5 Simple Steps to IT Security
5 Simple Steps to IT Security
IT Security – It’s not all Cyber!

There’s no denying that Cyber Crime is on the rise, with hacking, phishing and data breaches becoming a key issue. With all the emphasis on Cyber Security, are we forgetting the basics? It’s all very well to protect your laptop from virus and malware attacks, but what are you doing to protect your own security?

Be careful with the way you work

Stand in any train carriage in rush hour, and you’re likely to see commuters happily working away on one device or another. Great! Remote working is the way the world is moving, and the flexibility it affords can only help to improve staff relations and productivity. The concern is in the way it is used. If you’re not careful with the way you work, other travellers may see your screen, making it all too easy for someone to take advantage of the information they can view, putting you in a very vulnerable positon.

So what’s the answer? Should we stop using these resources that are enabling us to become more remotely efficient? The answer is simply to remember; security isn’t all cyber!

Our five tips for protecting your own security…

  1. Protect your screen – just like your pin when you’re at the cash point, it’s important when working on anything confidential to make sure that people can’t see your work. Direct your screen so that it’s angled away from prying eyes, or invest in a laptop privacy shield – a special screen protector that prevents anyone not sitting directly in front of the screen from viewing it.

  1. Keep your devices close – Even with the best password protection or encryption in the world, you’ll still have to deal with the inconvenience if you leave your smart phone or laptop somewhere, or worse have them stolen. There are security cables available for securing your laptop if you’re concerned about theft, and even briefcases designed to be used as makeshift tables, which allow you to keep laptops, dongles, tablets and smartphones all in one place while you’re using them. And always remember to double check you’ve got everything before you leave.

  1. Think first! – Does that confidential HR document really need to be worked on right now? Is there something less private that you could be working on? At the end of the day, no measure of security can ever be as effective as not opening yourself up in the first place.

It's not just about when you travel. The security of your equipment in your office is just as important.

  1. Turn it off! – So many of us are guilty of leaving our PC on overnight. It’s easy to forget that the convenience this gives you leaves a gaping hole in your security. You’re not there overnight, and anyone who does have access to your workspace, has ample opportunity to look at whatever you may have left access to.

  2. Lock it down – You should always remember to lock your screen when you leave your device unattended. What you’re working on may not be appropriate for others in your organisation to see. It’s important that if you’re working on anything confidential that you keep it private.

With all the high tech options available now, it’s easy to forget that you yourself are the first layer of security! Stay vigilant, take care, and you should be well on the way to keeping your IT equipment safe.


  1. Agen Bola

    Agen Bola on #

    What's up, its good post concerning media print, we all understand media is a
    impressive source of information.

  2. Tyres crawley

    Tyres crawley on #

    Excellent post. I used to be checking continuously this weblog and I'm inspired!
    Extremely useful information particularly the final phase :) I maintain such information a lot.
    I used tto be looking for this particular info for a long time.
    Thank and best of luck.

  3. 우리카지노

    우리카지노 on #

    Thank you for the good writeup. It in fact was a amusement account it.
    Look advanced to far added agreeable from you! However,
    how could we communicate?

  4. 바카라사이트

    바카라사이트 on #

    Informative article, exactly what I was looking for.

  5. slotxo

    slotxo on #

    My family members all the time say that I am killing my time here at web, but
    I know I am getting knowledge every day by reading thes nice articles or reviews.

  6. 카지노사이트

    카지노사이트 on #

    Her jewelry was 65% to 70% gold, mixed with copper, silver and iron to create an alloy. Typically, Scythian jewelry contains much less gold. She was also buried with an iron knife wrapped in fabric and a rare iron arrowhead with a forked end.

  7. 바카라사이트

    바카라사이트 on #

    The headdress is a unique find because so few survived burial to be uncovered by archaeologists, the researchers said. Other discoveries have released fragments, rather than this well-preserved ceremonial headdress with its intact ornaments.

  8. 카지노사이트

    카지노사이트 on #

    The remains were found in a cemetery known as Devitsa V, a site consisting of 19 mounds that has been studied since 2010 in the Voronezh region of Russia. This year the Don Archaeological Expedition from the Institute of Archeology of the Russian Academy of Sciences excavated the remains of the four women in one of the mounds.

  9. 카지노사이트

    카지노사이트 on #

    "The Amazons are common Scythian phenomenon and during the last decade our expedition has discovered approximately 11 burials of young armed women," said Valerii Guliaev, head of the Don expedition. "Separate barrows were filled for them and all burial rites which were usually made for men were done for them."

  10. 카지노사이트

    카지노사이트 on #

    nameless in the series but referred to throughout as "the child," earned his nickname quickly after the show's premiere because it's the "easiest, shortest, most hashtaggable way" to identify the character, though inaccurate, Favreau said.

  11. 카지노사이트

    카지노사이트 on #

    Whether you're on the sun-kissed beaches of the Maldives or in the mountains of Bhutan, enjoying the energetic buzz of Bangkok or relaxing in a quiet retreat in rural Japan, there's somewhere new for everyone looking to lay their head in style during their Asia Pacific travels this year.

Post your comment

© Copyright 2017 WorkPlaceLive
CookieControl-7.2 source scriptCookieControll consent scriptZopim Live Chat ScriptGoogle Analytics ScriptGoogle Tag Manager for the `head` tagHubSpot Embed CodeHotjar Tracking CodeGoogle verification codeFacebook Pixel CodeMailchimp tracking code for head Google Tag Manager for the `body` tag