What this page is for

This page is the practical security baseline for all Helixiora employees and contractors.

What you should do

  • Use strong authentication, including MFA on required systems.
  • Keep devices updated, encrypted, and protected with screen lock.
  • Use only approved storage and sharing tools for company or client data.
  • Follow client-specific handling requirements and NDAs.
  • Use AI tools only within approved usage rules.
  • Report suspected incidents immediately.

Who owns or approves it

Security and leadership own standards. IT and People Operations own employee-facing process updates and training links.

Where to go in the tool stack

  • Password manager for credential hygiene
  • Approved storage/collaboration systems for data sharing
  • IT Helpdesk or incident channel for security reporting

What happens if something goes wrong

If you suspect account compromise, data leakage, or device theft, report it immediately using the incident path and follow containment instructions before attempting self-recovery.