MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

FREE Printout: Dos and Don’ts of IT Security

FREE Printout: Dos and Don’ts of IT Security

The following guide is designed to be used by business owners and office managers as an educational resource to establish some basic IT security best practices in the workplace. Feel free to print it out and hand it out or post it in common areas.

You work on important things. Let’s all work together to make sure they stay safe and secure.

Don’t Share Confidential Information

  • Don’t provide sensitive company or customer information in unsolicited emails or phone calls.
  • It’s important to remember that the bad guys can be very convincing and what they do tricks a lot of users. Being on the lookout for anything suspicious will help protect confidential information.
  • Emailing usernames and passwords is never a good idea.
  • Be especially cautious of suspicious emails that look like they are from PayPal or a bank.

Use Strong Passwords

  • Don’t reuse the same password for multiple accounts.
  • Passwords should contain capital and lowercase letters, numbers, and symbols.
  • Passwords should not contain personally identifiable information like social security numbers or dates of birth.

Avoid Accessing Sensitive Information on Unprotected Computers

  • Hotel business centers and Internet cafes typically aren’t regulated or secure. Accessing sensitive information on public devices could allow others to access it as well.
  • Malicious software could allow others to snoop on what you are doing, and gather usernames, passwords, and credit card information.
  • Ask your IT department about establishing a VPN to allow safe access while traveling.

Avoid Leaving Sensitive Information Lying Around

  • Don’t keep passwords on sticky notes.
  • Shred documents that contain confidential information.
  • Don’t leave mobile devices, laptops, or desktops unlocked when you aren’t at them.
  • Use Windows key + L to quickly lock your computer when stepping away.
  • Small devices like phones, portable hard drives, and flash drives are easy to lose or steal. Be wary of this while traveling.

Report Anything Suspicious to IT

  • If we know about it, we can fix it quickly before it becomes a bigger problem.
  • If you’ve lost your smartphone or another device, report it immediately.

**Note: If you have a service agreement with MERIT Solutions that includes end-user support, don’t hesitate to provide our number and support email so your staff can put in tickets.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, July 20 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Network Security Business Computing Hackers Malware Software Internet Productivity Hosted Solutions Managed IT Services Business Management Backup Mobile Devices google Computer Disaster Recovery Outsourced IT Business Microsoft Hardware communications Business Continuity VoIP IT Support Windows 10 Innovation Email User Tips IT Services Cybersecurity Data Backup Efficiency Tech Term Cybercrime Windows Data Recovery Server Ransomware Saving Money Internet of Things Mobile Device Management Mobility Small Business Managed IT Apps Productivity Data Smartphone Operating System Law Enforcement browser Virtualization BDR Money Save Money Telephone Systems Office 365 Android Phishing Cloud Computing Passwords Smartphones Data Security Hosted Solution Quick Tips BYOD Automation Chrome Managed Service Provider Communication VPN Information Technology Recovery Network Password Holiday IT Support Microsoft Office Hacking Google Drive Avoiding Downtime Two-factor Authentication upgrade Social Wireless Alert Health Miscellaneous App Vulnerability Risk Management Computers Unsupported Software Social Media Best Practice Facebook Data Breach Government Work/Life Balance Cost Management Budget Wi-Fi Data Management Application Update Gadgets Workplace Tips Collaboration Politics Streaming Media Telephony USB Cleaning Save Time search Spam Private Cloud Office tips Applications History Users Identity Theft Remote Computing Managed IT Services Proactive IT User Error Artificial Intelligence Flexibility Shortcut The Internet of Things Gmail Router Firewall Employer-Employee Relationship Antivirus Current Events Audit Tech Support Data Protection Compliance Personal Information Wireless Technology Social Engineering Blockchain Value Commerce Apple iPhone Cortana Mobile Security Saving Time Mobile Computing Patch Management Devices WiFi Windows 10 Office Transportation Going Green Computer Care Phone System Google Assistant Bandwidth Robot eWaste Legal Encryption Wireless Charging Excel Fraud End of Support Data Storage OneNote Big Data Networking Disaster Humor Education Project Management Vendor Management Data Loss SaaS Marketing MSP Google Docs Samsung Sports IT solutions Content Filtering Battery DDoS HaaS Hacker Solid State Drive Internet Exlporer Redundancy Management Television Automobile Travel Storage App store compaq Avoid Downtime Shadow IT Credit Cards Financial Technology WIndows Server 2008 Device Security Hard Disk Drive Wearable Technology Root Cause Analysis Document Management Bring Your Own Device Tablets Identities hp PDF Experience FAQ Printing Augmented Reality domain Hybrid Cloud NFL IoT Lifestyle Identity Business Intelligence Text Messaging Touchscreen Video Games Virtual Reality Charger Outlook Spyware Scam remote Business Technology Word Language Legislation Data Privacy Managed IT Service Yahoo Music Computer Forensics iOS Running Cable Employer Employee Relationship Server 2008 Wasting Money Windows Ink Uninterrupted Power Supply Comparison Hard Drive Ali Rowghani Analytics Laptop Instant Messaging Evernote PowerPoint Trending Regulation Edge Keyboard Computer Fan Computer Accessories Worker Commute Amazon Google Maps Virus Specifications Chromebook Mobile Device Screen Mirroring Touchpad Reputation Managing Stress Wireless Internet Sync Ciminal Dark Web Meetings server installation dvd "cannot install required files" Advertising Virtual Assistant Software as a Service Proactive Sales Smart Tech Cast stock Books Emails Scalability Workers Gamification Adobe Hiring/Firing Websites Settings Data storage Alexa for Business Retail Connectivity tweet How To Administration Chromecast Updates Memory Licensing Benefits WannaCry Data Theft calculator Conferencing Content Filter Unified Threat Management HBO Twitter Webinar control Colocation Microsoft Word Students Mobile intranet Microsoft Excel Computing Training Remote Monitoring Hard Drives Entertainment Files Gifts Monitoring Upgrades WSJ Electronic Medical Records IT solutions Exchange Point of Sale Administrator Unified Communications Lithium-ion battery Professional Services IT budget File Sharing Analysis Distributed Denial of Service Company Culture altivista HIPAA Black Market Consultant IT Management Maintenance Safety Windows 10s Smart Technology Nanotechnology SBS Relocation Access Financial Emergency Worker CrashOverride Thank You Congratulations Cache Monitors

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...