6 IT Security Tips for Your Workplace

Today’s business are heavily reliant on information technology. Your workstation or PC has become an asset in addition to it being the tool through which your perform. Due to its importance it is very important for you to consider these tips on how to secure your workstation:

  1. Gear Up: It is very important from a security perspective to stay up to date with the latest in the field:
    • Keep your operating system up to date with software patches and updates
    • Install Anti-virus Software and be sure it is continuously updated
    • Use strong passwords that are not easy to guess or crack.
    • Remove unnecessary applications or software that you don’t use.
  2. Back Up: Periodically backup copies of your data from your hard drive, especially if this data is critical to your business.
  3. Lock Up:  Make sure to physically secure backup devices (flash drives, external hard disks,  etc.) when away from your work area. Lock them away in a safe location.
  4. Be Aware: It is very important in terms of security for the end user to act in a secure fashion. For example you should never click on a link within an e-mail or visit a web site unless you are confident that it is trustworthy. Also, you should never open e-mail attachments from senders you don’t know. Furthermore, please don’t send around chain mail.
  5. Log Off: When leaving your workstation unattended you should always log off your account and make sure your workstation is protected by a strong password. Also, it is a good idea to use a screen lock screensaver set to a timing of between 3 to 5 minutes.
  6. Passwords: Keep your passwords to yourself don’t share them with your superiors, assistants, or coworkers. Only you should know you passwords. Also, be sure that your passwords are not written down on sticky notes or a piece of paper laying around anywhere in the office.
Share on facebook
Facebook
Share on twitter
Twitter
Share on linkedin
LinkedIn

More Posts

Benefits of Password Complexity

We’re sorry, your password must contain an uppercase letter, a number, a metaphor, a graffiti, a hieroglyph and the blood of a witch. Yes, but

Reach out

Re-Architect

This methodology requires the most effort to implement but it results in the most optimised recurring cost and will provide the best scalability for apps. This involves re-adapting the code of applications and the heavy use of SAAS solutions in order to replace existing hosted applications.

Re-Platform

This method utilizes the power of  PAAS services, like transferring a database to an as-a-service model,  the use of containers for some apps or the use of network/security functions as a service. Greater scalability and lower cost of operation is achieved.

Re-Host (Lift & Shift)

the migration of workloads from  to the cloud without changing the architecture. Machines get to keep their  OS and apps. This is the quickest and easy way to migrate, but since its  utilising IAAS, its is also the most expensive on the long term.