• Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to secondary navigation
  • Skip to primary sidebar
  • Skip to footer

Before Header

  • Facebook
  • LinkedIn
  • Twitter

Landon Technologies

Technology Support Services and Solutions

  • IT SUPPORT SERVICES
  • CYBERSECURITY
  • EDUCATIONAL
  • PRODUCT GUIDES

Mobile Menu

  • Managed IT Services
  • Cybersecurity
  • About
  • Contact
  • Facebook
  • LinkedIn
  • Twitter

Top 6 Best Cyber Security Tips for Employees

By //  by TechWriter

Nobody likes to be told what they can’t do. Still, there are certain never do’s that you should keep in mind when it comes to your work computer. This cyber security tips for employees article captures the top six things you should avoid doing on your work computer.

Secure login training and cyber security tips for employees

#1 – Cyber Security Tips for Employees (Don’t login to personal sites and services)

Sure, we’re all guilty of wanting to check our personal email or take a quick peek at social media while at work, but you do not want to login to your personal accounts on a work computer, especially not a shared one!

Browsers that remember our passwords to sites such as Facebook or your bank can be useful. How many different passwords can one human be expected to remember, after all? But letting the browser save your personal access credentials risks your security. The next person to use that computer could access your private data.

#2 Don’t allow remote access

Maybe your computer isn’t working the way you want it to; it’s too slow. Something is up with an app. You’re worried you’ve inadvertently downloaded malware onto your work device. Then there’s that friend you have that “knows computers.” With remote support software being so easy to use these days, you figure it’s easier to ask your friend for help. Work doesn’t even need to know.

But would you let that friend walk into the office and start working on your computer? Probably not. Your business has its own people it trusts to do work on its computers. If you were on-site, you’d tell your supervisor, or at least IT, if you had a computer concern. Even when working virtually, you want to do the same thing.

Allowing remote access is both a security and productivity risk. Plus, your computer could be set in a specific way by your company. Your tech-savvy friend isn’t going to know why and how those particular configurations were established.

#3 Cyber Security Tips for Employees: Don’t store personal data

We’re all in favor of having more than one backup. Still, you don’t want to make your work computer a storage solution for your personal data, because you can’t be sure that other people at work can’t look through your files.

You also run the risk of losing access to that data if the company goes out of business or lays staff off. Employee accounts can be wiped out by businesses when they sever relationships with staff.

#4 Don’t connect personal storage devices

USB or thumb drives are convenient, as such drives help move data around easily. But the drive can be installed in many different computers and networks along the way. Connecting that USB to a work computer could transfer malware.

You really don’t want to connect someone else’s storage device to your work computer. Criminals actually target organizations by leaving infected thumb drives in the parking lot. All they need is one person to pick up the drive and plug it in to a work computer. Trying to reunite the drive with its user didn’t work out so well for that Good Samaritan!

#5 Don’t do your side business or job search

You don’t want to do these on a work computer unless you want to risk getting caught, because your computer activity can be tracked. Some businesses do full-blown screen recording. Others will maintain an overview of sites you visit.

There are different laws in various states and countries regarding employee monitoring, but you are using a work device on a business network. Doing your own side project during work hours on the business computer won’t go over well.

#6 – And the Last Cyber Security Tips for employees (Don’t log on to public Wi-Fi)

Don’t log in to business applications or sensitive data connected to public Wi-Fi. There are many risks. You could end up:

  • opening yourself up to “man-in-the-middle” hackers
  • connecting to a malicious hotspot
  • transmitting data on an unencrypted network

These never do’s could endanger your personal data, business network, or your very job. Steer clear of these common mistakes made on work computers. Be smart, be safe.

Need help setting up a personal or work computer? We can help. Our IT experts can also install virtual private networks or other tools to protect your work computers. Contact us today at 888-596-3998!

Filed Under: Cybersecurity

Looking for immediate answers to your questions?

You May Also Be Interested In:

Is A2hosting A Quality Hosting Provider?

How Do I Know When My Laptop Battery Needs Replacing?

Outsourced Help Desk for CPAs and Accountants

Less Common Cyberattacks for Accountants

Top 3 Considerations for Online Client Meetings

The Many Benefits of Cloud Computing for Accountants

All About Cloudways Hosting

Why You Need to Uninstall Adobe Flash Player

Bluehost: What You Need to Know

Previous Post: « The Benefits of Microsoft Intune for Your Business
Next Post: Local PC Repair Business vs Big Box Computer Repair »

Primary Sidebar

RECENT POSTS

Is A2hosting A Quality Hosting Provider?

Disclaimer: This website may contain links to affiliate …

How Do I Know When My Laptop Battery Needs Replacing?

Your laptop computer may feel like a lifeline. It has everything …

Outsourced Help Desk for CPAs and Accountants

Accountants are experts at surviving the “busy season.” Tax …

Less Common Cyberattacks for Accountants

Check the news any given day and you might see a report about …

Top 3 Considerations for Online Client Meetings

Many businesses were teleconferencing before COVID-19. After …

The Many Benefits of Cloud Computing for Accountants

The public cloud services market has grown dramatically, and, …

All About Cloudways Hosting

Disclaimer: This website may contain links to affiliate …

Why You Need to Uninstall Adobe Flash Player

All good things must come to an end – it’s inevitable with …

Bluehost: What You Need to Know

Disclaimer: This website may contain links to affiliate …

Making Telehealth Security Top Priority

The use of telehealth has been growing rapidly over the past …

Healthcare Providers Must Prepare for IT Disasters

Healthcare professionals regularly handle the worst. Whether its …

Prevent Data Silos for Business Success

The volume of data in the world was predicted by International …

Tech Help for New Year’s Resolutions

Making New Year’s resolutions is a familiar habit in the Western …

Is Healthcare Compliance Good Enough?

The healthcare industry is a top target for cybercriminals. …

Why Life is Easier With Managed Services

That smile of relief when we fix someone’s technology is a gift …

Logitech MK235 Wireless Keyboard and Mouse – Buy Now

Landon Technologies, Inc is a participant in the Amazon …

What You Need to Know About Home Automation Services

Looking for Home Automation Services? Fifteen years ago, smart …

All You Need to Know About Password Policy Best Practices

News of a big brand suffering a data breach is all too common …

Will Office 2010 Still Work After 2020 and Beyond?

The question: Will Office 2010 still work after 2020? It may …

Here Are The Best Technology Solutions for Small Business in 2021

For many of us, 2021 can’t come soon enough, and we're hoping …

Footer

Follow Us

  • Facebook
  • LinkedIn
  • Twitter

Call Us: (888) 596-3998
Hours: Mon-Fri 8am-6pm

Our Services

  • Managed IT Services
  • CyberSecurity Consulting
  • IT Support Services
  • Network Installations
  • Network Support

Areas We Service

  • California
  • Florida
  • Georgia
  • New York
  • Texas
  • Privacy Policy
  • Terms and Conditions
  • Make a Payment
  • Blog
  • Sitemap

Site Footer

· Copyright © 2005-2020 · Landon Technologies, Inc. ·
»
«