(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 10 Technology Practices To Improve Business As Usual

In a business, some jobs belong to certain people: managers make sure that work is done when it needs to be, human resources make sure the workforce is accounted for, and so on. However, some jobs belong to everyone in the modern workplace who works with technology, For our tip of the week, we’ll go over some of these shared responsibilities.

Use the Network
As an insurance policy for your data, make sure that everything is saved to the network, and not on your local PC. This is simply a function of risk management--the network is backed up, while it’s much less likely that your individual PC is. Therefore, by storing data on the network, it won’t be lost if your workstation breaks down--and if your network is properly backed up, your data will still be safe.

Check Email Cognizantly
It is only too easy to click through email messages without really getting the message, which only helps those who use email as a cyber weapon. The easiest way to avoid falling victim to such attacks is to avoid opening attachments from unfamiliar senders. This is a favorite method of cyber criminals to introduce malware into their victims’ networks, so your best bet is to avoid any unexpected attachments.

Let Data Be
Keep your data safe by keeping it in-house where it is secured and backed up, and not uploading it onto your portable device or media storage. Without the protections put in place by the network, your data is much more vulnerable to peeking eyes or meddlesome actions.

Leverage Cloud Technology
If you must access data from outside the network, use a secure cloud solution to do so. The cloud has much more to protect it than a pocket-sized media device does. Ideally, you would also be accessing the cloud via a company virtual private network, as well.

Use Secure Passwords
As much as you love your dog or can remember your make and model of car, these don’t make secure passwords. It wouldn’t take long for someone who knew a little about you to try those exact variables. Instead, use a unique sequence of letters, numbers, and symbols for each account. If you can’t remember more than one password, try using a password manager. At the very least, use passphrases instead of passwords--instead of using a password like ‘FidoMazzerati,’ make a passphrase like ‘FidoLovesToRideInTheM@zzer@ti.’

Keep Passwords To Yourself
After going through the trouble to create a password that is complex enough to satisfy the previous rule, why share it with someone who could easily take advantage of it, or pass it to someone who will? As an example, take your Social Security Number, or other unique form of identification. You wouldn’t pass that around to people, but it essentially serves the same purpose as a password.

Lock Your Workstation
It doesn’t matter whether the risk is of someone stealing data or of someone messing around with your workstation as a prank--either way, productivity and focus in the office will suffer. One of the easiest means of avoiding this is to develop the habit of locking your workstation whenever you step away.

Take Note Of All Issues
Computer problems are bound to happen at some point. It helps to be prepared to fix them when they do. Whenever you encounter an issue, take notes that describe exactly what you were doing so the IT professional can figure out if there’s an underlying issue, and when possible, include a screenshot of the error.

Let IT Handle It
Your computer and the software it relies on will need to be upgraded and, eventually, replaced. When that time comes, don’t take it upon yourself to make any changes in the attempt to save someone else the trouble. Call IT in to help -- it is one of the reasons they’re there.

However, many businesses don’t have the resources to hire the IT staff they need. That’s why managed services are part of our offering here at NTConnections. We can help you monitor and maintain your IT--we’re just a call to (703) 288-9767 away.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 19 November 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Google Efficiency Mobile Devices IT Support Business VoIP Managed Service Provider Miscellaneous IT Services Server Workplace Tips Business Continuity Innovation Upgrade Disaster Recovery Network Data Hardware Email Software Save Money Saving Money Business Management Communication Computer Windows Mobile Device Management Microsoft Office User Tips Network Security Virtualization Smartphones Browser Managed IT Services Holiday Android Windows 10 WiFi Smartphone communications Hacking BYOD Social Media Operating System Mobile Computing Computers IT Solutions Cybercrime Chrome Small Business Apple Application Outsourced IT Proactive IT Remote Monitoring Avoiding Downtime Office The Internet of Things Budget Collaboration Alert Quick Tips Big Data Ransomware Data Backup Information Technology Automation Passwords Marketing Remote Computing Mobility Health Managed IT Services Bring Your Own Device VPN Recovery Social Engineering spam Employer-Employee Relationship Going Green Managed IT Wireless Technology User Error Vendor Management iPhone Gadgets Cybersecurity Save Time Telephone Systems App Firewall Networking Redundancy IT Support Office 365 Antivirus PowerPoint Website Excel Office Tips Phone System Content Filtering Downtime Analytics Router Gmail Lithium-ion battery History Tablet Private Cloud Retail Memory Search Bandwidth Mouse Compliance People Programming Apps IT Consultant Meetings Network Congestion HaaS Fax Server Unsupported Software Cloud Computing Trending Black Market Law Enforcement Saving Time Data Management Solid State Drive Document Management Two-factor Authentication Risk Management Internet of Things Humor Vulnerability Online Currency Statistics Internet Exlporer Data Security Data storage Printer Biometrics Windows 10 Business Owner Outlook Current Events Hard Drives Maintenance Flexibility Money Facebook Administration Data Storage Entertainment Word Physical Security DDoS BDR Robot Running Cable Intranet Value Environment Unified Threat Management Google Drive Skype Public Cloud Phishing Artificial Intelligence Mobile Office How To Customer Relationship Management SaaS Safety Data Recovery Government Best Available Cleaning Customer Service IT Plan Flash Entrepreneur Cameras Software as a Service Video Surveillance Tech Support Consultant Sync Education Hacker Cost Management Printer Server Update Computer Fan Company Culture Shadow IT Applications Software Tips Worker Commute Telephony Piracy Windows 8.1 Update Wireless Files Science Instant Messaging Google Docs FENG Productivity Streaming Media Wi-Fi Shortcut User Start Menu Workers Licensing SharePoint Colocation Windows 8 Voice over Internet Protocol Audit Samsung Encryption Sports Bluetooth Twitter HBO Mobile Monitor Hosted Solution eWaste Computing Infrastructure Tablets Print Server Multi-Factor Security OneNote Screen Mirroring Crowdfunding Notifications YouTube USB Frequently Asked Questions Professional Services Reputation Wearable Technology End of Support Social Lifestyle Cast Net Neutrality NarrowBand Work/Life Balance Computer Repair Tip of the week Windows Media Player Tools Customers Internet exploMicrosoft Social Networking Data Protection Root Cause Analysis Best Practice Chromecast Windows Server 2008 Hiring/Firing Patch Management Advertising Analyitcs WIndows 7 Data loss Business Intelligence Touchscreen Laptop Settings Windows 7 Botnet Scam Distributed Denial of Service Virtual Desktop Managing Stress Data Warehousing Touchpad IT service Human Resources Regulations Virtual Reality Virus Travel Relocation LinkedIn Hybrid Cloud Uninterrupted Power Supply Training IT Management Computer Care Debate HIPAA Domains Servers Bloatware Computer Accessories Spam Blocking IaaS Loyalty Conferencing Keyboard Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Password Television Troubleshooting Electronic Medical Records Techology Public Computer Employer Employee Relationship Legal Automobile Data Breach Emails Books CrashOverride Mobile Device IBM Users Webinar Emergency Worker Supercomputer Content IT solutions Video Games Comparison Rootkit Knowledge Audiobook Netflix Scalability Specifications Charger Politics Transportation How to webinar Benefits PDF