Contact us today!
(800) 588-4430

IT Blog for Business Owners

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

5 Tips for a More Secure Office

When thinking about securing your business from cyber threats, the mind quickly turns to phishing, hacks and viruses, but there are many security threats in and around the office that can expose your business to a host of threats and cybersecurity issues. In conjunction with a solid cybersecurity solution provided by your MSP, be sure you and your employees follow these office tips to protect your physical workspace from system comprises, unauthorized breaches and data loss.
1. Unlocked devices
Mobile phones, laptops, desktops, tablets and even printers/multi-function devices should all be locked and password protected when unattended, as any of these (and any other) network-connected devices can be comprised, allowing for unauthorized access into your system or unauthorized removal of data from it. Even though most devices lock/power down after idling for some period of time, create an officed culture where locking devices becomes second nature for all employees.
2. USB Drives
USB drives pose a host of security issues. Unknown drives should never, ever be used, as they could easily contain hidden malware or spy software that could exfiltrate data or install ransomware on your network. However, those drives that you do use for normal business functions must be kept under lock and key, so they are not compromised with malware, misplaced or stolen. USB drives make it far too easy for curious eyes or unauthorized user to get a peek into sensitive or confidential business information, and are unfortunately left behind in public places (airports, coffee shops, etc.). Make sure any and all USB drives used in your business are cataloged and their whereabouts known at all times—or perhaps look to cloud solutions for sharing/transporting data.
3. Paper Documents
What may be innocuous to your employees could be valuable to others who’d want to infiltrate your systems. At the end of the day, be sure that papers, reports, financial records and any other proprietary data is off desk surfaces, locked away, or shredded (i.e., not in the trash). After they are no longer needed, shred any documents with financial records, proprietary data or confidential information. And of course, to minimize this issue, go digital wherever possible.
4. Passwords
It’s a common occurrence, even in the face of many strict cybersecurity policies, but many employees use notes or cheat sheets for the various usernames, logins and passwords they require for day-to-day work. Nothing could defeat the purpose of a password more easily than this practice, and leaves the door wide open to anyone who accesses your office to gain entry into your network and systems. Discuss a software-based password management system with your MSP and seek out an option that will work best for your business in order to prevent this risky behavior.
5. Wallets and Keys
Just like easily-accessed passwords are a threat, wallets and keys that are left on desks during meetings, bathroom breaks, lunches, etc., can all leave your business exposed to unauthorized entry. Pay special attention to this if there are areas of your business under lock and key, or if ID/keycards are used, as these are typically kept in wallets. Misplaced keys and access IDs can quickly lead to tampered or duplicated methods of access, so if need be, offer lockers or secure places where employees can store their personal belongings while they work.
These are just a few security best practices to enact in your workplace, alongside an effective cybersecurity solution. If you’re thinking about protecting your business from cyber threats, let’s discuss a few options that could work best for you.


No comments yet
Already Registered? Login Here
Wednesday, 23 October 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Business Computing Hackers Malware Privacy Email Business Productivity Hosted Solutions Microsoft Software Internet Network Security IT Services Computer Windows 10 Productivity Managed Service Provider Ransomware Data Backup Innovation Backup Outsourced IT Mobile Devices Android Smartphone Business Continuity Data Recovery Managed IT services Hardware Efficiency User Tips Google Disaster Recovery Social Media Browser Upgrade Communication IT Support Workplace Tips Data Small Business Business Management Cloud Computing IT Support Managed IT Services App Data Management Smartphones Office Remote Monitoring Internet of Things Phishing Miscellaneous Holiday Server Microsoft Office Facebook Paperless Office communications WiFi Office 365 Network Windows Gmail Password Big Data VoIP Tech Term Save Money Encryption Spam Passwords Artificial Intelligence Bandwidth Firewall Document Management Saving Money Apps Cybersecurity Robot Customer Relationship Management Hosted Solution Recovery Collaboration Employer-Employee Relationship Risk Management Unified Threat Management Hacker Operating System Windows 10 Tip of the week Remote Computing How To Content Filtering Compliance Government Money Work/Life Balance Downtime Wi-Fi Office Tips Chrome Apple Avoiding Downtime Vendor Management Analytics Managed IT Customer Service Infrastructure Mobile Device Management Word Data storage Computing Telephone Systems Education Presentation Cybercrime Business Growth Healthcare Managed Service Virtual Reality Training Vulnerability SaaS Help Desk BYOD Outlook Social Data Security Website Applications IT Management File Sharing Two-factor Authentication Health Mobile Device Settings Antivirus Redundancy Hacking Automation The Internet of Things Mobile Computing Project Management Going Green Data loss Computers Tech Support BDR Alert Business Technology Printing Information Technology Samsung Meetings Bring Your Own Device Search Humor Laptops Storage Sports IT service Cortana Analyitcs Virtualization Computer Care Administration Patch Management Identity Theft Scam IT solutions Safety Specifications Wireless Technology Regulations Upgrades VPN Wireless Automobile Proactive Budget Assessment User Server Management Licensing End of Support Net Neutrality Virtual Private Network Remote Monitoring and Management Digital Payment Mouse Consultation Retail Smart Technology YouTube Unified Communications Maintenance Best Practice HIPAA Windows 7 Software as a Service Legal Display Lithium-ion battery Router Mobile Security LiFi Business Owner Twitter Monitors Politics Travel Marketing Tablet Google Drive Websites Physical Security Augmented Reality Taxes Competition IBM Running Cable Botnet Access Control Touchscreen Information Google Maps IT Consultant Chatbots Processor Cyber Monday Technology Laws Scary Stories eWaste Social Engineering Disaster IT Sevices IoT Machine Learning Data Warehousing Tracking Alerts Computer Repair RMM SharePoint Lenovo Digital Cables Undo Monitoring Cleaning Identity Notifications flu season Unified Threat Management Environment Shortcut IP Address Uninterrupted Power Supply Utility Computing Relocation Microsoft Excel Wires Webcam Cooperation Electronic Medical Records Alt Codes Procurement Downloads Superfish Google Wallet Spyware Electronic Health Records Crowdsourcing Active Directory Fort Worth business communications systems Dark Data Troubleshooting Blockchain Mobile Office Solid State Drive Private Cloud Point of Sale Staff Typing Remote Worker Multi-Factor Security Drones How To Heating/Cooling Phone System Cyberattacks Windows Server flu shot Internet Protocol Buisness Permissions Hard Disk Drive Cost Management Error MSP Supercomputer Flexibility Cryptocurrency Professional Services Google Calendar Networking Knowledge Firefox Servers User Management Fort Worth IT VoIP streamlines Fraud Recycling IT Budget Web Server Operations Update Bitcoin Virtual Assistant Legislation Experience Social Networking Batteries DFW IT Service business network infrastructure 3D Printing Bookmarks Management Administrator Cameras Wearable Technology Chromebook Windows 8 Voice over Internet Protocol Techology iPhone Statistics Domains Software Tips Motherboard Law Enforcement Remote Work Network Congestion Internet Exlporer Unsupported Software Favorites Mail Merge 5G Entrepreneur Enterprise Resource Planning WPA3 CCTV Emoji Disaster Resistance Application Users Bluetooth Public Speaking Gadget File Management Distributed Denial of Service Mobile Data Conferencing data services Address Hacks Corporate Profile Mobile Fleet Tracking IT Technicians Manufacturing Technology Tips Proactive IT Quick Tips History Modem Telephone Managed IT Service Hotspot Employees User Error Current Events WannaCry Company Culture Hard Drives PowerPoint Asset Tracking G Suite Mirgation Processors Gadgets Comparison IT Consulting Laptop Time Management Virtual Desktop Mobility Cabling Cookies Mobile VoIP Break Fix Motion Sickness Language Zero-Day Threat Printer Consumers Vulnerabilities Staffing Network Management Refrigeration Remote Workers Migration Proactive Maintenance Black Friday Data Breach Google Docs Halloween Writing Nanotechnology Dark Web GPS Computing Infrastructure Personal Information Deep Learning Backup and Disaster Recovery Fun VoIP Geography

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To Telesys Voice and Data, a disaster is anything that involves a major loss of data or major downt...