Network Synergy Blog

Network Synergy has been serving the Trumbull area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

FREE Printout: IT Security End-User Checklist

FREE Printout: IT Security End-User Checklist

This guide was created so that business owners, office managers, and IT departments can provide it as an educational resource to showcase some of the most basic IT security practices that can be implemented in your workplace. We recommend printing this out and handing it out to your staff for maximum results.

Your work is important, but so is staying safe and sound. By working together, we can protect this business.

Avoid Sharing Confidential Information

  • Don’t give out company or customer information to unsolicited emails or phone calls.
  • Hackers can be very convincing and have a lot of tricks up their sleeves. Always be wary of suspicious activity, especially in regard to confidential or sensitive information.
  • Never email usernames and passwords to anyone--not even yourself.
  • Be cautious of suspicious messages that come from sources like PayPal, Amazon, or a bank.

Use Strong Passwords

  • Don’t use the same password for multiple accounts.
  • Use complex passwords that contain both upper and lower-case letters, numbers, and symbols.
  • Don’t include personally identifiable information in your passwords.

Don’t Access Sensitive Information on Unprotected Devices

  • You shouldn’t expect hotels and cafes to have secure wireless connections. Never access sensitive information from public computers or devices, as others could also access it.
  • Malware could potentially allow onlookers to steal information like usernames, passwords, and credit card information from your unsecured devices.
  • Ask your IT department about installing a VPN on your device for maximum security.

Don’t Leave Sensitive Information Lying Around

  • Avoid recording passwords on sticky notes.
  • Shred or destroy documents that contain sensitive information.
  • Always lock your devices before moving away from them.
  • On a Windows device, use the Windows key + L to quickly lock your computer.
  • Keep small devices like phones, hard drives, and flash drives close at hand, especially while traveling.

Report Suspicious Activity to IT

  • We can fix things quickly if we know about them. This keeps the issue from becoming a bigger problem.
  • If you lose a device, like a smartphone or laptop, report it to us immediately.

Note: If you have a service agreement with Network Synergy that includes end-user support, please reach out to us at the provided phone number and email address to put in support tickets:

Phone: 203.261.2201
Email: support@netsynergy.com

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, July 17, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Networking Vulnerabilities Scam Infrastructure communications Redundancy IBM Hotspot Secruity Retail Cookies Cybercrime Webcam Telephony Humor Hard Drives Language Hard Disk Drive Smartphone Chromebook Enterprise Content Management Logs Tip of the Week Refrigeration Modem Patch Management Tablet Smartphones Cryptocurrency Apps IT Consulting Tracking Wireless Technology Managed IT Service Travel Heating/Cooling Error Managed IT Services Technology Tips Analyitcs Laptop Firefox Government Safety Business Growth Computing Trainging Technology Proactive IT Processors Spyware Backup Word Business Management Fraud Best Available Text Messaging Print Server Wi-Fi Remote Support Wireless Tutorials Fun Motion sickness Webinar IT Consultant Tip of the Work Mobile Devices Managed Service Provider Gadgets Health Identities Backups Education Maintenance Bandwidth Disaster Resistance Undo Mirgation Supercomputer Telephone Systems Buisness Apple Documents Techology Public Cloud Assessment Star Wars Phone System Microsoft Office Politics Programming Software as a Service Mail Merge Skype Augmented Reality Cloud Nanotechnology Law Enforcement Smart Technology Saving Time Relocation Healthcare Social Engineering 5G Sports Customer Service Legal Gmail Cybersecurity Google Calendar Superfish Management Data Security Staffing Mobile Downloads Cost Management Macro Storage SaaS Vendor Management Data Backup Comparison Identity Theft Microsoft Applications Twitter Computer Accessories Motherboard Experience Firewall Small Business WiFi Tech Term Private Cloud Presentation Dark Web Virtual Desktop Communication Server Management Crowdfunding Piracy Risk Management CIO Employer-Employee Relationship Point of Sale Windows 8.1 Update CCTV Consultation Help Desk Data Gaming Console The Internet of Things Computers Big Data Cameras People Trending Recovery Printer Hiring/Firing Privacy App Cooperation Google Maps Memory Bring Your Own Device Microsoft Excel Mobile Device Office Congratulations IoT Leadership Mobile Office Running Cable Drones Excel Office Tips Consumers Identity YouTube Unified Communications Collaboration Public Speaking Administration Blockchain Email Development Battery Automation User Tips Money Virtual Private Network BYOD Miscellaneous Facebook Display USB Servers IT Support Digital Signature Typing Upgrade Monitors Streaming Media Inbound Marketing Hacks Application User Computing Infrastructure Data Loss Innovation Entrepreneur Internet Exlporer Document Management Virtualization Halloween History Unsupported Software Scary Stories Network Congestion Screen Reader Cloud Computing Company Culture Debate Save Money Productivity Password Connectivity Deep Learning Data storage PowerPoint HIPAA Going Green How To User Error Upgrades IT Solutions Browser Project Management Efficiency Regulations 3D Video Surveillance Hard Drive Web Server Computer Repair Chrome Marketing Gadget Online Currency Samsung Sync Geography Botnet Cleaning Productivity LiFi Computer Care Data Breach Internet of Things Address Encryption Remote Monitoring Google Analytics Workplace Tips Phishing Passwords Unified Threat Management Law Firm IT Food Data Management Lenovo Social Emoji Meetings Fax Server Operating System Digital eWaste Hacking Wires Break Fix SharePoint Downtime Operations Statistics Work/Life Balance Scheduling Website Social Networking Shortcut Technology Laws Content Filtering Specifications Users Business Intelligence Thank You Alert Malware Ransomware Router Bitcoin Business Google Docs Mobile Security Net Neutrality IT Technicians Windows 10 Data Warehousing High-Speed Internet Software Service-based Business Holiday Printing Permissions Cyber Monday Mobile Device Management Crowdsourcing Licensing Recycling Office 365 Remote Computing Black Friday iPhone Competition Knowledge PDF Machine Learning Legislation Troubleshooting Start Menu Budget Spam Hacker Business Continuity Multi-Factor Security Network Security Compliance Cache Quick Tips Network Antivirus Information Technology Co-managed IT Google Drive Best Practice IT Support IT Management Mouse Hosted Solution GPS Mobile Technology Digital Payment Solid State Drive LinkedIn Best Practices Managed IT services BDR G Suite File Sharing Physical Security Software Tips Virus End of Support Lithium-ion Battery Value Managed IT Utility Computing Touchscreen Training Work Station Vulnerability Alerts Computer Virtual Reality Personal Information Flexibility Wearable Technology Search Staff CrashOverride Electronic Medical Records Corporate Profile Black Market Bluetooth Windows Tech Support Distributed Denial of Service Internet Google Hackers Tip of the week VPN Smart Tech Business Computing Two-factor Authentication Chatbots IT budget Paperless Office Alt Codes PC Care eBay Disaster Recovery Business Technology Outlook Time Management Access Control Websites Environment Customer Relationship Management 3D Printing Files Save Time IP Address Hosted Solutions Google Wallet Charger Domains Conferencing Automobile Enterprise Resource Planning Data Recovery Settings Social Media Unified Threat Management Avoiding Downtime Hardware IT Services VoIP Cables Administrator Android Windows 8 Robot Migration Business Owner Security Cortana Server Outsourced IT Mobility Notifications Taxes Intranet Managing Stress Writing Artificial Intelligence Disaster Uninterrupted Power Supply Network Management Windows 10 Cabling IT service Current Events Saving Money Mobile Data Mobile Computing

      Latest Blogs

      The Internet of Things means a lot more than just enhanced connectivity. In particular, you’ll have a considerable security risk associated with the Internet of Things. It’s clear ...

      Latest News

      Our Site Has Launched!

      flag

      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.

      callphone

      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube