If you are a part of the IT department, then you would know that how important and difficult it is to ensure the security of the equipment that are being used in corporate environments. This blog discusses 7 good practices that can be important contributors in securing the IT system.
You can set up a password for the home network to ensure that it is well protected. There is a need to lock your computer down and do not leave it open/ connected when it is not in use. This will result in saving your bandwidth as well.
1. Be careful with the password
Set up a strong password for your network as well as your system. Lock it whenever you’re not around to avoid peeping Toms from going through your confidential data. You must also be careful about your password. Do not share it with anyone. It should be designed in such a way that it is neither difficult to remember it nor very easy so that anybody could succeed in guessing it.
2. Entrust ‘Guest network’ for the non-managed devices
In case of non-managed devices you can use ‘Guest network’ to manage them well without putting in so many resources. Since you are not monitoring them directly, you need to keep them at a separate location away from that of the main data as you cannot view its status. The data at the non-managed center is more vulnerable than the one that is being taken care of by your IT department.
3. Protect your mobile device(s) with a password
Imagine an important official email spilled out unknowingly from your mobile? The effects could be anywhere from dangerous to disastrous. To avoid such situations, you should protect your device with a password. Your device should be in your control and not in others’.
4. Be extra careful with your company’s data
If you are using Dropbox, be careful as important data related to ITRs and mortgage applications may be leaked out. If a shareable link is created on it, anybody (whether registered or non-registered) can have access to that data.
5. Put an ‘Incident Response Team’ in place
If you have formulated a security plan, ensure that you have also put in place an incident response team. This team would help you guard against any potential data breach or threat. The task of this team would not only be to protect you against the actual disaster but also to warn in case of any potential danger well in advance. But it is required that everyone in your company should know how to initiate that team.
6. Take quick action to cure your PC when infected
If your PC is infected, report the matter to the help desk or the IT department. It is certainly not a praise worthy idea to delay resolving your problem.
7. Click on links carefully
Do not click on any link if you are in doubt regarding its authenticity. Just before hitting the link, check if it is bound with other links as well. If you are being asked to login to your account and provide the information over there instead of providing the same via email, you should become alert.