The following guide is designed to be used by business owners and office managers as an educational resource to establish some basic IT security best practices in the workplace. Feel free to print it out and hand it out or post it in common areas.
You work on important things. Let’s all work together to make sure they stay safe and secure.
Don’t Share Confidential Information
- Don’t provide sensitive company or customer information in unsolicited emails or phone calls.
- It’s important to remember that the bad guys can be very convincing and what they do tricks a lot of users. Being on the lookout for anything suspicious will help protect confidential information.
- Emailing usernames and passwords is never a good idea.
- Be especially cautious of suspicious emails that look like they are from PayPal or a bank.
Use Strong Passwords
- Don’t reuse the same password for multiple accounts.
- Passwords should contain capital and lowercase letters, numbers, and symbols.
- Passwords should not contain personally identifiable information like social security numbers or dates of birth.
Avoid Accessing Sensitive Information on Unprotected Computers
- Hotel business centers and Internet cafes typically aren’t regulated or secure. Accessing sensitive information on public devices could allow others to access it as well.
- Malicious software could allow others to snoop on what you are doing, and gather usernames, passwords, and credit card information.
- Ask your IT department about establishing a VPN to allow safe access while traveling.
Avoid Leaving Sensitive Information Lying Around
- Don’t keep passwords on sticky notes.
- Shred documents that contain confidential information.
- Don’t leave mobile devices, laptops, or desktops unlocked when you aren’t at them.
- Use Windows key + L to quickly lock your computer when stepping away.
- Small devices like phones, portable hard drives, and flash drives are easy to lose or steal. Be wary of this while traveling.
Report Anything Suspicious to IT
- If we know about it, we can fix it quickly before it becomes a bigger problem.
- If you’ve lost your smartphone or another device, report it immediately.
**Note: If you have a service agreement with White Mountain IT Services that includes end-user support, don’t hesitate to provide our number and support email so your staff can put in tickets.
- Signs That Your Business Needs to Upgrade Your Crucial IT Chances are if you are in business today, there are a lot of devices on your network that you haven’t touched in years, might not be using, or don’t even need. Unfortunately, there are times when the technology you have doesn’t really do much other than take up space. If you feel like you are spendi...
- Could You Spot a Social Engineering Attack? As invaluable as the security solutions that protect a network are, they can be effectively rendered useless if a cybercriminal is skilled in social engineering. Social engineering is the practice of using manipulation to access protected resources, as we will review later. If your business and its ...
- Tip of the Week: Prime Your Business for a Successful 2019 As 2018 progresses, certain technologies and implementations are becoming more prominently used by businesses. These trends are anticipated to continue, so it only makes sense to embrace these technologies sooner rather than later. Today, we’ll review some of these technologies, why they are expecte...
- Tip of the Week: How Small Business Goes About Utilizing Tec... No matter how big a business is, it has to leverage at least some IT in order to be efficient. Unfortunately, some organizations are reluctant to implement new technology if they don’t seem to need it immediately. What these businesses don’t know is that the reason they typically don’t implement new...
- What To Do When You’ve Had Enough of Your Broken Technology Chances are that you’ve dealt with the following scenario: You are working along fine and you try to open an application only to be rebuked by an error message on the screen that tells you that there is some type of critical error. You close that out hoping that it was a one-time exception, but nope...
- The Future of IT; 2019 is The Year Your Business Hires a Man... Chances are that if you are a business owner that has been in business for a decade you’ve seen how emerging technologies have changed the face of business. Technologies like cloud computing have opened up opportunities for many businesses to get the powerful computing infrastructures they need with...