Network Synergy Blog

Network Synergy has been serving the Trumbull area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

FREE Printout: IT Security End-User Checklist

FREE Printout: IT Security End-User Checklist

This guide was created so that business owners, office managers, and IT departments can provide it as an educational resource to showcase some of the most basic IT security practices that can be implemented in your workplace. We recommend printing this out and handing it out to your staff for maximum results.

Your work is important, but so is staying safe and sound. By working together, we can protect this business.

Avoid Sharing Confidential Information

  • Don’t give out company or customer information to unsolicited emails or phone calls.
  • Hackers can be very convincing and have a lot of tricks up their sleeves. Always be wary of suspicious activity, especially in regard to confidential or sensitive information.
  • Never email usernames and passwords to anyone--not even yourself.
  • Be cautious of suspicious messages that come from sources like PayPal, Amazon, or a bank.

Use Strong Passwords

  • Don’t use the same password for multiple accounts.
  • Use complex passwords that contain both upper and lower-case letters, numbers, and symbols.
  • Don’t include personally identifiable information in your passwords.

Don’t Access Sensitive Information on Unprotected Devices

  • You shouldn’t expect hotels and cafes to have secure wireless connections. Never access sensitive information from public computers or devices, as others could also access it.
  • Malware could potentially allow onlookers to steal information like usernames, passwords, and credit card information from your unsecured devices.
  • Ask your IT department about installing a VPN on your device for maximum security.

Don’t Leave Sensitive Information Lying Around

  • Avoid recording passwords on sticky notes.
  • Shred or destroy documents that contain sensitive information.
  • Always lock your devices before moving away from them.
  • On a Windows device, use the Windows key + L to quickly lock your computer.
  • Keep small devices like phones, hard drives, and flash drives close at hand, especially while traveling.

Report Suspicious Activity to IT

  • We can fix things quickly if we know about them. This keeps the issue from becoming a bigger problem.
  • If you lose a device, like a smartphone or laptop, report it to us immediately.

Note: If you have a service agreement with Network Synergy that includes end-user support, please reach out to us at the provided phone number and email address to put in support tickets:

Phone: 203.261.2201
Email: support@netsynergy.com

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 April 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Botnet Dark Web Webcam Virtual Reality Hard Disk Drive Cortana Downtime Time Management eWaste Going Green Cooperation Specifications Microsoft Email Tutorials Mail Merge Language Telephony Outsourced IT Redundancy Remote Support Motherboard App Net Neutrality Printing Managed Service Provider Application Bitcoin Server Wi-Fi Computer Government Modem Backup Cryptocurrency Security Licensing Remote Computing Windows 8.1 Update Superfish IT Management YouTube Tracking Malware LinkedIn eBay Networking Operating System Privacy Service-based Business Business Continuity Hardware Data storage Servers Hiring/Firing Google Smartphone Word Secruity Password Customer Service Tablet Maintenance Piracy Spam Environment Managed IT Services G Suite Unified Threat Management Best Available CrashOverride Law Firm IT Trainging Hotspot Miscellaneous Health Managed IT Service Computing Infrastructure Recovery Nanotechnology Smartphones Black Friday Windows Internet of Things IT budget Fun Mobile Device Management Machine Learning Migration Current Events Files Ransomware Google Wallet Web Server Unified Threat Management User Macro Data Loss Print Server Deep Learning Smart Tech Error Virus Uninterrupted Power Supply How To Employer-Employee Relationship Lenovo Charger Facebook Fax Server Inbound Marketing IBM Typing Cloud Computing Crowdsourcing Cybersecurity BYOD Storage Relocation Office Chatbots Heating/Cooling Chromebook Thank You Tip of the Week Knowledge Productivity Collaboration VPN Alert Disaster Resistance Office 365 Personal Information Outlook Social IP Address Computers Physical Security Communication Windows 10 Data Breach Online Currency Technology Laws Blockchain Point of Sale Save Money Automation Budget Proactive IT Technology Emoji Laptop Mouse Marketing Work Station Motion sickness Buisness Computing Software Tips Gadgets Sports Efficiency Virtualization Social Engineering Legal Information Technology Router Social Media Data Security Money Mobile Security Halloween Video Surveillance WiFi Business Windows 10 Sync Retail Identities Wireless Technology Alerts Upgrades Wearable Technology Business Owner Public Speaking Best Practice Data Management Domains Congratulations Electronic Medical Records PowerPoint Screen Reader Microsoft Excel Consultation Unified Communications Safety Printer Corporate Profile Google Drive communications GPS IT Solutions Operations Business Computing CIO Firewall Gaming Console Risk Management Logs Touchscreen Processors Gadget Entrepreneur End of Support Mobility Law Enforcement Debate Wireless Internet User Tips VoIP Vulnerability People Gmail IT Support Identity Theft IT Consultant Work/Life Balance Access Control Twitter Notifications Big Data USB Conferencing Cost Management Administrator Computer Repair Undo Vendor Management Travel Flexibility Digital Tech Support LiFi Artificial Intelligence Data Recovery Training Assessment Search Connectivity History Administration Smart Technology Managed IT services Data Digital Payment Analyitcs Cookies Robot Memory Webinar Writing Data Warehousing Browser Co-managed IT IT Technicians Social Networking IT Services Mirgation Business Technology Cleaning BDR Best Practices Workplace Tips Cyber Monday Network Security Compliance Private Cloud Automobile Saving Money Recycling Leadership File Sharing Statistics Phishing Antivirus Scheduling Hard Drives Distributed Denial of Service Mobile Devices Alt Codes Apps Techology Solid State Drive Chrome Cybercrime Business Intelligence Google Maps Server Management PDF Disaster Staff Tip of the Work Value Avoiding Downtime Crowdfunding Encryption Regulations Disaster Recovery Firefox Websites Google Docs Public Cloud Microsoft Office Virtual Private Network Troubleshooting Data Backup Competition Tech Term IT Support Content Filtering Productivity Drones Mobile Computing Hosted Solutions Mobile Data Break Fix Paperless Office Passwords SaaS Hacking Battery Hacks Saving Time Settings HIPAA Documents Politics Remote Monitoring Users Cabling Hacker Innovation PC Care Legislation Cloud Windows 8 User Error Running Cable Bandwidth IT Consulting Small Business Software as a Service Trending Google Analytics Taxes Office Tips Excel Permissions Mobile Device Help Desk Business Management Document Management Shortcut Cameras Mobile Technology Presentation Infrastructure Streaming Media Meetings Scary Stories Consumers Applications Skype Programming Website iPhone Fraud SharePoint Tip of the week Project Management Network Management Multi-Factor Security Hosted Solution Monitors 3D Printing Bluetooth Network Start Menu Comparison Supercomputer Upgrade Holiday Augmented Reality Backups Scam 3D Computer Accessories IT service Android Lithium-ion Battery Spyware Customer Relationship Management Black Market Network Congestion Company Culture Software Hackers Business Growth Google Calendar Experience The Internet of Things Digital Signature Intranet Address CCTV 5G Downloads Quick Tips Unsupported Software Text Messaging Virtual Desktop Apple Staffing Computer Care Two-factor Authentication Mobile Office Refrigeration Samsung Display Patch Management Phone System Bring Your Own Device Save Time Internet Exlporer Identity Telephone Systems Humor Education Managed IT Food Technology Tips

      Latest Blogs

      It’s critical that you protect your business’ important assets, including perhaps the most important of all: its data. One of the best ways to do this is by implementing a solid ba...

      Latest News

      Our Site Has Launched!

      flag

      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.

      callphone

      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube