IT Security Tip #24: IT Security Tip #24: How to keep staff from unintentionally causing a security breach…

IT Security Tip #24: How to keep staff from unintentionally causing a security breach…

With so many points of access, from cell phones to laptop and home computers, how can anyone hope to keep their network safe from hackers, viruses and other unintentional security breaches? The answer is not “one thing”, but a series of things you have to implement and constantly be vigilant about, such as installing and constantly updating your firewall, antivirus, spam-filtering software and backups. This is why clients hire us and it’s a full-time job for someone with specific expertise.

Once that basic foundation is in place, the next most important thing you can do is create an Acceptable Use Policy (AUP) and TRAIN your employees on how to use company devices and the internet securely. Next teach them on other security protocols, such as never accessing company e-mail, data or applications with unprotected home PCs and devices (for example).

Also, teach them how to create good passwords and manage them, how to recognize a phishing e-mail, what websites to NEVER access, etc. NEVER assume your employees know everything they need to know about IT security. Threats are ever-evolving and attacks are getting more sophisticated and clever by the minute.

This e-mail and video series are are two great ways to keep your employees informed, but you STILL need a good AUP in place and training. If you have a management agreement with Cole Informatics, by the way, we offer FREE employee training on all of the above and its very inexpensive for everyone else. Drop us an email asking about PartnerUniversity if you’re interested. I’ve linked below a few examples of Acceptable Use Policies for your reference. Take advantage of them and get them in place with your staff right away.

https://www.sans.org/security-resources/policies/general/pdf/acceptable-use-policy

https://it.brown.edu/computing-policies/acceptable-use-policy

http://www.getsafeonline.org/themes/site_themes/getsafeonline/download_centre/Sample_Acceptable_Usage_Policy.pdf

https://www.webwise.ie/teachers/acceptable-use-policy/sample-acceptable-use-policies-2

“Cole Informatics designed the network based on our operational requirements, ordered the equipment and licensing for us and delivered exactly what we needed. They provided our remote offices with access to the main server, which we had before, but not in the capacity they were able to provide. As far as designing the network and meeting our needs, they came through on that!”

Computer Support
Tom Noland, Procurement Officer – Biloxi Housing Authority

Connect With Your IT Experts

80D South Broad St. PO Box 1373 Lexington, Tennessee 38351
731.249..5700
731.968.9983