Network Synergy Blog

FREE Printout: IT Security End-User Checklist

FREE Printout: IT Security End-User Checklist

This guide was created so that business owners, office managers, and IT departments can provide it as an educational resource to showcase some of the most basic IT security practices that can be implemented in your workplace. We recommend printing this out and handing it out to your staff for maximum results.

Your work is important, but so is staying safe and sound. By working together, we can protect this business.

Avoid Sharing Confidential Information

  • Don’t give out company or customer information to unsolicited emails or phone calls.
  • Hackers can be very convincing and have a lot of tricks up their sleeves. Always be wary of suspicious activity, especially in regard to confidential or sensitive information.
  • Never email usernames and passwords to anyone--not even yourself.
  • Be cautious of suspicious messages that come from sources like PayPal, Amazon, or a bank.

Use Strong Passwords

  • Don’t use the same password for multiple accounts.
  • Use complex passwords that contain both upper and lower-case letters, numbers, and symbols.
  • Don’t include personally identifiable information in your passwords.

Don’t Access Sensitive Information on Unprotected Devices

  • You shouldn’t expect hotels and cafes to have secure wireless connections. Never access sensitive information from public computers or devices, as others could also access it.
  • Malware could potentially allow onlookers to steal information like usernames, passwords, and credit card information from your unsecured devices.
  • Ask your IT department about installing a VPN on your device for maximum security.

Don’t Leave Sensitive Information Lying Around

  • Avoid recording passwords on sticky notes.
  • Shred or destroy documents that contain sensitive information.
  • Always lock your devices before moving away from them.
  • On a Windows device, use the Windows key + L to quickly lock your computer.
  • Keep small devices like phones, hard drives, and flash drives close at hand, especially while traveling.

Report Suspicious Activity to IT

  • We can fix things quickly if we know about them. This keeps the issue from becoming a bigger problem.
  • If you lose a device, like a smartphone or laptop, report it to us immediately.

Note: If you have a service agreement with Network Synergy that includes end-user support, please reach out to us at the provided phone number and email address to put in support tickets:

Phone: 203.261.2201
Email: support@netsynergy.com

A QR Code Could Be your New Wi-Fi Password
Managed IT Services Provide Good Value for SMBs
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, September 24, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Phishing Outlook Android Spam Automobile Fraud Presentation Document Management Users 3D Printing Tip of the Work Business Technology 3D Star Wars Supercomputer Cache Network Managing Stress Social Networking Best Available Google Drive Risk Management Chatbots How To Smartphones Saving Money Google Fleet Tracking Nanotechnology Two-factor Authentication Regulation Gaming Console Microsoft Office Inbound Marketing Save Time Buisness Servers Applications Congratulations Big Data Recycling Unsupported Software Apps Piracy Computing IT budget Travel Unified Threat Management Company Culture Meetings Crowdfunding Disaster Recovery Operations Upgrades Healthcare Hacks Computer Care Hiring/Firing Office Printers Tip of the Week Software Outsourced IT User Error Crowdsourcing Cybersecurity Software as a Service Managed IT Productivity Cabling eBay Data Cleaning Education Security Cortana Physical Security Taxes Facebook Public Speaking IT Consulting IT Technicians Technology Tips Cloud Virtualization Consumers Hard Drives App IT Support History Data Warehousing Screen Reader Monitors MSP Virus Productivity Digital Access Control Error Best Practice Battery Innovation Managed Services Provider Computer PC Care Excel Sports Passwords Business Intelligence Emoji Hacker Relocation Cost Management Apple Halloween WPA3 Law Enforcement Alerts Search Business Growth Microsoft GPS Internet Administration Deep Learning Google Docs Tablet CIO Windows Infrastructure Management Running Cable Service-based Business BDR Internet of Things Webinar IT Solutions Telephony Recovery Smart Tech Assessment Cables High-Speed Internet PowerPoint Scary Stories Work/Life Balance Laptop Superfish Refrigeration Maintenance Digital Payment Statistics Touchscreen Government Hosted Solution Computer Repair Text Messaging Best Practices Knowledge Gadgets Personal Information Server Server Management Charger Mail Merge Redundancy Scheduling BYOD People Google Wallet Data Breach Administrator Trending Smartphone Law Firm IT SaaS Hard Disk Drive Saving Time Wi-Fi Operating System Electronic Medical Records Computer Accessories Logs USB Hackers Staffing Motherboard Network Management Cooperation Black Market Botnet Typing Samsung communications Skype Downtime iPhone Proactive IT Experience Mobile Devices 5G Fun Bitcoin Website Secruity Virtual Desktop IT Services Social Media Files Notifications Video Surveillance Webcam Alert Social Engineering Information Technology Vulnerabilities Address Cameras Chromebook Value Business Technology Laws Start Menu Managed IT Service Debate Application Techology Wires Break Fix Hardware IT Support Documents Going Green Budget Humor Antivirus Tutorials Intranet Cyberattacks The Internet of Things Specifications Leadership Mobile Office Storage Social Hotspot Avoiding Downtime Print Server Writing Migration Artificial Intelligence User Tips Communication Entrepreneur CCTV Computing Infrastructure IP Address Heating/Cooling Bring Your Own Device Vulnerability Compliance Disaster Resistance Business Management Disaster Data Security Display Internet Exlporer Cookies Language Paperless Office Employee-Employer Relationship User Fax Server Content Filtering Memory Virtual Reality Alt Codes Customer Relationship Management Robot Encryption Multi-Factor Security Co-managed IT Windows 10 Office Tips Marketing Downloads Undo Development Email Point of Sale Mirgation YouTube Features Ransomware Read Only Shortcut Business Computing Word Augmented Reality Save Money IBM Bluetooth HIPAA Backups Privacy Mobile Data Data Backup Managed Service Provider IT Consultant Politics Managed IT services Smart Technology Health Staff Tech Support E-Commerce Upgrade Wearable Technology Twitter WiFi How To Cryptocurrency Regulations Public Cloud Vendor Management Managed Service Telephone Systems Drones Spyware Legislation Tip of the week Conferencing Environment Remote Workers Network Congestion Distributed Denial of Service Wireless Technology Google Analytics Lenovo Enterprise Resource Planning Data storage Black Friday Technology Utility Computing Tracking Unified Threat Management Printer Time Management Efficiency Backup Bandwidth Asset Tracking OneNote Office 365 IT service Chrome eWaste Solid State Drive Tech Term Remote Monitoring Miscellaneous Mobile Security Gadget Blockchain Corporate Profile Mobile Device VoIP Password Geography Data Loss Mobile Holiday VPN Permissions Google Maps SharePoint Identity Theft Lithium-ion Battery G Suite Machine Learning Safety Hard Drive Cloud Computing Small Business Printing Domains Sync Scam Project Management Cybercrime Firewall Customer Service Digital Signature Competition LiFi IT Management Mouse Retail CrashOverride Consulting Training Patch Management Employer-Employee Relationship Licensing Processors Flexibility Money Thank You Modem Wireless Collaboration Comparison Net Neutrality Managed IT Services PDF Quick Tips Help Desk Mobile Technology Windows 8 Proactive Analyitcs Business Owner Motion sickness Enterprise Content Management Malware Router Hosted Solutions Identity Windows 8.1 Update IoT Legal Trainging Remote Support Programming Browser Uninterrupted Power Supply Macro Electronic Health Records Streaming Media Mobile Computing Connectivity LinkedIn Dark Web Food Google Calendar Remote Computing Work Station Settings Data Recovery Online Currency Data Management Firefox Private Cloud Remote Monitoring and Management Mobility Current Events Hacking Unified Communications File Sharing Business Continuity Cyber Monday Workplace Tips Microsoft Excel Computers Information Automation Networking Monitoring End of Support Troubleshooting Virtual Private Network Software Tips Web Server Windows 10 Consultation Websites Identities Network Security Gmail Phone System Mobile Device Management

      Latest Blogs

      Technology support can be one of the major pain points for businesses, and it’s not something that your organization wants to invest in without thinking about the details. Technolo...

      Latest News

      Our Site Has Launched!

      flag

      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.

      callphone

      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube