrada Blanca; Keith Klimchuk, Senior Environmental Specialist, Trail Operations; Chris Lane, Senior Geologist Supervisor, Line Creek Operations; Keith Mayhew, Manager, Technology and Innovation, Vancouver office; Eli Mitchell, Surface Crew, Red Dog Operations; Lawrence Watkins, Vice President, Health and Safety, Vancouver office; Verna Westlake, Community Investment Coordinator, Public Relations, Red Dog

 

Close-up view of coiled copper wires with a shiny, reflective surface.

On the Cover

Copper wire like that shown on the cover is used in electrical equipment and devices because of its high conductivity. From a large skyscraper to the stove in your kitchen, copper wiring is needed to transmit electricity that powers our day-to-day lives.

 

Submissions

Have a story that you would like to share through Connect? Submit your article and high-quality photos to: connect@teck.com