RCS Professional Services Blog

RCS Professional Services has been serving the New York area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 11 Security Best Practices Every User Should Know

Tip of the Week: 11 Security Best Practices Every User Should Know

You might spend a significant amount of time thinking about your business’s security practices, but the same can’t be said for your organization’s employees. Unless you give them a reason to care about security, they likely won’t. The resulting apathy could eventually become serious problems that could hinder operations in the long run, or worse, expose your business to threats that could put your employees and your clients in danger.

In order to keep these instances to a minimum, consult the following cheat sheet. This will give your employees a great way to follow critical best practices.

Essential Cybersecurity Considerations

  • Use the company’s network to store files: Always store your organization’s data on an in-house network. This is because any files stored locally on your desktop might not get backed up. Do not use personal cloud accounts, like Google Drive or Dropbox, to save or share company-owned documents.
  • Never leave your workstation unlocked and unattended: Always lock your computer using the Windows Key + L shortcut before stepping away from it, even if only for a moment.
  • Don’t connect unknown devices to your work PC: This is especially important for small devices like USB drives. You never know what could be on them.
  • Don’t download or install applications without approval: If you download an app without permission from IT or a network administrator, you could cause problems for other employees. Always ask for permission before downloading or installing software.
  • Don’t respond to unsolicited or suspicious emails: If you receive a message that has an unknown or unfamiliar sender, it could contain malicious ransomware or other nasty threats. Be sure to notify IT immediately so that they can investigate the issue. Be especially cautious around unsolicited proposals or resumes.
  • Don’t accept support from unexpected callers: If you receive a phone call from someone claiming to be from Microsoft support (or other well-known companies), just hang up. These callers are often fraudsters hoping to remote into your PC and access company information.
  • Adhere to password best practices: Keep your passwords strong and complex at all times, and never use the same password more than once.
  • Get approval for mobile devices from your manager: Don’t use your smartphone, tablet, or laptop for work purposes until you’ve been granted approval. This is to keep company data as secure as possible.
  • If you see someone, tell someone: If you think that something is out of the ordinary, like an intruder in the workplace, be sure to alert management. Visitors should not be allowed to roam around the office unattended.
  • Think twice before clicking: If you’ve received a link in any correspondence, you should avoid clicking on it until you’re sure it’s from a trusted source. Links can often be considered cyber threats, especially those that are in spam messages.
  • Report issues as soon as they appear: If you experience something that seems troublesome, report the issue to management immediately. Proactive vigilance is the best way to prevent downtime, and it only serves to make your job easier.

Print this list out and hand it off to any employees who could use training on security best practices.

Keeping the business secure isn’t just your responsibility--everyone should be involved in the process. By following this list of best practices, you stand to protect your business against threats that could harm operations. To learn more about how to secure your business, including external technology solutions that prevent issues from transforming into major problems, reach out to us at 212.532.9111.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 25 May 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Upcoming Events

No events

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Best Practices Technology microsoft Privacy Internet Tip of the Week Business Management Software workplace tips gadgets Mobile Office Small Business Email Backup Managed Service Provider Productivity Saving Money Cloud hardware Quick Tips Data Hackers Social Media Malware Business COmputing Google Smartphones Business Users Microsoft Office Hosted Solutions Mobile Devices Miscellaneous IT Support Innovation IT Services Virtualization Computer Upgrade WiFi Passwords Windows Efficiency Business Continuity User Tips Operating System Communication Android VoIP Mobile Computing Disaster Recovery The Internet of Things Server Holiday Smartphone Unified Threat Management Marketing Apple Windows 10 Windows 8 Alert Remote Computing IT Consultant Analytics Apps History Network Outlook Big data Content Filtering Going Green Facebook Mobile Device Management Office Health Lithium-ion Battery Data Management Firewall Excel Vendor Management Current Events Gmail Antivirus Browser Virus Humor Search Network Security Ransomware Printer Tutorials Hacking Wireless Technology Collaboration Social Networking Phishing PowerPoint Proactive IT Money Hard Drives Automation Bandwidth Employer-Employee Relationship Maintenance iPhone BYOD Best Practice Tech Support App Lifestyle Tablet Customer Relationship Management Hiring/Firing User Help Desk Sports Augmented Reality Social Remote Monitoring Save Time Spam Business Intelligence Safety Mobile Device Avoiding Downtime Bring Your Own Device Artificial Intelligence IBM Cybercrime Net Neutrality User Error Tip of the Week Pain Points Inbound Marketing BDR Downtime Data storage Laptop Administration Gaming Console Presentation Computer Repair Running Cable Digital Payment Phone System communications Saving Time Website Comparison Networking Save Money Retail Bluetooth Experience Chrome Education Computer Accessories Twitter YouTube Shortcut Black Market Deep Learning Troubleshooting Printer Server Staffing Environment Update LiFi Programming Mouse Co-Managed IT Streaming Media Competition Skype Business Growth Two-factor Authentication GPS Monitors Wearable Technology Disaster Online Currency Visible Light Communication Read VPN Get More Done Windows XP Application Harddrive Travel Google Wallet Office 365 3D Displays Business Owner Webinar Recovery Advertising Product Reviews Hosted Solution Hackeres Virtual Desktop End of Support Specifications Manages Service Provider Display Text Messaging Trending Documents intranet Information Technology Hiring/Firing Drones SaaS Public Speaking DDoS Writing Entertainment Ebay Statistics Securty Government Fax Server Unified Communications Analytic Law Enforcement Trojan Point of Sale Heating/Cooling Managed IT Services Computers Pirating Information Word External Harddrive Cryptocurrency Network Congestion Media Streaming Hacker Cortana Memory Password Touchscreen Internet of Things Entrepreneur Smart Phones Cleaning USB Upselling HIPAA Customer Service Processors Electronic Payment Debate Compliance Router LinkedIn Society Google Docs IP Address Wireless Phone Systems Encryption Document Management Teamwork Office Tips Storage File Sharing Company Culture Leadership Keyboard Music Robot Domains eWaste