Network Synergy Blog

FREE Printout: IT Security End-User Checklist

FREE Printout: IT Security End-User Checklist

This guide was created so that business owners, office managers, and IT departments can provide it as an educational resource to showcase some of the most basic IT security practices that can be implemented in your workplace. We recommend printing this out and handing it out to your staff for maximum results.

Your work is important, but so is staying safe and sound. By working together, we can protect this business.

Avoid Sharing Confidential Information

  • Don’t give out company or customer information to unsolicited emails or phone calls.
  • Hackers can be very convincing and have a lot of tricks up their sleeves. Always be wary of suspicious activity, especially in regard to confidential or sensitive information.
  • Never email usernames and passwords to anyone--not even yourself.
  • Be cautious of suspicious messages that come from sources like PayPal, Amazon, or a bank.

Use Strong Passwords

  • Don’t use the same password for multiple accounts.
  • Use complex passwords that contain both upper and lower-case letters, numbers, and symbols.
  • Don’t include personally identifiable information in your passwords.

Don’t Access Sensitive Information on Unprotected Devices

  • You shouldn’t expect hotels and cafes to have secure wireless connections. Never access sensitive information from public computers or devices, as others could also access it.
  • Malware could potentially allow onlookers to steal information like usernames, passwords, and credit card information from your unsecured devices.
  • Ask your IT department about installing a VPN on your device for maximum security.

Don’t Leave Sensitive Information Lying Around

  • Avoid recording passwords on sticky notes.
  • Shred or destroy documents that contain sensitive information.
  • Always lock your devices before moving away from them.
  • On a Windows device, use the Windows key + L to quickly lock your computer.
  • Keep small devices like phones, hard drives, and flash drives close at hand, especially while traveling.

Report Suspicious Activity to IT

  • We can fix things quickly if we know about them. This keeps the issue from becoming a bigger problem.
  • If you lose a device, like a smartphone or laptop, report it to us immediately.

Note: If you have a service agreement with Network Synergy that includes end-user support, please reach out to us at the provided phone number and email address to put in support tickets:

Phone: 203.261.2201

A QR Code Could Be your New Wi-Fi Password
Managed IT Services Provide Good Value for SMBs


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, December 17, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Alt Codes Saving Time Downtime Hard Drives Government Screen Reader Botnet Wireless Law Firm IT Employee-Employer Relationship Food Phone System Gaming Console BDR USB Print Server Internet of Things eBay Flexibility Social Workplace Tips Laptop Android Marketing Cleaning Managed Services Provider Tech Support Proactive IT Router Private Cloud Scary Stories Windows 8 Backups Black Market History 3D Printing Samsung Telephone Systems Analyitcs Instant Messaging End of Support Star Wars Ransomware Healthcare Features Uninterrupted Power Supply Compliance Cost Management Hosted Solutions GPS Development Disaster Unsupported Software Information IT Support IoT Automobile Business Intelligence Storage Charger Tip of the week Office YouTube Money Authentication Business Technology Wireless Technology Browser Unified Communications Settings Network Congestion Cloud Computing Paperless Office Saving Money Bandwidth Telephony Experience Trainging Cameras Logs 5G Automation Recovery Test Productivity Printing Networking Sports Training Address Macro CCTV Data Customer Relationship Management Black Friday Piracy Hosted Solution Chrome Microsoft Excel Malware Mobility Lenovo Mail Merge Managed IT Passwords Robot Internet Fun Emoji Service-based Business Asset Tracking Distributed Denial of Service CrashOverride Motion sickness IT Consulting Best Practices Enterprise Resource Planning Internet Exlporer Data Recovery communications Trending Cookies Cache Human Error Managed IT services Break Fix Electronic Health Records Cybercrime Bring Your Own Device Employer-Employee Relationship Vulnerabilities Administration Remote Monitoring and Management Save Time Refrigeration Work Station Documents Cables Virtual Reality Domains Digital Business Computing Entrepreneur Modem Software as a Service Disaster Resistance Redundancy Tablet Network Encryption Users Relocation Risk Management Co-managed IT Backup Superfish Identity Remote Computing Server Computer Repair Halloween Alerts Public Speaking Display Wires Current Events Mobile Data Chatbots Utility Computing Computer Managed Service Provider LiFi Education Access Control IT budget Google Analytics Going Green SaaS Travel Spam Office Tips Favorites Computer Accessories Theft Data Backup Google Calendar Website Data storage Multi-Factor Security Data Management Data Security Competition IT service Hiring/Firing Managed IT Services Business Management Statistics Unified Threat Management iPhone Scam Smartphone The Internet of Things Crowdsourcing Vendor Management Upgrade Personal Information Data Loss Social Networking IT Services Tracking Read Only Gadgets Wi-Fi Management 3D Taxes Smart Tech Best Practice Upgrades File Sharing Big Data Email Recycling Augmented Reality Health Data Breach Assessment Virtual Private Network Google Gmail Infrastructure Security Shortcut E-Commerce Cortana Operations Printers Virtualization VoIP Patch Management Video Surveillance SharePoint Processors Communication Windows 8.1 Update Monitoring Mobile Device Motherboard Tutorials Cryptocurrency Spyware Digital Payment Digital Signature Apps Text Messaging Web Server Smartphones Congratulations Nanotechnology Hacks Mirgation High-Speed Internet LinkedIn Staffing Online Currency Unified Threat Management Software Mobile Office Language Mobile Running Cable Finance Monitors Vulnerability Twitter Time Management Streaming Media Search Windows 10 Authorization Skype Applications Server Management Fax Server Alert Hardware Disaster Recovery Websites Dark Web Privacy Writing Law Enforcement Microsoft Troubleshooting Physical Security Excel User Tips Managing Stress Bookmarks Computing Infrastructure Licensing Save Money Hotspot IT Consultant Typing Cloud Technology Artificial Intelligence IT Management Tip of the Work Consultation Application Mobile Computing Google Drive Outlook Collaboration Heating/Cooling Error Connectivity Permission Permissions Proactive Customer Service PDF User Error Undo Windows Cybersecurity Quick Tips Geography Specifications Backup and Disaster Recovery Document Management Bitcoin Virus Computers Mobile Technology Printer User Best Available Work/Life Balance Legal Technology Laws Tech Terms MSP Budget Microsoft Office Administrator Outsourced IT IP Address Humor Value Webcam Project Management IT Solutions Efficiency IT Technicians Techology Machine Learning Google Maps Google Wallet Remote Support Hard Disk Drive Legislation Hacking Enterprise Content Management Deep Learning Webinar Supercomputer Sync Corporate Profile Data Warehousing Employees Files Scheduling WPA3 Avoiding Downtime Operating System Regulation Wearable Technology WiFi Cyberattacks Consumers Bluetooth Blockchain Smart Technology Managed Service Mobile Device Management Cyber Monday CIO Secruity Innovation Fleet Tracking PC Care Intranet Start Menu App Zero-Day Threat Company Culture Retail Small Business Net Neutrality Mobile Security Remote Workers Apple Financial Downloads Network Management Buisness Word Point of Sale Virtual Desktop Inbound Marketing Comparison Business Continuity Help Desk Password Thank You Holiday Google Docs Maintenance Procurement Lithium-ion Battery Managed IT Service Safety Leadership Mobile Devices Debate Public Cloud Content Filtering Gadget Windows 10 Phishing Social Media How To Regulations Business Owner Staff Office 365 Software Tips Crowdfunding Meetings IBM Remote Monitoring Chromebook Antivirus Two-factor Authentication Business Growth Solid State Drive Tip of the Week Knowledge PowerPoint Electronic Medical Records Computing Notifications Consulting Cooperation RMM Business Identity Theft Migration Firefox Politics Servers Conferencing eWaste VPN Productivity Mouse Technology Tips Hackers OneNote BYOD IT Support Social Engineering Facebook Battery Information Technology Memory Miscellaneous Programming How To Hard Drive Environment G Suite Drones Fraud Presentation Cabling Touchscreen Network Security Hacker Tech Term Identities HIPAA Computer Care Firewall People

      Latest Blogs

      As the modern gift certificate, the gift card has become an institution, especially around the holidays. Thousands of companies offer statically-priced and reloadable gift cards. W...

      Latest News

      Our Site Has Launched!


      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.


      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube