RCS Professional Services Blog

RCS Professional Services has been serving the New York area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 11 Security Best Practices Every User Should Know

Tip of the Week: 11 Security Best Practices Every User Should Know

You might spend a significant amount of time thinking about your business’s security practices, but the same can’t be said for your organization’s employees. Unless you give them a reason to care about security, they likely won’t. The resulting apathy could eventually become serious problems that could hinder operations in the long run, or worse, expose your business to threats that could put your employees and your clients in danger.

In order to keep these instances to a minimum, consult the following cheat sheet. This will give your employees a great way to follow critical best practices.

Essential Cybersecurity Considerations

  • Use the company’s network to store files: Always store your organization’s data on an in-house network. This is because any files stored locally on your desktop might not get backed up. Do not use personal cloud accounts, like Google Drive or Dropbox, to save or share company-owned documents.
  • Never leave your workstation unlocked and unattended: Always lock your computer using the Windows Key + L shortcut before stepping away from it, even if only for a moment.
  • Don’t connect unknown devices to your work PC: This is especially important for small devices like USB drives. You never know what could be on them.
  • Don’t download or install applications without approval: If you download an app without permission from IT or a network administrator, you could cause problems for other employees. Always ask for permission before downloading or installing software.
  • Don’t respond to unsolicited or suspicious emails: If you receive a message that has an unknown or unfamiliar sender, it could contain malicious ransomware or other nasty threats. Be sure to notify IT immediately so that they can investigate the issue. Be especially cautious around unsolicited proposals or resumes.
  • Don’t accept support from unexpected callers: If you receive a phone call from someone claiming to be from Microsoft support (or other well-known companies), just hang up. These callers are often fraudsters hoping to remote into your PC and access company information.
  • Adhere to password best practices: Keep your passwords strong and complex at all times, and never use the same password more than once.
  • Get approval for mobile devices from your manager: Don’t use your smartphone, tablet, or laptop for work purposes until you’ve been granted approval. This is to keep company data as secure as possible.
  • If you see someone, tell someone: If you think that something is out of the ordinary, like an intruder in the workplace, be sure to alert management. Visitors should not be allowed to roam around the office unattended.
  • Think twice before clicking: If you’ve received a link in any correspondence, you should avoid clicking on it until you’re sure it’s from a trusted source. Links can often be considered cyber threats, especially those that are in spam messages.
  • Report issues as soon as they appear: If you experience something that seems troublesome, report the issue to management immediately. Proactive vigilance is the best way to prevent downtime, and it only serves to make your job easier.

Print this list out and hand it off to any employees who could use training on security best practices.

Keeping the business secure isn’t just your responsibility--everyone should be involved in the process. By following this list of best practices, you stand to protect your business against threats that could harm operations. To learn more about how to secure your business, including external technology solutions that prevent issues from transforming into major problems, reach out to us at 212.532.9111.


Comments 1

Jerry Jerry on Saturday, 27 May 2017 05:14

You have disseminated article with perfectly! I surely think this site needs a fair game plan extra thought. I'll probably be once again to examine allocates; an obligation of appreciation is all together for rate that data. I am happy to choose in your framework, found a wreck of important and supportive information! For ref college paper writing service

You have disseminated article with perfectly! I surely think this site needs a fair game plan extra thought. I'll probably be once again to examine allocates; an obligation of appreciation is all together for rate that data. I am happy to choose in your framework, found a wreck of important and supportive information! For ref [url=https://www.collegepaperwritingservices.com/]college paper writing service[/url]
Already Registered? Login Here
Sunday, 20 August 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Upcoming Events

No events

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Best Practices Technology microsoft Privacy Internet Tip of the Week Business Management Software workplace tips Small Business gadgets Mobile Office Backup Managed Service Provider Email Productivity Saving Money Cloud hardware Quick Tips Hackers Data Malware Social Media Google Business COmputing Smartphones Business Users Microsoft Office Hosted Solutions Mobile Devices WiFi Efficiency Miscellaneous IT Support Innovation IT Services Virtualization Computer Upgrade Windows Passwords Business Continuity User Tips Operating System Android Communication VoIP Smartphone Mobile Computing Apple Disaster Recovery Server The Internet of Things Holiday Unified Threat Management Marketing Windows 10 Remote Computing Windows 8 Alert IT Consultant Antivirus Analytics Apps History Mobile Device Management Office Health Network Outlook Ransomware Virus Search Big data Content Filtering Going Green Facebook Printer Tutorials Network Security Tip of the Week Firewall Lithium-ion Battery Excel Vendor Management Current Events Data Management Humor Gmail Browser Tech Support Automation Bandwidth App Employer-Employee Relationship Wireless Technology Collaboration Social Networking Best Practice PowerPoint Proactive IT Money Hacking Hard Drives Maintenance Phishing iPhone BDR BYOD Saving Time Digital Payment Phone System Cybercrime Comparison Bluetooth Lifestyle Computer Accessories Chrome Tablet Data storage Customer Relationship Management Presentation Running Cable communications Help Desk Website Sports Augmented Reality Spam Mobile Device Remote Monitoring Networking Business Intelligence Save Money Avoiding Downtime Retail Education Bring Your Own Device Experience Artificial Intelligence User Error IBM Pain Points Hiring/Firing Inbound Marketing Net Neutrality User Touchscreen Social Save Time Downtime Gaming Console Safety Laptop Administration SaaS Computer Repair Government Unified Communications Securty Heating/Cooling File Sharing Law Enforcement Managed IT Services Word Cryptocurrency Leadership Hacker Network Congestion Memory Cortana Printer Server Password Entrepreneur Twitter USB Cleaning Internet of Things Customer Service HIPAA Productivity Mouse GPS Processors Update Electronic Payment Compliance Skype Router Society Harddrive IP Address Wearable Technology Get More Done Google Docs Windows 10 VPN 3D Wireless Online Currency Webinar Encryption Travel Teamwork Document Management Storage Office Tips IT Management Company Culture Manages Service Provider Product Reviews Keyboard Music Domains Display Robot Text Messaging eWaste Time Management Trending YouTube Fax Server Shortcut Black Market Trojan Troubleshooting Deep Learning Ebay Environment Unified Threat Management Statistics Programming LiFi Staffing Streaming Media Analytic External Harddrive Competition Point of Sale Co-Managed IT Business Growth Two-factor Authentication Computers Monitors Pirating Information Websites Read Visible Light Communication Disaster Windows XP Smart Phones Application Media Streaming Google Wallet Upselling Office 365 Business Owner Displays Software as a Service Advertising Recovery Virtual Desktop Hackeres Hosted Solution Specifications End of Support Debate LinkedIn intranet Hiring/Firing Information Technology Documents Public Speaking Phone Systems Drones DDoS Entertainment Writing