Let us be your IT department!
Call us Today! (703) 821-8200




Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 11 Security Best Practices Every User Should Know

Tip of the Week: 11 Security Best Practices Every User Should Know

You might spend a significant amount of time thinking about your business’s security practices, but the same can’t be said for your organization’s employees. Unless you give them a reason to care about security, they likely won’t. The resulting apathy could eventually become serious problems that could hinder operations in the long run, or worse, expose your business to threats that could put your employees and your clients in danger.

In order to keep these instances to a minimum, consult the following cheat sheet. This will give your employees a great way to follow critical best practices.

Essential Cybersecurity Considerations

  • Use the company’s network to store files: Always store your organization’s data on an in-house network. This is because any files stored locally on your desktop might not get backed up. Do not use personal cloud accounts, like Google Drive or Dropbox, to save or share company-owned documents.
  • Never leave your workstation unlocked and unattended: Always lock your computer using the Windows Key + L shortcut before stepping away from it, even if only for a moment.
  • Don’t connect unknown devices to your work PC: This is especially important for small devices like USB drives. You never know what could be on them.
  • Don’t download or install applications without approval: If you download an app without permission from IT or a network administrator, you could cause problems for other employees. Always ask for permission before downloading or installing software.
  • Don’t respond to unsolicited or suspicious emails: If you receive a message that has an unknown or unfamiliar sender, it could contain malicious ransomware or other nasty threats. Be sure to notify IT immediately so that they can investigate the issue. Be especially cautious around unsolicited proposals or resumes.
  • Don’t accept support from unexpected callers: If you receive a phone call from someone claiming to be from Microsoft support (or other well-known companies), just hang up. These callers are often fraudsters hoping to remote into your PC and access company information.
  • Adhere to password best practices: Keep your passwords strong and complex at all times, and never use the same password more than once.
  • Get approval for mobile devices from your manager: Don’t use your smartphone, tablet, or laptop for work purposes until you’ve been granted approval. This is to keep company data as secure as possible.
  • If you see someone, tell someone: If you think that something is out of the ordinary, like an intruder in the workplace, be sure to alert management. Visitors should not be allowed to roam around the office unattended.
  • Think twice before clicking: If you’ve received a link in any correspondence, you should avoid clicking on it until you’re sure it’s from a trusted source. Links can often be considered cyber threats, especially those that are in spam messages.
  • Report issues as soon as they appear: If you experience something that seems troublesome, report the issue to management immediately. Proactive vigilance is the best way to prevent downtime, and it only serves to make your job easier.

Print this list out and hand it off to any employees who could use training on security best practices.

Keeping the business secure isn’t just your responsibility--everyone should be involved in the process. By following this list of best practices, you stand to protect your business against threats that could harm operations. To learn more about how to secure your business, including external technology solutions that prevent issues from transforming into major problems, reach out to us at (703) 821-8200.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 23 May 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Microsoft Business Management Workplace Tips Managed Service Provider Productivity Software Backup Business Computing Hackers Saving Money Hardware Business Data Malware Hosted Solutions IT Services Email IT Support Quick Tips Smartphones Gadgets Google Mobile Devices Small Business Mobile Office Disaster Recovery Business Continuity Efficiency Virtualization Computer Network Microsoft Office Server User Tips Miscellaneous Upgrade Social Media Windows 10 VoIP Mobile Device Management Network Security Unified Threat Management Windows Innovation Passwords BYOD Operating System Communication Smartphone WiFi The Internet of Things Marketing Remote Computing Mobile Computing Apps Vendor Management Firewall History Holiday Ransomware Users Android Managed IT services Apple Facebook Remote Monitoring Analytics IT Consultant Collaboration Alert Automation Bring Your Own Device Save Money Office Health Data Management Content Filtering Going Green Wireless Technology Big data Lithium-ion Battery Windows 8 Hard Drives Tech Support Hiring/Firing Best Practice Spam IBM Gmail Outlook Browser Employer-Employee Relationship Internet of Things Search Virus App Phone System Budget Printer Phishing Information Technology BDR Running Cable Saving Time Bandwidth Maintenance Customer Service Proactive IT Education Help Desk Computers Humor Data storage Save Time Money Productivity Mobile Device Document Management Government Computer Repair Hosted Solution Recovery Administration Risk Management Intranet Black Market Hacker Update Encryption communications Telephone Systems Training Digital Payment Networking Two-factor Authentication Wireless Travel Fax Server PowerPoint Website Social Networking Outsourced IT Managed IT Antivirus Twitter Solid State Drive Artificial Intelligence Hacking Flexibility Avoiding Downtime Legal iPhone Office 365 Business Intelligence Current Events User Excel Office Tips User Error Safety Social Taxes Computing Network Congestion Sports DDoS SaaS Gaming Console IT service Webcam Statistics Robot Cybercrime Password Compliance Cortana Cost Management Streaming Media Inbound Marketing Cloud Computing Hack Downtime Processors USB Chrome Tablet Business Growth Presentation Company Culture Virtual Desktop Router Co-managed IT Computer Accessories Documents Programming Comparison Customer Relationship Management Augmented Reality Heating/Cooling Public Cloud Lifestyle Politics End of Support Text Messaging Cybersecurity Retail Hard Drive VPN Law Enforcement Experience Automobile Net Neutrality Pain Points Paperless Office Specifications Hacks CIO Start Menu Windows XP Relocation Upselling Webinar Identity Theft Video Surveillance Society Samsung Digital Signature Entertainment LinkedIn G Suite Notifications Trending Micrsooft Saving ZTime Uninterrupted Power Supply Physical Security Reliable Computing Virtual Reality Debate Tablets Archive Sync Social Engineering Analytic Best Practives Data Protection Word CCTV Scalability Point of Contact Bluetooth Computing Infrastructure Microserver Music Public Speaking Google Maps In Internet of Things Rental Service Upgrades Thin CLient Corporate Profile LiFi Entrepreneur Emails Memory Wi-Fi Business Managemenet Turn Key HIPAA Electronic Payment Telephony Deep Learning Trojan Leadership Visible Light Communication Meetings Flash Organize Private Cloud Device Management IP Address Cabling Administrator Monitors Human Resources Advertising Supercomputer Settings online Currency Machine Learning Banking Skype Google Wallet Worker Distributed Denial of Service File Sharing Displays YouTube Unified Communications Employer Employee Relationship Teamwork Language Storage Business Metrics Mouse Drones Disaster Licensing PDF Botnet Harddrive Permissions GPS Keyboard Best Available Chromebook Product Reviews External Harddrive Securty Domains IT Support switches eWaste Computer Malfunction Messenger Read Writing Work/Life Balance Ebay 3D Shortcut Mobility Value Troubleshooting Download Smart Phones Recycling Get More Done Managed IT Services Staffing Environment Motion Sickness Books Printer Server Pirating Information Cryptocurrency Adminstration Competition Tracking Business Owner How To Microchip Google Docs Laptop Windows 10 IT consulting Web Server Reading Regulations Cleaning Application Workers Content Management

hp supplies medallionLarge2017