i-Tech Support
  • About Us
  • IT Services
    • Managed Services
    • Professional Services
    • IT Consulting
    • Outsourced IT
    • Technology Assessment
    • Security & Compliance
      • Network Security Consulting & Auditing
      • Cybersecurity
      • CMMC Compliance
      • PCI Compliance Support & Consulting
    • Wireless Network Site Survey & Heat Mapping
    • Cloud Services
    • Cloud Computing
    • Data Center Hosting
    • Backup & Disaster Recovery
    • Microsoft Office 365
    • Wireless Network Support
    • Network Monitoring
    • Vendor Management
    • VoIP
  • Educational Technology
    • Educational Technology Services Overview
    • Professional Development
    • Instructional Coaching
    • Google for Education Certified Trainers
    • Partnership Plan
    • Orlando Learning Summit
  • Acumatica Cloud ERP
    • Acumatica Overview
    • Built For Your Business
    • Professional Services
    • Acumatica Case Study
  • Resources
    • Awards
    • Blogs
    • News & Events
  • Testimonials
  • Contact Us
  • Menu Menu

Cybersecurity Do’s and Don’ts

December 3, 2020/in blog /by Dan Stockman, President, i-Tech Support

Every employee and business unit shares responsibility for the cybersecurity of their company.

As an employee, YOU play a key role in protecting sensitive information and resources.

Following these Do’s and Don’ts is the best way you can protect your office from hackers.

DO use hard-to-guess passwords or passphrases.

A password should have at least 10 characters using uppercase letters, lowercase letters, numbers and special characters. To make it easy for you to remember, but hard for an attacker to guess, create an acronym. Pick a phrase that is meaningful to you, such as “My son’s birthday is 12 December, 2004.” Using that phrase as your guide, you might use Msbi12/Dec,4 for your password.

DO use different passwords for different accounts.

If one password gets hacked, your other accounts stay safe.

DO keep your passwords or passphrases confidential.

DON’T share them with others or write them down. You are responsible for all activities associated with your credentials.

DON’T leave sensitive information lying around the office.

DON’T leave printouts or portable media containing private information on your desk for anyone to see. Instead, lock them in a drawer.

DON’T post any private or sensitive information.

Do not post credit card numbers, passwords or other classified information on social media platforms or other public sites. Also, DON’T send these through email unless your manager tells you to do so.

DO use privacy settings on social media sites to restrict access to your personal information.

DO pay attention to phishing traps in email.

Watch for telltale signs of a scam AND pay extra attention to the email address. Also, beware of spoofing emails that forge the Email Address field.

DON’T ever change banking information or approve or send money via an email or phone call request that you receive. 

DON’T open mail or attachments from an untrusted source.

If you receive a suspicious email, the best thing to do is to delete the message and report it to your manager.

DON’T click on links from an unknown or untrusted source.

Cyber attackers often use links to trick you into visiting malicious sites and downloading malware that can be used to steal data and damage networks.

DON’T be tricked into giving away confidential information.

It’s easy for anyone to call and pretend to be an employee or business partner.

DON’T respond to phone calls or emails asking for confidential data.

DO destroy information properly when it is no longer needed.

Place paper in designated confidential destruction bins throughout the office, or use a crosscut shredder. For all electronic storage media, consult with IT.

DO be aware of your surroundings…

…especially when printing, copying, faxing or discussing sensitive information. Be sure to pick up pages from printers, copiers or faxes right away.

DON’T install unauthorized programs on your work computer.

Malicious applications often pose as legitimate software. Contact your IT support staff to check if an application may be installed.

DON’T plug in portable devices without permission from your agency management.

These devices may be compromised with code just waiting to launch as soon as you plug them into a computer.

DO lock your computer and mobile phone when not in use.

This protects your company and personal data from unauthorized access and use.

DON’T leave devices unattended.

Keep all mobile devices, such as laptops and cell phones physically secured. If a device is lost or stolen, report it immediately to your manager.

DON’T leave wireless or Bluetooth turned on when not in use.

Only do so when planning to use it and only in a safe environment.

DO report all suspicious activity and cyber incidents to your manager.

See someone you don’t know wandering around your office? Find out if they are supposed to be there. Also, keep all areas containing sensitive information physically secured with access given to authorized individuals only. Part of your job is making sure data is properly safeguarded, and is not damaged, lost or stolen.

For Cybersecurity Protection, talk to i-Tech Support

i-Tech, your Managed IT Services partner, is dedicated to

  • protecting your privacy,
  • safeguarding your organization’s information assets and infrastructure,
  • identifying and mitigating vulnerabilities,
  • detecting, responding to and recovering from cyber incidents,
  • and promoting cyber awareness and education.

We stand ready to help and support you in your cybersecurity risk management efforts.

To assess your organization’s technology security with a penetration test or for more information about our managed security services, please contact us.

Remember – cybersecurity is everyone’s responsibility!

Tags: cyberattacks, cybersecurity, data protection, hackers, phishing
Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Vk
  • Share on Reddit
  • Share by Mail
https://www.i-techsupport.com/wp-content/uploads/2020/12/cybersecuritydosdonts-copy.png 530 1200 Dan Stockman, President, i-Tech Support /wp-content/uploads/2019/06/blue-logo.svg Dan Stockman, President, i-Tech Support2020-12-03 14:41:002020-12-15 20:29:22Cybersecurity Do’s and Don’ts
You might also like
A Secure Network Starts with Your Front Line…Your Employees.
5 Ways Managed IT (Tech Support) can help achieve your goals
What is a professional Penetration Test?
What is Managed Cybersecurity?
WannaCry – How to Protect Your Business
Your Cybersecurity Go-To Guide
The Top 3 Data Security Mistakes Employees Make
Why your business needs a managed security partner
X

Contact Us

Questions about technology? You’ve come to the right place.

  • This field is for validation purposes and should be left unchanged.

Group 785

Email

info@i-techsupport.com

Call

(888) 298-9696 / (407) 265-2000

Office

2711 Rew Circle, Ocoee, FL 34761 GET DIRECTIONS
Serving all of Central FL, including Tampa and Orlando
Launch Screenconnect

Recent Posts

  • Acumatica Year-End Checklist
  • i-Tech Support named 2022 Fast 50 Company, “Ultimate Newcomer” to the Golden 100 by Orlando Business Journal
  • Microsoft is Disabling Basic Authentication and Requiring Use of Modern Authentication under OAuth 2.0 starting October 1, 2022*
  • i-Tech Support, The First Academy present Orlando Learning Summit in 2022
  • Emergency Connectivity Funds (ECF) are Available to Florida Schools Now. Make Sure Your Students Benefit.

Email

info@i-Techsupport.com

Call

Toll Free:

(888) 298-9696

Orlando:

(407) 265-2000

Miami:

(786) 706-0544

Office

2711 Rew Circle
Ocoee, FL 34761

Serving all of Central and South FL, including Tampa, Orlando and Miami

Newsletter Sign Up

Sign up to receive more information and exciting news every month!

  • We respect your privacy. We'll NEVER sell, rent or share your email address.
  • This field is for validation purposes and should be left unchanged.

Recent Resources

  • i-Tech Support named 2022 Fast 50 Company, “Ultimate Newcomer” to the Golden 100 by Orlando Business Journal

    Why this is a milestone for i-Tech.Read More »
  • Microsoft is Disabling Basic Authentication and Requiring Use of Modern Authentication under OAuth 2.0 starting October 1, 2022*

    This may impact apps.Read More »
© 2022 i-Tech Support All rights reserved. Sitemap
Reflections on the 2020 FCIS Annual Convention Phoenix Teachers, Earn EdTech Certifications to Formalize your New Skills
Scroll to top