THE DO’S AND DON’TS OF SECURITY IN THE WORKPLACE

By:  |  Category: Blog, Security Tuesday, September 12th, 2017  |  No Comments
security

Most modern employees consider themselves hyper aware of email security. But sadly enough, even hyper-awareness isn’t cutting it these days in an era of rampant cyber-attacks. Everyone need to be downright skeptical about emails–from clients, prospects, other employees and even your boss. Hackers play on typical habits and behaviors (AKA social engineering), which is why you might need to take a step back and evaluate where you are most susceptible.

Here are a few things to remember:

EMAIL AWARENESS
• DON’T open any email attachment unless you are absolutely certain that it is valid
• DON’T assume that since the email with attachment appears to have come from a “Senior Executive” or “Colleague” that it is legitimate. It is acceptable to call and validate prior to opening
• DO send IT Support as an attachment any emails that you are not 100% sure for verification
• DON’T ever click directly on any links in an email. It is considered safe practice to go straight the web site that is referenced and log in directly from there.
• DON’T send any data via email that is considered sensitive

PASSWORD SECURITY
• DO keep your password private and do not share with anyone under any circumstance
• DON’T write down your password anywhere especially around your workplace
• DO create passwords that are unique and difficult such as combinations of words, numbers, symbols and both upper and lower case letters.
• DO make your password as long as possible or consider using a Key Phrase that is 14 characters or more
• DON’T use any familiar items in your password. It is not difficult to find out your address, phone numbers, dog names, etc.
• DON’T use an alphabet sequence (lmnopqrst), a number sequence (12345678) or a keyboard sequence (qwertyuop).
• DO choose a line or two from a song or poem and use the first letter of each word, preceded or followed by a digit. (e.g “Do you know the way to San Jose?” becomes the password DYKtwTSJ?).
• DO change your password regularly only if you are able to maintain the level of complexity

CYBER SECURITY
• DON’T respond to emails or phone calls requesting confidential company information—including employee information, financial results, company secrets, or your password.
• DON’T use unprotected computers to access company or personal information. Internet Cafes, Hotel Computer, Kiosks are often loaded with viral software to record your exact keystrokes and report send that to hackers
• Do keep your office clean and free of any sensitive data. Lock them in a drawer or shred them. It’s very easy for a visitor to glance down at your desk and see sensitive documents.
• DO lock your computer when you leave your desk even if only for a few minutes.
• DO stay alert and report any suspicious activity to management.
• DON’T plug in personal devices into your computer (USB flash drives, MP3 players and smartphones) without permission from IT. These devices can be compromised with code waiting to launch as soon as you plug them into a computer.

SOCIAL MEDIA
• DON’T access via work computers for personal use

If your business needs help with cyber-security training or implementing a network security solution, give EnhancedTECH a call at 714-970-9330 x290 or contact us at sales@enhancedtech.com.

Samantha Keller

Samantha Keller

Director of Marketing and PR at EnhancedTECH
Samantha Keller (AKA Sam) is a published author, tech-blogger, event-planner and mother of three fabulous humans. Samantha has worked in the IT field for the last fifteen years, intertwining a freelance writing career along with technology sales, events and marketing. She began working for EnhancedTECH ten years ago after earning her Bachelor’s degree from UCLA and attending Fuller Seminary. She is a lover of kickboxing, extra-strong coffee, and Wolfpack football.Her regular blog columns feature upcoming tech trends, cybersecurity tips, and practical solutions geared towards enhancing your business through technology.
Samantha Keller

Latest posts by Samantha Keller (see all)

Leave a Comment
Read previous post:
Hurricane
Your Business: A Hurricane Survival Guide

Depending on your business type and location, the risk attached to a tropical storm or hurricane can vary. To help...

Close