Let us be your IT department!
Call us Today! (703) 821-8200




Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 11 Security Best Practices Every User Should Know

Tip of the Week: 11 Security Best Practices Every User Should Know

You might spend a significant amount of time thinking about your business’s security practices, but the same can’t be said for your organization’s employees. Unless you give them a reason to care about security, they likely won’t. The resulting apathy could eventually become serious problems that could hinder operations in the long run, or worse, expose your business to threats that could put your employees and your clients in danger.

In order to keep these instances to a minimum, consult the following cheat sheet. This will give your employees a great way to follow critical best practices.

Essential Cybersecurity Considerations

  • Use the company’s network to store files: Always store your organization’s data on an in-house network. This is because any files stored locally on your desktop might not get backed up. Do not use personal cloud accounts, like Google Drive or Dropbox, to save or share company-owned documents.
  • Never leave your workstation unlocked and unattended: Always lock your computer using the Windows Key + L shortcut before stepping away from it, even if only for a moment.
  • Don’t connect unknown devices to your work PC: This is especially important for small devices like USB drives. You never know what could be on them.
  • Don’t download or install applications without approval: If you download an app without permission from IT or a network administrator, you could cause problems for other employees. Always ask for permission before downloading or installing software.
  • Don’t respond to unsolicited or suspicious emails: If you receive a message that has an unknown or unfamiliar sender, it could contain malicious ransomware or other nasty threats. Be sure to notify IT immediately so that they can investigate the issue. Be especially cautious around unsolicited proposals or resumes.
  • Don’t accept support from unexpected callers: If you receive a phone call from someone claiming to be from Microsoft support (or other well-known companies), just hang up. These callers are often fraudsters hoping to remote into your PC and access company information.
  • Adhere to password best practices: Keep your passwords strong and complex at all times, and never use the same password more than once.
  • Get approval for mobile devices from your manager: Don’t use your smartphone, tablet, or laptop for work purposes until you’ve been granted approval. This is to keep company data as secure as possible.
  • If you see someone, tell someone: If you think that something is out of the ordinary, like an intruder in the workplace, be sure to alert management. Visitors should not be allowed to roam around the office unattended.
  • Think twice before clicking: If you’ve received a link in any correspondence, you should avoid clicking on it until you’re sure it’s from a trusted source. Links can often be considered cyber threats, especially those that are in spam messages.
  • Report issues as soon as they appear: If you experience something that seems troublesome, report the issue to management immediately. Proactive vigilance is the best way to prevent downtime, and it only serves to make your job easier.

Print this list out and hand it off to any employees who could use training on security best practices.

Keeping the business secure isn’t just your responsibility--everyone should be involved in the process. By following this list of best practices, you stand to protect your business against threats that could harm operations. To learn more about how to secure your business, including external technology solutions that prevent issues from transforming into major problems, reach out to us at (703) 821-8200.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 28 June 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Managed Service Provider Workplace Tips Productivity Software Business Computing Backup Hackers Saving Money Hardware Data Business Malware Hosted Solutions Email IT Support IT Services Quick Tips Gadgets Smartphones Google Efficiency Mobile Devices Small Business Mobile Office Disaster Recovery Business Continuity Virtualization Microsoft Office Computer Network Miscellaneous Upgrade Social Media User Tips Server Windows 10 VoIP Network Security Unified Threat Management Mobile Device Management Windows Innovation Communication Operating System WiFi Passwords Smartphone BYOD The Internet of Things Apps Remote Computing Mobile Computing Vendor Management Ransomware Marketing History Users Holiday Firewall Managed IT services Android Analytics Facebook Apple Collaboration Remote Monitoring IT Consultant Save Money Alert Content Filtering Big data Bring Your Own Device Office Health Data Management Automation Best Practice Going Green Windows 8 Wireless Technology Tech Support Lithium-ion Battery Hard Drives Hiring/Firing App Phone System Information Technology Browser BDR Spam Internet of Things Employer-Employee Relationship IBM Search Printer Budget Outsourced IT Outlook Phishing Productivity Virus Gmail Bandwidth Saving Time Humor Customer Service Education Managed IT Services Proactive IT Data storage Save Time Help Desk Computers Money Administration Maintenance Running Cable Government Business Intelligence SaaS Hosted Solution Recovery Mobile Device Risk Management Document Management Fax Server Computer Repair Black Market Hacker Encryption communications Tablet Telephone Systems Intranet Training Networking Update Avoiding Downtime Two-factor Authentication Wireless Website Travel IT Support Hard Drive Digital Payment Current Events Managed IT Solid State Drive Hacking PowerPoint Social Networking Flexibility Legal Office 365 Antivirus Twitter User Artificial Intelligence iPhone IT service Robot Cybercrime Co-managed IT Word Cloud Computing Cortana Compliance Password Lifestyle Cost Management Hack Downtime Statistics Processors USB Business Growth Presentation Company Culture Monitors Virtual Desktop Settings Streaming Media Inbound Marketing Programming Public Cloud YouTube Documents Heating/Cooling Cybersecurity Chrome Pain Points Politics End of Support Excel User Error Router Law Enforcement Computer Accessories Retail Automobile Comparison Experience Customer Relationship Management Augmented Reality Gaming Console How To Text Messaging Webcam VPN Laptop Paperless Office Taxes Office Tips Safety Social Uninterrupted Power Supply Computing Network Congestion Net Neutrality DDoS Sports Reliable Computing Data Protection Sync Virtual Reality CCTV Content Management Analytic Social Engineering Google Maps Scalability Corporate Profile Bluetooth In Internet of Things Music Video Surveillance Public Speaking Computing Infrastructure Emails Rental Service LinkedIn Upgrades Trending Saving ZTime Entrepreneur VoIP Memory LiFi Debate Harddrive HIPAA Business Managemenet Wi-Fi Meetings Archive Telephony Cabling Deep Learning Private Cloud Electronic Payment External Harddrive Electricity Flash Administrator Point of Contact Visible Light Communication IP Address Supercomputer Worker Machine Learning Human Resources Thin CLient Smart Phones Get More Done WannaCry Distributed Denial of Service Advertising Google Wallet Printer Server Skype Banking Employer Employee Relationship File Sharing Licensing Displays Leadership Teamwork Digital Language Botnet Unified Communications Business Metrics Drones Device Management Disaster Storage PDF Permissions Keyboard Best Available Access Computer Malfunction Chromebook Mobility online Currency Upselling Domains Securty Webinar Product Reviews Read Messenger Writing switches eWaste Shortcut Value Spyware Work/Life Balance Motion Sickness Download Tracking Mouse Troubleshooting Environment Books Windows 10 Staffing Cryptocurrency Competition GPS Best Practives Web Server Microchip Workers Google Docs Business Owner Reading Start Menu Regulations IT consulting Microserver Cleaning Ebay Application 3D Hacks Samsung Recycling CIO Specifications Relocation G Suite Windows XP Turn Key Society Pirating Information Adminstration Trojan Digital Signature Identity Theft Physical Security Notifications Tablets Micrsooft Organize Entertainment

hp supplies medallionLarge2017