Get Started Today!  (813) 749-0895    SEARCH SITE

IT Professional Services and Business Continuity

Blog for IT Support and Managed Services in Tampa and Florida

Providing Business IT Support such as technical IT Helpdesk Support, Outsourced Computer Support, Technology Consulting, and Managed IT Services to small and medium-sized businesses in Tampa and Florida.

Tip of the Week: 12 Security Rules Every PC User Should Follow

While you are probably spending a fair amount of time thinking about your business’ security, can you confidently say the same about those that you’ve employed? Unfortunately, your workers may not put much thought into network security. This could very possibly lead to some severe issues potentially harming your business operations.

To help you avoid these circumstances, we’ve compiled a cheat sheet for you to give you your employees to remind them of the necessary practices and procedures they must follow in order to keep the business safe.

Essential Cybersecurity Considerations

  1. Utilize the company network to store files. - All company-related data should be stored on the network. Files on your desktop might not be backed up. You should not use personal cloud accounts, such as your own Google Drive or Dropbox, to save or share company documents.
  2. Do not leave your workstation unlocked and unattended. - When leaving your workstation, press WINDOWS KEY + L to lock your desktop.
  3. Do not connect unknown devices to your computer. - Small devices, especially USB thumb drives, can present a very real danger to the company’s devices and infrastructure.
  4. Do not download or install software without approval. - Unapproved software can cause problems that affect the entire network. Speak to management first to ensure that it will not cause an issue with something else that has been implemented.
  5. Do not respond to unsolicited, unfamiliar emails. - If you get an unsolicited email, do not react or respond, as they could contain ransomware disguised as attachments. Instead, notify IT so they may investigate. This tends to be common with unsolicited proposals and resumes.
  6. Do not accept unsolicited support from an incoming caller. - If you receive an unsolicited phone call from someone claiming to represent Microsoft support (or any generic tech support), hang up. These calls are often fraudulent attempts to gain illicit access to company assets.
  7. Follow password guidelines. - Make sure your passwords are appropriately strong and complex. You should never reuse your passwords.
  8. Clear all mobile devices with your manager. - Before beginning to use your smartphone/tablet/laptop for work purposes, make sure you have the approval to do so. This is to ensure the safety of company data.
  9. If you see someone, tell someone. - Do not hesitate to question the presence of an unfamiliar face in the workplace. Ask management if there was the expectation of a visitor, and do not allow the visitor to wander around unattended.
  10. Think before you click. - Take a moment to consider any links you receive in correspondence before clicking on them. Is it coming from a trusted source? Have you confirmed the legitimacy of the link through another means of communication? Links can often be disguised cyber threats.
  11. Never hesitate to report an issue. - If you encounter an issue as you progress with your tasks, you should report it to management as soon as possible. Remember, vigilance could very well save the network from disaster.
  12. If you have a question, ask. - There is no such thing as a dumb question when it comes to IT and security. Check with your manager to see if you can reach out to Symmetric Engineering Group directly by calling (813) 749-0895 for help with your computer.

Please print out this list and distribute it as a reference guide among your employees as a reminder of these requirements.

Security is everyone’s responsibility, but your employees won’t be able to fulfill that responsibility if they don’t know the proper methods to ensure that your business remains secure. This list will help them to keep the basics of safe computing in mind. For more assistance, reach out to us at Symmetric Engineering Group. We have security solutions and other technologies to fill your business’ IT needs. Call us at (813) 749-0895.



No comments made yet. Be the first to submit a comment


Mobile? Grab this Article!

Qr Code

Tag Cloud

IT Support IT Services Tip of the Week Security Managed IT Services IT Infrastructure Management IT Companies in Tampa Best Practices Business Mobility IT Support Services Cloud Business Continuity Business IT Solutions I.T. Management IT Professional Services Custom Business Solutions Business Computing Technology Hackers Email Microsoft IT Business Solutions Business Applications Privacy Internet IT Management Productivity Technology Consultants Business Malware Managed Service Provider Windows 10 Managed IT Service in Florida Business IT Support Managed IT Service Hosted Solutions I.T. Support Managed Services in Florida Computer I.T. Services IT Support Services in Tampa Windows Dynamic Solutions IT Risk Management Mobile Devices IT Outsourcing in Tampa IT Services in Florida Internet of Things IT Support in Tampa Disaster Recovery Data IT Service Managed Services Software Managed IT Outsourced IT Ransomware Managed Services in Tampa Bay Communication Google Hardware IT Managed Services Workplace Tips Upgrade Gmail Mobile Device Management IT Services in Tampa Backup Microsoft Office Network Security Tech Companies in Tampa Remote Monitoring Android App Tampa IT Support Network Vendor Management Computer Networking Managed Service in Tampa Social Media IT Outsourcing in Florida IT Service Management IT Company Business Plan Phishing Apple IT Vendor Management IT Outsourcing Business IT Support Services Browser Firewall Save Money Innovation Data Management Operating System Small Business IT Solutions Content Filtering Data Computer Services Collaboration Mobile Device User Tips Unified Threat Management Smartphone Big Data Risk Management Facebook Computer Hardware Repair Bring Your Own Device Cloud Computing WiFi Customer Relationship Management IT solutions Smartphones Settings IT Company Robot Cybersecurity Retail Telephone Systems Passwords Wireless Technology Hosted Solution BYOD Data storage Holiday Miscellaneous Server IT Management Services Microsoft Virtual Server Hosting in Tampa and Florida Managed IT Services Wireless Efficiency Money Automation Artificial Intelligence SaaS IBM Computer Network Services Chrome Customer Service Business Application Office Tips Word Office 365 Network Congestion Training Budget Mobile Computing Analytics Apps Solid State Drive Data Backup IT Companies in Florida IT Support Helpdesk Recovery Laptop Presentation IT Management Service Encryption Google Drive Small Business Administration Computer Support End of Support I.T. Company Productivity Computer Networking Services Website Alert YouTube Uninterrupted Power Supply Virtual Desktop communications BDR Virtualization Office Remote Computing Saving Money Monitors Help Desk Managed IT Outsourcing IT Support Business Continuity Services LiFi Information Technology Help Desk Support in Tampa Tampa IT Services Programming Top IT Outsourcing Company Tablet Careers Managed Service Providers IT Consulting Service Consulting Services Assessment Knowledge Google Maps Help Desk Support Outsourced Computer Support Buisness Maintenance Application Jobs Employer-Employee Relationship Tech Company in Tampa Mouse IT Service in Tampa Politics Service IT Consultation Deep Learning Experience Social Co-managed IT Corporate Profile Save Time Humor Cryptocurrency IT Solutions for Small Business Quick Tips History Undo CIO Licensing Business Growth IT Vendor Management in Tampa Two-factor Authentication Automobile Hacks IT Tech Support WannaCry The Internet of Things Data Technology User Backups Competition Bitcoin Microsoft Affiliate Program Time Management Identities Disaster Managed Services in Floirda User Error Software Tips Network Support in Florida Current Events Technology Consulting Firms Information Technology Consulting Data loss Bandwidth IT Consulting Avoiding Downtime Legal Writing Gadgets IT Company in Tampa File Sharing Professional Service Windows 8 Antivirus Microsoft Business Solutions Network Management Sync Going Green Social Engineering IT Consulting Services VoIP Education Augmented Reality Managed Service in Florida IT Managed Service Provider Outlook Alt Codes Cabling VoIP Mobile Device Managment Health Care IT Services Printing Net Neutrality Digital Fun Server Hosting in Tampa Health Typing Mobility Downtime Infrastructure Hacker Business IT Solutions Password Computers Google Docs Intranet Spyware IT Support Companies in Tampa Healthcare IT Flexibility Halloween Full Service IT Computing USB Display Compliance Search Server Hosting Digital Signature IT Support and Solutions Domains Storage Scary Stories Users Hard Disk Drive Best Practice Google Wallet Business Continuity Service Providers Regulations How To Unified Communications Hard Drives IT Managed Service in Tampa Public Speaking Dark Data Spam Server Hosting in Florida Computer Repair Sports Digital Payment Marketing Safety Managed it Services in Tampa Drones Firefox Cortana Computer Care Virtual Reality Private Cloud Motion Sickness Upgrades Staffing Cost Management Gadget Saving Time Error Tech Support I.T. Managament Wi-Fi Meetings 3D Printing GPS Update Business Management Business Appplications Public Cloud Trending 5G Webcam Electronic Medical Records Twitter Telephony Tracking Chromebook Point of Sale Processors Unsupported Software Document Management Administrator Physical Security Web Server Samsung Mobile Data Identity Theft Cameras Virus Notifications Files Touchscreen Cybercrime VPN CCTV Emoji Websites Running Cable Black Market Taxes Windows 10 Managed Servers Hacking Crowdsourcing Botnet Supercomputer IP Address G Suite Lithium-ion Battery CrashOverride Tip of the week Government Machine Learning IT Budget Mobile Office Paperless Office Thank You Hiring/Firing Cleaning Work/Life Balance IT Consultant Relocation Travel Personal Information Heating/Cooling How To Congratulations Refrigeration Law Enforcement

Latest Blog Entry

There are some tasks that are essential to the health of your business’ network. For example, you need to make sure that you are engaging in regular network management activities. Do you know what this task entails?

Latest News

SEG Awarded Small Business of the Year Award!

Symmetric Engineering Group was awarded the Upper Tampa Bay Chamber Small Business of the Year Award for their understanding technical service and support throughout the Tampa Bay area

Read more ...

Account Login