Your Biggest Vulnerability May Come From Forgetting to Logout

b2ap3_thumbnail_your_workspace_400.jpgEven if you have the best network security tools in place, you can still fall victim to a major data breach, just by doing something as seemingly-harmless as not manually logging out of your online accounts.

Note that most of the threats that come from forgetting to logout are from within your office, like your co-workers. Now, you might think that all of your workmates are trustworthy, but this may not be the case. After all, “It’s always the person you least suspect.”

Before Logging Out of Your PC, Log Out of Your Online Accounts...
This might come as a surprise to many computer users, but just because you close your web browser, doesn’t necessarily mean that you’re logged out of your online account. Many online accounts require you to manually click “Log Off” for you to actually log off. The danger of not manually logging off like this is that the next person who opens your web browser will find your account to be open, and have easy access to it.

...Or Be Embarrassed.
On the annoying-yet-harmless side of this problem, leaving your account open like this could lead to some mischievous activity on your social media pages. A co-worker may post something in your name that’s completely out of character and everybody will have a good chuckle the next day.

...Or Worse.
However, that’s a best-case scenario. A less-than-kind person who comes along and finds your account open could easily have access to your email or bank account, which could lead to some serious identity theft issues.

In the same way, a hacker could remote into your PC while you're away and take control of it. This is often done via a trojan-type malware, or a variety of other ways. If you haven’t manually logged out of your accounts, then the hacker who controls your PC could easily access your accounts by opening your web browser, checking your bookmarks and history, and visiting each and every site of value. If they come across a site with an account still open, then they’re in. Next, all they have to do to lock you out is change your password as if they were you, and send the new password to their email account. This is one major headache that could have easily been avoided by just clicking “Log Off.”

The biggest disadvantage of falling victim to malicious activity like this is that you’re not around to stop it. Instead, you’re away from your desk, completely oblivious that your identity is being ripped off, and you won't figure it out until it’s too late. This is where remote security monitoring from White Mountain IT Services saves the day. With this service, we’re able to monitor your network’s activity and bring to your attention anything that seems suspicious, like the activity of a hacker, or even unauthorized access from an employee.

You may not always remember to logout of your accounts before going home for the day, but at least with White Mountain IT Services watching over your system, you won’t have to worry about it.

Related Articles

  • Tip of the Week: Download the Second Windows 10 Update of 20... Windows 10 just got a second update for 2018. Some experts think this many major updates to the OS is too many, but when you start to look at the features available through this second update, you may be happy that Microsoft has decided to release it (and re-release it). Today, we’ll take a look at ...
  • Three Gifts for Your IT Resource The holiday season is here, and the spirit of giving is in the air. Why not give the IT professional in your life a few things that they’ve been wishing for all year? Here, we’ve compiled a list of things you can give them, some of which will cost you (and your business) nothing. Wish One: Securi...
  • Here’s How Companies Struggle with IT Security No business can be successful if it’s constantly suffering from data breaches. Therefore, you should take measures to mitigate the issues caused by these threats before they present themselves. Here are four of the biggest issues your business could face in the field of network security. Password...
  • Tip of the Week: Using Microsoft Word to Edit a PDF Document In case you’re looking for a nice alternative PDF file-editing software, the most recent version of Microsoft Word can do so. Since the investment for Adobe Acrobat isn’t for everyone, you can instead turn to the tried-and-true all-purpose word processing software to edit your PDF files. Open the P...
  • Can You Spot the Signs of a Malicious Link? The Internet is notorious for being a minefield of threats, many of which lurk hidden behind innocent-looking links. In order to go about business safely, you need to be able to identify which links you can click; and, which should be skipped. Unfortunately, spotting fraudulent links isn’t an exact...
  • Is Your Password Security Up to Par? Passwords are all over the place these days, whether they’re required to access an online account, or access the devices used to open these accounts. While both types of passwords can make for ideal security conditions, this is only the case if the passwords are strong. If your passwords can be gues...
With the surge in the number of small and medium businesses that have fallen prey to malware and cyber criminals, there is a lot of focus of what an organization can do to prevent being a victim and how the company should handle themselves after an attack. There is another key factor to preventing cyber criminals from penetrating into your network:...

- Onsite Service Coverage Area -

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH and then down into Boston. From Northern and Central Mass we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.



White Mountain IT Services
33 Main Street Suite 302
Nashua, New Hampshire 03064


 padlock1  Cyber Security Toolkit

cloud desktop2 Cloud Desktop Login

Open Positions