top of page

SECURITY PRO TIPS

In a world that is increasingly connected, managing security and privacy has become increasingly challenging. According to the FBI, over 90% of breaches occur due to human error. The good news is that most of these breaches are preventable with a few changes in habits. Follow the advice below to keep your company safe.

icon-up-to-date.png

Keep your apps, operating system, and browsers up to date. Enable automatic updates if available.

icon-reputable-american.png

Use reputable, American-made products for malware protection on all Windows, Android, and macOS devices.

icon-3rd-vpn.png

Do not use third-party VPN services. Use your employer-provided VPN connection, managed by your IT team.

icon-PII.png

Do not share personally identifiable information or financial information via phone, text, or email unless you initiate contact.

icon-charging-cords.png

Do not use publicly available charging cords or USB ports (even in ride-share cars). Use your power adapter or power bank instead.

icon-monitor-dark-web.png

Monitor the Dark Web and your credit report for breaches of credentials and personally identifiable information.

icon-no-resuse-pass.png

Do not reuse passwords across multiple accounts, sites, and apps. Secure unique passwords with a password manager like 1Password or LastPass.

icon-limit-socials-info.png

Limit the amount of information shared on social media. Revisit privacy settings periodically.

icon-shred-erase.png

Shred or erase financial and intellectual property documents that are obsolete.

icon-phishing-awareness.png

Offer phishing awareness coaching to your team to keep up with new threats.

icon-multi-factor-auth.png

Use two-factor authentication to log in to any website or app that offers 2FA, regardless of the type of data you store there.

icon-pup-wifi.png

Do not use public Wi-Fi hotspots. Use your phone’s hotspot feature or a hotspot device from a wireless provider.

icon-no-click-attach.png

Do not click links or open attachments in unsolicited emails or text messages. Ensure that email asking for information is not from an impersonator.

icon-no-share-personal.png

Do not share personally identifiable information or financial information through email if possible. Call an official phone number instead.

icon-download-legit.png

Download apps from legitimate sources only such as Apple App Store or Google Play.

icon-no-access-apps.png

Do not allow apps to access information such as contacts and location from your device when avoidable.

icon-bookmarks.png

Create and save bookmarks in your browsers for frequently visited sites. Link results from searches can sometimes contain spoofed links that point to rogue sites.

icon-bus-class-email.png

Ensure you are using a reputable business-class email provider that doesn’t mine and sell user data.

icon-dedicated-device.png

Consider dedicating a device to do banking and other financial activities so it’s less likely to be compromised during other uses. When possible, use financial institution apps rather than their websites.

icon-replace-passwords.png

Replace default passwords with strong, unique passwords for every device connecting to the Internet (TVs, printers, security cameras, and so on).

logo-IT-made-simple.png

CONTACT

7676 Hillmont St. STE. 195

Houston, TX 77040

832.730.1200

bottom of page