RCS Professional Services Blog

RCS Professional Services has been serving the New York area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 11 Security Best Practices Every User Should Know

Tip of the Week: 11 Security Best Practices Every User Should Know

You might spend a significant amount of time thinking about your business’s security practices, but the same can’t be said for your organization’s employees. Unless you give them a reason to care about security, they likely won’t. The resulting apathy could eventually become serious problems that could hinder operations in the long run, or worse, expose your business to threats that could put your employees and your clients in danger.

In order to keep these instances to a minimum, consult the following cheat sheet. This will give your employees a great way to follow critical best practices.

Essential Cybersecurity Considerations

  • Use the company’s network to store files: Always store your organization’s data on an in-house network. This is because any files stored locally on your desktop might not get backed up. Do not use personal cloud accounts, like Google Drive or Dropbox, to save or share company-owned documents.
  • Never leave your workstation unlocked and unattended: Always lock your computer using the Windows Key + L shortcut before stepping away from it, even if only for a moment.
  • Don’t connect unknown devices to your work PC: This is especially important for small devices like USB drives. You never know what could be on them.
  • Don’t download or install applications without approval: If you download an app without permission from IT or a network administrator, you could cause problems for other employees. Always ask for permission before downloading or installing software.
  • Don’t respond to unsolicited or suspicious emails: If you receive a message that has an unknown or unfamiliar sender, it could contain malicious ransomware or other nasty threats. Be sure to notify IT immediately so that they can investigate the issue. Be especially cautious around unsolicited proposals or resumes.
  • Don’t accept support from unexpected callers: If you receive a phone call from someone claiming to be from Microsoft support (or other well-known companies), just hang up. These callers are often fraudsters hoping to remote into your PC and access company information.
  • Adhere to password best practices: Keep your passwords strong and complex at all times, and never use the same password more than once.
  • Get approval for mobile devices from your manager: Don’t use your smartphone, tablet, or laptop for work purposes until you’ve been granted approval. This is to keep company data as secure as possible.
  • If you see someone, tell someone: If you think that something is out of the ordinary, like an intruder in the workplace, be sure to alert management. Visitors should not be allowed to roam around the office unattended.
  • Think twice before clicking: If you’ve received a link in any correspondence, you should avoid clicking on it until you’re sure it’s from a trusted source. Links can often be considered cyber threats, especially those that are in spam messages.
  • Report issues as soon as they appear: If you experience something that seems troublesome, report the issue to management immediately. Proactive vigilance is the best way to prevent downtime, and it only serves to make your job easier.

Print this list out and hand it off to any employees who could use training on security best practices.

Keeping the business secure isn’t just your responsibility--everyone should be involved in the process. By following this list of best practices, you stand to protect your business against threats that could harm operations. To learn more about how to secure your business, including external technology solutions that prevent issues from transforming into major problems, reach out to us at 212.532.9111.

Comments 1

 
Jerry Jerry on Saturday, 27 May 2017 05:14

You have disseminated article with perfectly! I surely think this site needs a fair game plan extra thought. I'll probably be once again to examine allocates; an obligation of appreciation is all together for rate that data. I am happy to choose in your framework, found a wreck of important and supportive information! For ref college paper writing service

You have disseminated article with perfectly! I surely think this site needs a fair game plan extra thought. I'll probably be once again to examine allocates; an obligation of appreciation is all together for rate that data. I am happy to choose in your framework, found a wreck of important and supportive information! For ref [url=https://www.collegepaperwritingservices.com/]college paper writing service[/url]
Already Registered? Login Here
Guest
Saturday, 24 June 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Upcoming Events

No events

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Best Practices Technology microsoft Privacy Internet Tip of the Week Business Management Software workplace tips gadgets Mobile Office Small Business Email Backup Managed Service Provider Productivity Saving Money Cloud hardware Quick Tips Hackers Data Social Media Malware Google Smartphones Business COmputing Business Users Microsoft Office Hosted Solutions Mobile Devices Miscellaneous Innovation Computer Virtualization IT Services Upgrade WiFi IT Support Passwords Windows Efficiency User Tips Business Continuity Operating System Communication Mobile Computing VoIP Android The Internet of Things Holiday Disaster Recovery Smartphone Server Apple Unified Threat Management Marketing Windows 10 Alert Remote Computing Windows 8 IT Consultant Analytics History Apps Network Big data Content Filtering Outlook Going Green Mobile Device Management Office Facebook Health Browser Antivirus Firewall Excel Vendor Management Current Events Network Security Virus Humor Ransomware Search Data Management Lithium-ion Battery Gmail Printer Tutorials Proactive IT Money Automation Hard Drives Bandwidth Employer-Employee Relationship iPhone BYOD Best Practice Maintenance Hacking Wireless Technology Collaboration Phishing Social Networking Tech Support App PowerPoint Lifestyle Cybercrime Artificial Intelligence IBM Tip of the Week Net Neutrality BDR Mobile Device Downtime Laptop Presentation Avoiding Downtime Running Cable Bring Your Own Device Administration communications Computer Repair Website Saving Time Digital Payment Phone System User Error Networking Save Money Retail Pain Points Experience Inbound Marketing Comparison Education Bluetooth Chrome Computer Accessories Tablet Hiring/Firing Gaming Console Customer Relationship Management User Data storage Social Save Time Help Desk Sports Augmented Reality Safety Remote Monitoring Spam Business Intelligence Display Text Messaging SaaS Public Speaking Document Management DDoS Office Tips Entertainment Trending Printer Server Securty Government Ebay Heating/Cooling Music Robot GPS Statistics Analytic Word Point of Sale Computers Harddrive Pirating Information Get More Done Hacker Black Market Cortana Deep Learning Password 3D Webinar Internet of Things Entrepreneur LiFi Media Streaming USB Touchscreen HIPAA Customer Service Business Growth Processors Monitors Electronic Payment Manages Service Provider Compliance Router Visible Light Communication Debate IP Address Google Wallet Wireless Displays LinkedIn Fax Server Encryption Advertising Teamwork Storage Trojan Hosted Solution End of Support Company Culture External Harddrive Keyboard Information Technology File Sharing Domains Drones Writing eWaste Leadership Smart Phones YouTube Shortcut Unified Communications Troubleshooting Upselling Law Enforcement Staffing Managed IT Services Environment Twitter Programming Streaming Media Competition Cryptocurrency Co-Managed IT Network Congestion Update Mouse Two-factor Authentication Disaster Memory Skype Read Phone Systems Windows XP Application Cleaning Wearable Technology Office 365 Online Currency Business Owner VPN Recovery Travel Hackeres Virtual Desktop Society Google Docs Specifications Documents Product Reviews intranet Hiring/Firing