By:  |  Category: Blog, Security Tuesday, September 12th, 2017  |  No Comments

Most modern employees consider themselves hyper aware of email security. But sadly enough, even hyper-awareness isn’t cutting it these days in an era of rampant cyber-attacks. Everyone need to be downright skeptical about emails–from clients, prospects, other employees and even your boss. Hackers play on typical habits and behaviors (AKA social engineering), which is why you might need to take a step back and evaluate where you are most susceptible.

Here are a few things to remember:

• DON’T open any email attachment unless you are absolutely certain that it is valid
• DON’T assume that since the email with attachment appears to have come from a “Senior Executive” or “Colleague” that it is legitimate. It is acceptable to call and validate prior to opening
• DO send IT Support as an attachment any emails that you are not 100% sure for verification
• DON’T ever click directly on any links in an email. It is considered safe practice to go straight the web site that is referenced and log in directly from there.
• DON’T send any data via email that is considered sensitive

• DO keep your password private and do not share with anyone under any circumstance
• DON’T write down your password anywhere especially around your workplace
• DO create passwords that are unique and difficult such as combinations of words, numbers, symbols and both upper and lower case letters.
• DO make your password as long as possible or consider using a Key Phrase that is 14 characters or more
• DON’T use any familiar items in your password. It is not difficult to find out your address, phone numbers, dog names, etc.
• DON’T use an alphabet sequence (lmnopqrst), a number sequence (12345678) or a keyboard sequence (qwertyuop).
• DO choose a line or two from a song or poem and use the first letter of each word, preceded or followed by a digit. (e.g “Do you know the way to San Jose?” becomes the password DYKtwTSJ?).
• DO change your password regularly only if you are able to maintain the level of complexity

• DON’T respond to emails or phone calls requesting confidential company information—including employee information, financial results, company secrets, or your password.
• DON’T use unprotected computers to access company or personal information. Internet Cafes, Hotel Computer, Kiosks are often loaded with viral software to record your exact keystrokes and report send that to hackers
• Do keep your office clean and free of any sensitive data. Lock them in a drawer or shred them. It’s very easy for a visitor to glance down at your desk and see sensitive documents.
• DO lock your computer when you leave your desk even if only for a few minutes.
• DO stay alert and report any suspicious activity to management.
• DON’T plug in personal devices into your computer (USB flash drives, MP3 players and smartphones) without permission from IT. These devices can be compromised with code waiting to launch as soon as you plug them into a computer.

• DON’T access via work computers for personal use

If your business needs help with cyber-security training or implementing a network security solution, give EnhancedTECH a call at 714-970-9330 x290 or contact us at [email protected]


source image: https://www.pexels.com/photo/photography-of-a-person-pointing-on-something-684387/

Leave a Comment
Read previous post:
Your Business: A Hurricane Survival Guide

Depending on your business type and location, the risk attached to a tropical storm or hurricane can vary. To help...