FREE Printout: Dos and Don’ts of IT Security
The following guide is designed to be used by business owners and office managers as an educational resource to establish some basic IT security best practices in the workplace. Feel free to print it out and hand it out or post it in common areas.
You work on important things. Let’s all work together to make sure they stay safe and secure.
Don’t Share Confidential Information
- Don’t provide sensitive company or customer information in unsolicited emails or phone calls.
- It’s important to remember that the bad guys can be very convincing and what they do tricks a lot of users. Being on the lookout for anything suspicious will help protect confidential information.
- Emailing usernames and passwords is never a good idea.
- Be especially cautious of suspicious emails that look like they are from PayPal or a bank.
Use Strong Passwords
- Don’t reuse the same password for multiple accounts.
- Passwords should contain capital and lowercase letters, numbers, and symbols.
- Passwords should not contain personally identifiable information like social security numbers or dates of birth.
Avoid Accessing Sensitive Information on Unprotected Computers
- Hotel business centers and Internet cafes typically aren’t regulated or secure. Accessing sensitive information on public devices could allow others to access it as well.
- Malicious software could allow others to snoop on what you are doing, and gather usernames, passwords, and credit card information.
- Ask your IT department about establishing a VPN to allow safe access while traveling.
Avoid Leaving Sensitive Information Lying Around
- Don’t keep passwords on sticky notes.
- Shred documents that contain confidential information.
- Don’t leave mobile devices, laptops, or desktops unlocked when you aren’t at them.
- Use Windows key + L to quickly lock your computer when stepping away.
- Small devices like phones, portable hard drives, and flash drives are easy to lose or steal. Be wary of this while traveling.
Report Anything Suspicious to IT
- If we know about it, we can fix it quickly before it becomes a bigger problem.
- If you’ve lost your smartphone or another device, report it immediately.
**Note: If you have a service agreement with White Mountain IT Services that includes end-user support, don’t hesitate to provide our number and support email so your staff can put in tickets.
- Some of the Value that Cloud Computing Offers Cloud computing is a major player in the way that businesses are approaching their daily operations. This might bring into question whether or not your organization is actually using the cloud in the first place, but one thing is certain--if you haven’t implemented the cloud yet, it’s difficult to n...
- 4 Internal Threats Every Business Owner Should Understand In light of all the data leaks and vulnerabilities that have been brought to light over the past few years, network security has to be a priority for every business. One problem many organizations have is that while they are protecting their network and infrastructure from threats outside their comp...
- How to Compose a Successful Business Continuity Plan If you don’t consider the worst-case scenario when preparing your business’ disaster recovery strategy, you’ll inevitably suffer from it when it does happen. Taking into account all of these nuances is one of the main ways your organization can prepare for such an occasion. All of these instances ne...
- Would You Fall for this Adult Scam if You Saw an Old Passwor... As you may expect, the average Internet scammer isn’t above resorting to dirty tricks to claim their ill-gotten prize from their victims. A recent scam demonstrates just how dirty these tricks can truly be, and unfortunately, how ill-prepared many are to handle them. To preface this scam, we need...
- Getting to Know Technology: Hackers It doesn’t matter how much of a technology novice someone is, chances are, they’ve heard the term “hacker” before. A favorite character trope of Hollywood films and television dramas, these cybercriminals have appeared in productions like Die Hard and Mr. Robot with varying degrees of accuracy. Belo...
- Is It Safe to Have Your Browser Remember Your Passwords? Let’s be honest - not all of us have the best memories. This makes the ability for many browsers to remember our passwords seem like a godsend. However, is this capability actually a good thing for your cybersecurity? The answer may not surprise you. Nope! While yes, the fact that we no longer ha...