MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

FREE Printout: Dos and Don’ts of IT Security

FREE Printout: Dos and Don’ts of IT Security

The following guide is designed to be used by business owners and office managers as an educational resource to establish some basic IT security best practices in the workplace. Feel free to print it out and hand it out or post it in common areas.

You work on important things. Let’s all work together to make sure they stay safe and secure.

Don’t Share Confidential Information

  • Don’t provide sensitive company or customer information in unsolicited emails or phone calls.
  • It’s important to remember that the bad guys can be very convincing and what they do tricks a lot of users. Being on the lookout for anything suspicious will help protect confidential information.
  • Emailing usernames and passwords is never a good idea.
  • Be especially cautious of suspicious emails that look like they are from PayPal or a bank.

Use Strong Passwords

  • Don’t reuse the same password for multiple accounts.
  • Passwords should contain capital and lowercase letters, numbers, and symbols.
  • Passwords should not contain personally identifiable information like social security numbers or dates of birth.

Avoid Accessing Sensitive Information on Unprotected Computers

  • Hotel business centers and Internet cafes typically aren’t regulated or secure. Accessing sensitive information on public devices could allow others to access it as well.
  • Malicious software could allow others to snoop on what you are doing, and gather usernames, passwords, and credit card information.
  • Ask your IT department about establishing a VPN to allow safe access while traveling.

Avoid Leaving Sensitive Information Lying Around

  • Don’t keep passwords on sticky notes.
  • Shred documents that contain confidential information.
  • Don’t leave mobile devices, laptops, or desktops unlocked when you aren’t at them.
  • Use Windows key + L to quickly lock your computer when stepping away.
  • Small devices like phones, portable hard drives, and flash drives are easy to lose or steal. Be wary of this while traveling.

Report Anything Suspicious to IT

  • If we know about it, we can fix it quickly before it becomes a bigger problem.
  • If you’ve lost your smartphone or another device, report it immediately.

**Note: If you have a service agreement with MERIT Solutions that includes end-user support, don’t hesitate to provide our number and support email so your staff can put in tickets.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 22 April 2018

Captcha Image

Tag Cloud

Security Tip of the Week Best Practices Technology Privacy Cloud Business Computing Hackers Network Security Malware Software Internet Hosted Solutions Backup Business Management Managed IT Services google Productivity Mobile Devices Microsoft VoIP Disaster Recovery Computer Business Continuity communications Business Outsourced IT IT Support Windows 10 Email User Tips IT Services Productivity Hardware Innovation Cybercrime Efficiency Data Backup Mobile Device Management Windows Managed IT Cybersecurity Small Business Apps Server Mobility Ransomware Operating System browser Data Smartphone Law Enforcement Internet of Things Save Money Saving Money Data Recovery Telephone Systems Android Virtualization Data Security Passwords Hosted Solution Quick Tips Phishing Communication Information Technology VPN Smartphones Recovery Cloud Computing Password Microsoft Office Holiday BYOD BDR Chrome Money Office 365 App Social Media Best Practice Two-factor Authentication Wireless Facebook Budget Collaboration Government Data Management IT Support Risk Management Unsupported Software Tech Term Update Gadgets Vulnerability Work/Life Balance Hacking Google Drive Avoiding Downtime Automation Wi-Fi Alert Health Social Miscellaneous upgrade Managed Service Provider Computers History search Personal Information Proactive IT Politics The Internet of Things USB User Error Cleaning Save Time Data Protection Network Identity Theft Windows 10 Flexibility Workplace Tips Shortcut Wireless Technology Spam Telephony Social Engineering Firewall Managed IT Services Application Antivirus Current Events Data Breach Audit Private Cloud Office tips Applications Going Green Compliance End of Support Bandwidth Blockchain Remote Computing Data Loss eWaste Marketing Automobile Google Docs Mobile Security Saving Time Disaster Humor Office Computer Care Phone System Employer-Employee Relationship Fraud Redundancy Legal Gmail Users Sports Encryption Commerce Tech Support Cortana Patch Management IT solutions Hacker Artificial Intelligence Internet Exlporer Solid State Drive Big Data DDoS Project Management Cost Management Excel Television iPhone SaaS Mobile Computing Data Storage Streaming Media Samsung Apple Transportation OneNote Content Filtering Battery WiFi Robot HaaS Emails Maintenance Point of Sale Sales Cast Adobe Company Culture HIPAA Workers remote Uninterrupted Power Supply Black Market Settings Consultant App store Laptop Safety Smart Technology Yahoo Device Security Retail Licensing WannaCry Value Identities Avoid Downtime Updates Server 2008 Shadow IT Running Cable Touchpad Reputation Webinar Ali Rowghani Devices Document Management Conferencing HBO Mobile Trending Advertising IoT Experience Microsoft Word Microsoft Excel Identity IT solutions Spyware Gifts Professional Services Language Data storage Video Games server installation dvd "cannot install required files" Virtual Reality File Sharing Data Privacy Administration Windows 10s Scam stock Chromecast IT Management Travel Nanotechnology Music Storage WIndows Server 2008 Colocation Hard Disk Drive Employer Employee Relationship tweet Edge Credit Cards Tablets Hard Drives Root Cause Analysis Virus Analytics Keyboard calculator Files Instant Messaging Computer Accessories Twitter Ciminal Administrator Worker Commute Lithium-ion battery FAQ NFL Augmented Reality Mobile Device Proactive control Touchscreen Managing Stress Lifestyle Business Intelligence Outlook Relocation WSJ Access Charger Scalability Word Websites Books Exchange Hiring/Firing altivista Education Legislation Managed IT Service Distributed Denial of Service iOS Vendor Management MSP Router Wireless Charging How To Windows Ink PDF Data Theft SBS Benefits compaq Comparison Regulation Computer Fan intranet Evernote Google Maps Text Messaging Unified Threat Management Wearable Technology Computing hp Specifications Screen Mirroring Sync Dark Web Training IT budget Entertainment Networking domain Software as a Service Meetings Upgrades Analysis Electronic Medical Records Cache Emergency Monitors Remote Monitoring Worker Thank You Hard Drive Congratulations CrashOverride

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...