Your Biggest Vulnerability May Come From Forgetting to Logout

b2ap3_thumbnail_your_workspace_400.jpgEven if you have the best network security tools in place, you can still fall victim to a major data breach, just by doing something as seemingly-harmless as not manually logging out of your online accounts.

Note that most of the threats that come from forgetting to logout are from within your office, like your co-workers. Now, you might think that all of your workmates are trustworthy, but this may not be the case. After all, “It’s always the person you least suspect.”

Before Logging Out of Your PC, Log Out of Your Online Accounts...
This might come as a surprise to many computer users, but just because you close your web browser, doesn’t necessarily mean that you’re logged out of your online account. Many online accounts require you to manually click “Log Off” for you to actually log off. The danger of not manually logging off like this is that the next person who opens your web browser will find your account to be open, and have easy access to it.

...Or Be Embarrassed.
On the annoying-yet-harmless side of this problem, leaving your account open like this could lead to some mischievous activity on your social media pages. A co-worker may post something in your name that’s completely out of character and everybody will have a good chuckle the next day.

...Or Worse.
However, that’s a best-case scenario. A less-than-kind person who comes along and finds your account open could easily have access to your email or bank account, which could lead to some serious identity theft issues.

In the same way, a hacker could remote into your PC while you're away and take control of it. This is often done via a trojan-type malware, or a variety of other ways. If you haven’t manually logged out of your accounts, then the hacker who controls your PC could easily access your accounts by opening your web browser, checking your bookmarks and history, and visiting each and every site of value. If they come across a site with an account still open, then they’re in. Next, all they have to do to lock you out is change your password as if they were you, and send the new password to their email account. This is one major headache that could have easily been avoided by just clicking “Log Off.”

The biggest disadvantage of falling victim to malicious activity like this is that you’re not around to stop it. Instead, you’re away from your desk, completely oblivious that your identity is being ripped off, and you won't figure it out until it’s too late. This is where remote security monitoring from White Mountain IT Services saves the day. With this service, we’re able to monitor your network’s activity and bring to your attention anything that seems suspicious, like the activity of a hacker, or even unauthorized access from an employee.

You may not always remember to logout of your accounts before going home for the day, but at least with White Mountain IT Services watching over your system, you won’t have to worry about it.

Related Articles

  • 4 Internal Threats Every Business Owner Should Understand In light of all the data leaks and vulnerabilities that have been brought to light over the past few years, network security has to be a priority for every business. One problem many organizations have is that while they are protecting their network and infrastructure from threats outside their comp...
  • What Could Possibly Be Wrong with Your Computer? Slow computers are one of the small annoyances in an office that can implicate a much larger issue is hidden. The frustration stems from not being able to get anything done, whether it’s because the computer isn’t responding to your commands or it’s so slow that you can’t accomplish anything notewor...
  • Tip of the Week: Keyboard Shortcuts to Save You Time Even the simplest tasks in the office can eat up a surprising amount of time over the span of a year. For example, did you know that switching from your keyboard to your mouse can consume up to eight full work days every year? By taking advantage of keyboard shortcuts, you can cut down on the amount...
  • Tip of the Week: Easy to Remember Tricks for Windows 10 Working with your computer for so much of the day means you need to get as much productivity out of it as possible. If you can speed up some of the ways you access specific information, you can get even more done. Shortcuts are very helpful to this end. Here are some of the easiest and best ways you...
  • Tip of the Week: Evaluating and Assessing Risk Whenever you decide to implement something in your information technology strategy, you accept some level of risk. Understanding and managing this risk is crucial to your business’ success. For this week’s tip, we’ll review how to manage your IT risks and what your options are. Understanding IT R...
  • Tip of the Week: How to Dominate OneNote Microsoft’s OneNote application is great for taking notes, but its functionality is much more than just that. We’ll be sharing some of our favorite tips and tricks to help you make the most of your OneNote. Of course, you might just think you can do the exact same thing with a simple pen and pad ...
With the surge in the number of small and medium businesses that have fallen prey to malware and cyber criminals, there is a lot of focus of what an organization can do to prevent being a victim and how the company should handle themselves after an attack. There is another key factor to preventing cyber criminals from penetrating into your network:...

- Onsite Service Coverage Area -

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH and then down into Boston. From Northern and Central Mass we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.



White Mountain IT Services
33 Main Street Suite 302
Nashua, New Hampshire 03064


 padlock1  Cyber Security Toolkit

cloud desktop2 Cloud Desktop Login

Open Positions