top of page

Employee Security Best Practices

  • Jungle Tech Corporation – Employee Security Best Practices

  • Version: 1.0 | Last Updated: April 3, 2026

  • 1. Core Security Principles

  • At Jungle Tech, security is everyone’s responsibility. Our "Identity-First" security model depends on:

  • MFA Mandatory: You must use Microsoft Authenticator for all system logins. Never approve an MFA prompt you did not initiate.

  • Zero Trust: Assume any network (home, cafe, or client site) is insecure. Always use the company-approved VPN or secure Azure tunnel when accessing development environments.

  • Reporting: If you see something, say something. Report lost devices, suspicious emails, or unauthorized visitors immediately to Support Team (support@junglet.com).

  • 2. Customer Information Handling

  • We handle highly sensitive data from Enterprise customers. To protect our reputation and legal standing:

  • Data Classification: Treat all customer data as Restricted. It must never be stored on personal devices, local desktops, or unencrypted USB drives.

  • No Personal Storage: Moving customer data to personal cloud storage (personal Google Drive, Dropbox, etc.) is a fireable offense.

  • Need-to-Know: Do not share customer project details with other employees unless they are specifically assigned to that project.

  • Encryption: When sharing data with a client, always use the secure Azure-hosted sharing portals rather than email attachments.

  • 3. Hardware & Asset Security

  • Your workstation is a gateway to our 3D Visualization and AI pipeline.

  • Physical Protection: Adhere to the Clear Desk and Clear Screen Policy provided in your onboarding kit. Always lock your screen when stepping away.

  • Device Encryption: Ensure BitLocker or FileVault is active at all times. Never attempt to disable security agents (Microsoft Defender).

  • Travel Security: When traveling, never check your laptop in luggage. Keep it in your carry-on at all times.

  • Loss/Theft: If a device is lost or stolen, report it to the Security Lead within one hour so we can trigger a remote wipe via Microsoft Intra.

  • 4. Email, Phishing, and Malware

  • Email is the primary vector for cyberattacks.

  • Think Before You Click: Hover over links to verify the true URL. Check the sender's email address for slight misspellings (e.g., jungle-tech.com vs junglet.com).

  • Attachments: Never open unexpected attachments, especially .zip, .exe, or .dmg files, even if they appear to come from a known contact.

  • Spoofing: Management will never ask you to purchase gift cards, wire money, or provide passwords via email or Slack.

  • 5. Downloads & Third-Party Applications

  • Unauthorized software (Shadow IT) introduces massive risk to our AI models and proprietary code.

  • The "Approved List": Only use software approved by the Lead DevOps & Security Engineer.

  • 3D Plugins & AI Tools: Many "free" 3D assets or AI scripts contain hidden malware. You must vet all third-party plugins with Michael Habashy before installation.

  • No Pirated Software: The use of "cracked" or unlicensed software is strictly prohibited. It is a violation of our Acceptable Use Policy and exposes the company to legal and security risks.

  • Browser Extensions: Limit browser extensions to the absolute minimum. Malicious extensions can scrape your screen and steal session tokens.

  • 6. Acknowledgment of Compliance

  • Failure to follow these practices puts our Enterprise contracts and proprietary AI at risk. Compliance is monitored via automated logs in Microsoft Defender and Azure. Non-compliance will lead to disciplinary action.

bottom of page