IT Security DO’s & DON’Ts

Back to Blog

IT Security DOs & DON’Ts

IT Security DOs & DON’Ts

Security is the responsibility of all. Follow the guidelines in this blog and you’ll be helping to keep yourself, your colleagues and our business safe. Security sets us liberal to do what we do best. It’s simple and mostly wisdom. make sure you let your family and friends understand what to do too, so they’re safe online.

1. Don’t be tricked into freely giving confidential information

Don’t reply to emails or phone calls requesting confidential company information—including employee information, financial results or company secrets. It’s easy for an unauthorized person to call us and pretend to be an employee or one amongst our business partners. remain guard to avoid falling for this scam and report any suspicious activity to it. And shield your personal information just as closely.

2. Don’t use an unprotected pc

when you access sensitive information from a non-secure pc, like one in an internet restaurant or a shared machine at home, you set the information you’re viewing at risk. make sure your pc is running the latest approved security patches, antivirus and firewall. And you must work in user mode, not administrator mode, whenever possible.

3. Don’t leave sensitive information lying around the workplace

Don’t leave printouts containing personal information on your table. Lock them in a drawer or shred them. It’s very simple for a visitor to look down at your table and see sensitive documents. Keep your table tidy and documents locked away. It makes the workplace look more organized and reduces the risk of information leaks.

4. Lock your pc and mobile phone when not in use

Always lock your pc and mobile phone when you’re not using them. you work on vital things, and we need to make sure they keep safe and secure. locking your phone and pc keeps your information and contacts safe from prying eyes.

5. Stay alert and report suspicious activity

Always report if you have any suspicious activity in workplace to the IT team. part of our job is to prevent cyber-attacks and to make sure our information isn’t lost or stolen. All our jobs depend upon keeping our information safe. just in case something goes wrong, the quicker we know about it, the quicker we will deal with it.

6. Password-protect sensitive files and devices

Always password-protect sensitive files on your pc, USB, smartphone, etc. Losing things like phones, USB flash drives and laptops can happen to anyone. protecting your devices with sturdy passwords means that you make it improbably difficult for someone to break in and steal information.

7. Always use hard-to-guess passwords

Don’t use obvious passwords, like “password,” “cat,” or obvious character sequences on the QWERTY keyboard, like “asdfg” and “12345.” It’s higher to use complex passwords. * embrace different letter cases, numbers, and even punctuation. try to use completely different passwords for different websites and computers. So, if one gets hacked, your alternative accounts aren’t compromised.

8. Be cautious of suspicious emails and links

Don’t let curiosity get the simplest of you. invariably delete suspicious emails and links. Even gap or viewing these emails and links will compromise your laptop and make unwanted issues while not your information. Remember, if one thing appearance too smart to be true, it probably is.

9. Don’t connect personal devices without the OK from IT

Don’t connect personal devices like USB flash drives, MP3 players and smartphones while not permission from IT. These devices will be compromised with code waiting to launch as shortly as you plug them into a pc. discuss with IT about your devices and allow us to make the call.

10. Don’t install unauthorized programs on your work pc

Malicious applications often create as legitimate programs, like games, tools or even antivirus software. They aim to fool you into infecting your pc or network. If you wish an application and think it’ll be helpful, contact IT to investigate it for you before installing

social position advance

Share this post

Back to Blog