Let us be your IT department!
Call us Today! (703) 821-8200

 

 

Computerware

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 11 Security Best Practices Every User Should Know

Tip of the Week: 11 Security Best Practices Every User Should Know

You might spend a significant amount of time thinking about your business’s security practices, but the same can’t be said for your organization’s employees. Unless you give them a reason to care about security, they likely won’t. The resulting apathy could eventually become serious problems that could hinder operations in the long run, or worse, expose your business to threats that could put your employees and your clients in danger.

In order to keep these instances to a minimum, consult the following cheat sheet. This will give your employees a great way to follow critical best practices.

Essential Cybersecurity Considerations

  • Use the company’s network to store files: Always store your organization’s data on an in-house network. This is because any files stored locally on your desktop might not get backed up. Do not use personal cloud accounts, like Google Drive or Dropbox, to save or share company-owned documents.
  • Never leave your workstation unlocked and unattended: Always lock your computer using the Windows Key + L shortcut before stepping away from it, even if only for a moment.
  • Don’t connect unknown devices to your work PC: This is especially important for small devices like USB drives. You never know what could be on them.
  • Don’t download or install applications without approval: If you download an app without permission from IT or a network administrator, you could cause problems for other employees. Always ask for permission before downloading or installing software.
  • Don’t respond to unsolicited or suspicious emails: If you receive a message that has an unknown or unfamiliar sender, it could contain malicious ransomware or other nasty threats. Be sure to notify IT immediately so that they can investigate the issue. Be especially cautious around unsolicited proposals or resumes.
  • Don’t accept support from unexpected callers: If you receive a phone call from someone claiming to be from Microsoft support (or other well-known companies), just hang up. These callers are often fraudsters hoping to remote into your PC and access company information.
  • Adhere to password best practices: Keep your passwords strong and complex at all times, and never use the same password more than once.
  • Get approval for mobile devices from your manager: Don’t use your smartphone, tablet, or laptop for work purposes until you’ve been granted approval. This is to keep company data as secure as possible.
  • If you see someone, tell someone: If you think that something is out of the ordinary, like an intruder in the workplace, be sure to alert management. Visitors should not be allowed to roam around the office unattended.
  • Think twice before clicking: If you’ve received a link in any correspondence, you should avoid clicking on it until you’re sure it’s from a trusted source. Links can often be considered cyber threats, especially those that are in spam messages.
  • Report issues as soon as they appear: If you experience something that seems troublesome, report the issue to management immediately. Proactive vigilance is the best way to prevent downtime, and it only serves to make your job easier.

Print this list out and hand it off to any employees who could use training on security best practices.

Keeping the business secure isn’t just your responsibility--everyone should be involved in the process. By following this list of best practices, you stand to protect your business against threats that could harm operations. To learn more about how to secure your business, including external technology solutions that prevent issues from transforming into major problems, reach out to us at (703) 821-8200.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 19 August 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Workplace Tips Managed Service Provider Software Productivity Business Computing Backup Hackers Saving Money Hardware Data Business Malware IT Support Hosted Solutions Email IT Services Google Quick Tips Efficiency Gadgets Smartphones Small Business Mobile Devices Mobile Office Disaster Recovery Business Continuity Virtualization Network Microsoft Office Computer User Tips Server Miscellaneous Upgrade VoIP Social Media Network Security Windows 10 Unified Threat Management Windows Mobile Device Management Smartphone Innovation Operating System Remote Computing Ransomware WiFi Vendor Management Passwords BYOD Communication Apps Mobile Computing Android Marketing The Internet of Things Facebook Users Managed IT services Firewall Remote Monitoring History Holiday Apple Collaboration Analytics Alert Data Management Save Money IT Consultant Health Content Filtering Automation Bring Your Own Device Big data Office Windows 8 Lithium-ion Battery Tech Support Outsourced IT Hard Drives Phishing Hiring/Firing Best Practice Managed IT Services Spam Going Green BDR Virus App Wireless Technology Search Budget Printer Help Desk Antivirus Outlook Information Technology Gmail IBM Browser Recovery Internet of Things Employer-Employee Relationship Productivity Phone System Encryption communications Customer Service Humor Education Proactive IT Computers Data storage Save Time Money Running Cable Administration Maintenance SaaS Bandwidth Saving Time Update Tablet Fax Server Networking Digital Payment Telephone Systems Two-factor Authentication Wireless Training Website Travel Avoiding Downtime PowerPoint Securty Social Networking Managed IT Current Events Solid State Drive Hacking Twitter Flexibility Artificial Intelligence Office 365 It Management IT Support Hard Drive User iPhone Legal Business Intelligence Mobile Device Government Document Management Hosted Solution Computer Repair Risk Management Password Intranet Black Market Hacker Processors Streaming Media Downtime Inbound Marketing USB Presentation Business Growth Lifestyle Monitors Company Culture Telephony Virtual Desktop Chrome YouTube Documents Router Cloud Computing Programming Hack Settings Heating/Cooling Computer Accessories Comparison Customer Relationship Management End of Support Augmented Reality Data Backup Retail Law Enforcement Experience Text Messaging Politics Pain Points VPN Excel User Error Public Cloud Laptop Cybersecurity Gaming Console Net Neutrality Safety Webcam Office Tips Social Automobile Paperless Office DDoS Sports Network Congestion How To Computing Cybercrime Robot IT service Word Statistics Taxes Cortana Compliance Co-managed IT Uninterrupted Power Supply Cost Management Deep Learning Electronic Payment Tablets Rental Service Sync Memory Visible Light Communication Data Protection cache CCTV Leadership Wi-Fi IP Address Human Resources Google Maps Harddrive In Internet of Things Flash Advertising Corporate Profile Device Management Assessment Emails Skype External Harddrive Google Wallet Displays Scalability Unified Communications online Currency VoIP Teamwork Disaster Consultation Storage Meetings Banking Smart Phones Drones Get More Done Printer Server PDF Cabling File Sharing Private Cloud Best Available Mouse Administrator Language Permissions Keyboard Domains Supercomputer Product Reviews Business Metrics GPS Writing switches eWaste Worker Read Machine Learning Value Distributed Denial of Service Shortcut Google Drive Troubleshooting Employer Employee Relationship Chromebook Upselling 3D Webinar Staffing Environment Licensing Ebay Messenger Recycling Botnet Work/Life Balance Cryptocurrency Competition Electricity Business Owner Download Google Docs Adminstration IT consulting Pirating Information Books Computer Malfunction Cleaning Application WannaCry Best Practives CIO Time Management Specifications Mobility Microchip Regulations Windows XP Content Management Reading Digital Signature Motion Sickness Microserver Society Touchscreen Entertainment Tracking Hacks Micrsooft Windows 10 Video Surveillance Relocation Digital Trending Web Server Saving ZTime Identity Theft Turn Key LinkedIn Trojan Websites Workers Analytic Notifications Reliable Computing Organize Archive Start Menu Debate Access Virtual Reality Music Public Speaking Upgrades Software as a Service Point of Contact Samsung Social Engineering G Suite Bluetooth LiFi Entrepreneur Spyware HIPAA Physical Security Business Managemenet Thin CLient Computing Infrastructure Data Recovery Capital Productuvuty 3D Printing CrashOverride

hp supplies medallionLarge2017