RCS Professional Services Blog

RCS Professional Services has been serving the New York area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 11 Security Best Practices Every User Should Know

Tip of the Week: 11 Security Best Practices Every User Should Know

You might spend a significant amount of time thinking about your business’s security practices, but the same can’t be said for your organization’s employees. Unless you give them a reason to care about security, they likely won’t. The resulting apathy could eventually become serious problems that could hinder operations in the long run, or worse, expose your business to threats that could put your employees and your clients in danger.

In order to keep these instances to a minimum, consult the following cheat sheet. This will give your employees a great way to follow critical best practices.

Essential Cybersecurity Considerations

  • Use the company’s network to store files: Always store your organization’s data on an in-house network. This is because any files stored locally on your desktop might not get backed up. Do not use personal cloud accounts, like Google Drive or Dropbox, to save or share company-owned documents.
  • Never leave your workstation unlocked and unattended: Always lock your computer using the Windows Key + L shortcut before stepping away from it, even if only for a moment.
  • Don’t connect unknown devices to your work PC: This is especially important for small devices like USB drives. You never know what could be on them.
  • Don’t download or install applications without approval: If you download an app without permission from IT or a network administrator, you could cause problems for other employees. Always ask for permission before downloading or installing software.
  • Don’t respond to unsolicited or suspicious emails: If you receive a message that has an unknown or unfamiliar sender, it could contain malicious ransomware or other nasty threats. Be sure to notify IT immediately so that they can investigate the issue. Be especially cautious around unsolicited proposals or resumes.
  • Don’t accept support from unexpected callers: If you receive a phone call from someone claiming to be from Microsoft support (or other well-known companies), just hang up. These callers are often fraudsters hoping to remote into your PC and access company information.
  • Adhere to password best practices: Keep your passwords strong and complex at all times, and never use the same password more than once.
  • Get approval for mobile devices from your manager: Don’t use your smartphone, tablet, or laptop for work purposes until you’ve been granted approval. This is to keep company data as secure as possible.
  • If you see someone, tell someone: If you think that something is out of the ordinary, like an intruder in the workplace, be sure to alert management. Visitors should not be allowed to roam around the office unattended.
  • Think twice before clicking: If you’ve received a link in any correspondence, you should avoid clicking on it until you’re sure it’s from a trusted source. Links can often be considered cyber threats, especially those that are in spam messages.
  • Report issues as soon as they appear: If you experience something that seems troublesome, report the issue to management immediately. Proactive vigilance is the best way to prevent downtime, and it only serves to make your job easier.

Print this list out and hand it off to any employees who could use training on security best practices.

Keeping the business secure isn’t just your responsibility--everyone should be involved in the process. By following this list of best practices, you stand to protect your business against threats that could harm operations. To learn more about how to secure your business, including external technology solutions that prevent issues from transforming into major problems, reach out to us at 212.532.9111.

 

Comments 1

Jerry Jerry on Saturday, 27 May 2017 05:14

You have disseminated article with perfectly! I surely think this site needs a fair game plan extra thought. I'll probably be once again to examine allocates; an obligation of appreciation is all together for rate that data. I am happy to choose in your framework, found a wreck of important and supportive information! For ref college paper writing service

You have disseminated article with perfectly! I surely think this site needs a fair game plan extra thought. I'll probably be once again to examine allocates; an obligation of appreciation is all together for rate that data. I am happy to choose in your framework, found a wreck of important and supportive information! For ref [url=https://www.collegepaperwritingservices.com/]college paper writing service[/url]
Already Registered? Login Here
Guest
Saturday, 21 October 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Upcoming Events

No events

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Best Practices Technology microsoft Privacy Internet Tip of the Week Software Business Management workplace tips Small Business Backup gadgets Mobile Office Email Managed Service Provider Cloud Productivity Saving Money hardware Quick Tips Data Hackers Malware Business COmputing Social Media Google Smartphones Users Microsoft Office Business Hosted Solutions Mobile Devices IT Services Efficiency Computer Virtualization Android IT Support Upgrade Windows WiFi Innovation User Tips Miscellaneous Passwords Business Continuity Tip of the Week Operating System Smartphone VoIP Communication Mobile Computing Server Unified Threat Management The Internet of Things Marketing Holiday Disaster Recovery Apple Windows 8 Alert Remote Computing Windows 10 Ransomware Apps Antivirus Analytics Network History IT Consultant Outlook Mobile Device Management Network Security Facebook Data Management Health Big data Content Filtering Going Green Office Virus Search Printer Tutorials Phishing Firewall Excel Vendor Management Current Events Gmail Browser Lithium-ion Battery Humor Collaboration Maintenance PowerPoint communications Windows 10 Best Practice Proactive IT Money Hard Drives Artificial Intelligence Tech Support App Hacking iPhone BDR BYOD Automation Bandwidth Employer-Employee Relationship Wireless Technology Social Networking IT Support Pain Points VPN Inbound Marketing Presentation Help Desk Augmented Reality Running Cable Sports Remote Monitoring Spam Data Backup Encryption Business Intelligence Website Gaming Console Networking Save Money Retail Experience Education IBM Unified Communications Net Neutrality Law Enforcement Hiring/Firing Lifestyle Disaster Touchscreen User Downtime Social Save Time Laptop Administration Data storage Safety Computer Repair Saving Time Digital Payment Scam SaaS Phone System Productivity DDoS Mobile Device Government Comparison Cybercrime Avoiding Downtime Bluetooth Computer Accessories Bring Your Own Device Word Chrome Tablet Data Recovery User Error Customer Relationship Management Processors LiFi Electronic Payment Wearable Technology Online Currency Managed IT Compliance Business Growth Router Smart Phones Travel Data Security Monitors IP Address Managed IT Services Wireless Upselling Visible Light Communication Google Wallet Teamwork Storage Product Reviews Audit Displays Text Messaging Advertising Company Culture Display Trending Patch Management Hosted Solution Keyboard Phone Systems Printing End of Support Domains Ebay Start Menu Information Technology eWaste Statistics Redundancy YouTube Drones Shortcut Troubleshooting Analytic Point of Sale Writing Pirating Information Cybersecurity Staffing Environment Programming Computers Project Management Streaming Media Competition Co-Managed IT Two-factor Authentication Media Streaming Managed IT Services IT Management Cryptocurrency Printer Server Read Emergency Windows XP Network Congestion Application Office 365 Business Owner Memory Debate Time Management Recovery GPS Cleaning Hackeres LinkedIn Business Technology Virtual Desktop Legal Harddrive Specifications Get More Done Unified Threat Management Documents 3D Society intranet Webinar Hiring/Firing Google Docs Public Speaking Entertainment File Sharing Websites Securty Document Management Manages Service Provider Knowledge Leadership Office Tips Heating/Cooling Computer Care Software as a Service Music Fax Server Twitter Tech Terms Robot Hacker Google Maps Cortana Password Trojan Mouse Internet of Things Black Market Entrepreneur USB Update External Harddrive HIPAA Skype Access Control Deep Learning Customer Service