Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

FREE Printout: IT Security End-User Checklist

FREE Printout: IT Security End-User Checklist

This guide was created so that business owners, office managers, and IT departments can provide it as an educational resource to showcase some of the most basic IT security practices that can be implemented in your workplace. We recommend printing this out and handing it out to your staff for maximum results.

Your work is important, but so is staying safe and sound. By working together, we can protect this business.

Avoid Sharing Confidential Information

  • Don’t give out company or customer information to unsolicited emails or phone calls.
  • Hackers can be very convincing and have a lot of tricks up their sleeves. Always be wary of suspicious activity, especially in regard to confidential or sensitive information.
  • Never email usernames and passwords to anyone--not even yourself.
  • Be cautious of suspicious messages that come from sources like PayPal, Amazon, or a bank.

Use Strong Passwords

  • Don’t use the same password for multiple accounts.
  • Use complex passwords that contain both upper and lower-case letters, numbers, and symbols.
  • Don’t include personally identifiable information in your passwords.

Don’t Access Sensitive Information on Unprotected Devices

  • You shouldn’t expect hotels and cafes to have secure wireless connections. Never access sensitive information from public computers or devices, as others could also access it.
  • Malware could potentially allow onlookers to steal information like usernames, passwords, and credit card information from your unsecured devices.
  • Ask your IT department about installing a VPN on your device for maximum security.

Don’t Leave Sensitive Information Lying Around

  • Avoid recording passwords on sticky notes.
  • Shred or destroy documents that contain sensitive information.
  • Always lock your devices before moving away from them.
  • On a Windows device, use the Windows key + L to quickly lock your computer.
  • Keep small devices like phones, hard drives, and flash drives close at hand, especially while traveling.

Report Suspicious Activity to IT

  • We can fix things quickly if we know about them. This keeps the issue from becoming a bigger problem.
  • If you lose a device, like a smartphone or laptop, report it to us immediately.

Note: If you have a service agreement with Telesys Voice and Data that includes end-user support, please reach out to us at the provided phone number and email address to put in support tickets:

Phone: (800) 588-4430


No comments yet
Already Registered? Login Here
Saturday, 15 August 2020
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Business Computing Cloud Best Practices Hackers Privacy Malware Business Email Productivity Hosted Solutions Network Security Microsoft Software Internet Productivity IT Services Computer Windows 10 Managed Service Provider Backup Data Backup Innovation Ransomware Mobile Devices Business Continuity Hardware Smartphone Outsourced IT Android Efficiency Google Upgrade Data Managed IT services Social Media Data Recovery User Tips Disaster Recovery IT Support Browser Communication IT Support Workplace Tips Small Business Business Management Cloud Computing Data Management Managed IT Services Smartphones App Cybersecurity Office Remote Monitoring Internet of Things Phishing Miscellaneous Holiday Server Microsoft Office Network Windows Password Paperless Office VoIP Facebook communications WiFi Office 365 Artificial Intelligence Tech Term Gmail Save Money Big Data Collaboration Encryption Spam Passwords Windows 10 Document Management Robot Bandwidth Compliance Firewall Saving Money Apps Customer Relationship Management Hosted Solution Recovery Vendor Management Wi-Fi Unified Threat Management Employer-Employee Relationship Risk Management How To Customer Service Mobile Device Management Government Word Healthcare Tip of the week Money Hacker Operating System Managed Service Work/Life Balance Remote Computing Content Filtering Downtime Office Tips Chrome Windows 7 Apple Avoiding Downtime Managed IT Infrastructure Analytics Hacking The Internet of Things Mobile Computing Computers Tech Support Telephone Systems Virtual Reality Training SaaS BYOD Education Vulnerability Help Desk Presentation Cybercrime Business Growth Data Security Applications File Sharing Software as a Service Outlook Social IT Management Website Mobile Device Automation Going Green Antivirus Alert Redundancy Printing Data storage Two-factor Authentication Project Management Health Data loss BDR Settings Computing Meetings Storage Business Technology Augmented Reality Computer Care Competition IBM Running Cable Information Technology Patch Management Solid State Drive Identity Theft Bring Your Own Device Search Humor Scam Automobile Upgrades Sports Budget IT service Regulations End of Support Cortana Analyitcs Laptops Virtualization Administration Mouse VPN Assessment Net Neutrality Proactive Server Management Licensing Smart Technology IT solutions Legal Safety Virtual Private Network Consultation Digital Payment Display Specifications Wireless Technology Remote Monitoring and Management Electronic Health Records HIPAA Twitter Wireless Router Maintenance Mobile Security Politics Monitors User Travel Google Drive Websites Retail Physical Security YouTube Unified Communications Taxes Best Practice Time Management Botnet Tablet Lithium-ion battery Mobility Samsung LiFi Business Owner Access Control Marketing IoT Technology Laws Hard Drives Telephone Geography PowerPoint Touchscreen Alerts Relocation Google Maps SharePoint Laptop Virtual Desktop Google Wallet Information Employees Identity Webcam Disaster flu season Electronic Medical Records Digital Microsoft Excel Crowdsourcing Tracking Dark Data Consumers Lenovo Gadgets Utility Computing Unified Threat Management Refrigeration Mobile VoIP Cables Cooperation Private Cloud Downloads Halloween Drones Monitoring Shortcut Zero-Day Threat Point of Sale Uninterrupted Power Supply Fort Worth Spyware Blockchain Deep Learning Fun Superfish Proactive Maintenance eWaste business communications systems Windows Server 2008 Wires Staff Error Multi-Factor Security Scary Stories Consulting Backup and Disaster Recovery IT Sevices flu shot How To Permissions Processor Cost Management Environment Internet Protocol Undo Co-Managed IT Heating/Cooling Flexibility Google Calendar Update IP Address RMM Web Server Hard Disk Drive Fort Worth IT Hard Drive Firefox Fraud Supercomputer Alt Codes Networking Troubleshooting VoIP streamlines Business Telephone MSP Servers Operations Administrator Legislation 3D Printing DFW IT Service Chromebook Mobile Office Procurement Social Networking Cameras Active Directory Recycling Law Enforcement IT Budget Typing Network Congestion business network infrastructure Biometric Phone System Wearable Technology Unsupported Software Buisness Emoji Remote Worker Motherboard CCTV Windows Server Management Internet Exlporer Gadget Cryptocurrency Knowledge Techology Hacks Statistics Software Tips Mobile Data Distributed Denial of Service Mail Merge Professional Services User Management Enterprise Resource Planning Bitcoin data services Experience Disaster Resistance Current Events WPA3 Bluetooth Cyberattacks IT Technicians Technology Tips Managed IT Service Processors Address Virtual Assistant Modem G Suite Corporate Profile Batteries Mobile Quick Tips Hotspot Windows 8 User Error Proactive IT iPhone Domains Fleet Tracking Bookmarks Mirgation Motion Sickness History Comparison Break Fix Google Docs 5G Entrepreneur Voice over Internet Protocol Cookies WannaCry Remote Work Company Culture Language Printer Writing IT Consulting Application Users Public Speaking Asset Tracking Favorites Migration Cabling Black Friday Personal Information Dark Web Staffing Nanotechnology IT Consultant Data Breach File Management Vulnerabilities Network Management Computing Infrastructure Machine Learning Social Engineering Remote Workers Conferencing Chatbots Cyber Monday Computer Repair VoIP Data Warehousing Notifications GPS Manufacturing Cleaning

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...