Topic > Growing Up After Having a Computer - 1313

The user now had to use a complicated password instead of all the numbers as previously required. Websites that allowed executables and file uploads were successfully blocked by the updated policy, including Google Drive. Employees were now required to take cybersecurity training to better protect themselves and their work laptops. Hard tokens were now used instead of software to ensure that users could not manipulate the software token. As a backup plan, Caterpillar had instilled the Citrix environment for most of their applications to ensure that if this ever happens again, users still have the ability to complete their applications.