(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 10 Technology Practices To Improve Business As Usual

Tip of the Week: 10 Technology Practices To Improve Business As Usual

In a business, some jobs belong to certain people: managers make sure that work is done when it needs to be, human resources make sure the workforce is accounted for, and so on. However, some jobs belong to everyone in the modern workplace who works with technology, For our tip of the week, we’ll go over some of these shared responsibilities.

Use the Network
As an insurance policy for your data, make sure that everything is saved to the network, and not on your local PC. This is simply a function of risk management--the network is backed up, while it’s much less likely that your individual PC is. Therefore, by storing data on the network, it won’t be lost if your workstation breaks down--and if your network is properly backed up, your data will still be safe.

Check Email Cognizantly
It is only too easy to click through email messages without really getting the message, which only helps those who use email as a cyber weapon. The easiest way to avoid falling victim to such attacks is to avoid opening attachments from unfamiliar senders. This is a favorite method of cyber criminals to introduce malware into their victims’ networks, so your best bet is to avoid any unexpected attachments.

Let Data Be
Keep your data safe by keeping it in-house where it is secured and backed up, and not uploading it onto your portable device or media storage. Without the protections put in place by the network, your data is much more vulnerable to peeking eyes or meddlesome actions.

Leverage Cloud Technology
If you must access data from outside the network, use a secure cloud solution to do so. The cloud has much more to protect it than a pocket-sized media device does. Ideally, you would also be accessing the cloud via a company virtual private network, as well.

Use Secure Passwords
As much as you love your dog or can remember your make and model of car, these don’t make secure passwords. It wouldn’t take long for someone who knew a little about you to try those exact variables. Instead, use a unique sequence of letters, numbers, and symbols for each account. If you can’t remember more than one password, try using a password manager. At the very least, use passphrases instead of passwords--instead of using a password like ‘FidoMazzerati,’ make a passphrase like ‘FidoLovesToRideInTheM@zzer@ti.’

Keep Passwords To Yourself
After going through the trouble to create a password that is complex enough to satisfy the previous rule, why share it with someone who could easily take advantage of it, or pass it to someone who will? As an example, take your Social Security Number, or other unique form of identification. You wouldn’t pass that around to people, but it essentially serves the same purpose as a password.

Lock Your Workstation
It doesn’t matter whether the risk is of someone stealing data or of someone messing around with your workstation as a prank--either way, productivity and focus in the office will suffer. One of the easiest means of avoiding this is to develop the habit of locking your workstation whenever you step away.

Take Note Of All Issues
Computer problems are bound to happen at some point. It helps to be prepared to fix them when they do. Whenever you encounter an issue, take notes that describe exactly what you were doing so the IT professional can figure out if there’s an underlying issue, and when possible, include a screenshot of the error.

Let IT Handle It
Your computer and the software it relies on will need to be upgraded and, eventually, replaced. When that time comes, don’t take it upon yourself to make any changes in the attempt to save someone else the trouble. Call IT in to help -- it is one of the reasons they’re there.

However, many businesses don’t have the resources to hire the IT staff they need. That’s why managed services are part of our offering here at NTConnections. We can help you monitor and maintain your IT--we’re just a call to (703) 288-9767 away.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 May 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Productivity Microsoft Hosted Solutions Internet Malware Backup Google Mobile Devices Efficiency VoIP IT Support Business IT Services Email Network Security Miscellaneous Managed Service Provider Server Data Innovation Network Disaster Recovery Business Continuity Workplace Tips Software Windows Upgrade Business Management Communication Saving Money Hardware Mobile Device Management Android Virtualization Computer Browser Smartphone Save Money Managed IT Services Data Backup User Tips communications Smartphones Cybercrime Microsoft Office Holiday BYOD WiFi Windows 10 Outsourced IT Computers Small Business Data Recovery Hacking Chrome Big Data Social Media Remote Monitoring Operating System Mobile Computing Ransomware Cloud Computing VPN Managed IT Services Apple Proactive IT Application Avoiding Downtime Automation Internet of Things IT Solutions Collaboration Alert BDR Employer-Employee Relationship Information Technology Passwords Marketing The Internet of Things Office Budget Social Engineering Quick Tips Bring Your Own Device Gadgets spam Cybersecurity Going Green Remote Computing Bandwidth Managed IT Recovery Tech Term Mobility Health Telephone Systems Gmail iPhone Private Cloud Website Router Vulnerability Data Security Save Time Firewall Redundancy Artificial Intelligence Two-factor Authentication Data Protection How To Compliance Business Intelligence Vendor Management Wireless Technology IT Support User Error App Antivirus Lithium-ion battery Productivity Windows 10 PowerPoint Analytics Excel Phone System Content Filtering Money Downtime Mouse Identity Theft History Tablet Value Office 365 Data Management Retail Memory Search Phishing Apps Networking Document Management Office Tips Risk Management Law Enforcement Applications Humor Statistics Smart Tech IT Plan Physical Security DDoS Robot Current Events Workers CES Environment Maintenance Unsupported Software Google Drive Outlook Business Owner Update Human Resources OneNote SaaS Training Flexibility Safety Mobile Device Government Administration Cleaning Work/Life Balance Intranet Meetings Credit Cards Entertainment HaaS Running Cable Fax Server Black Market Skype Data loss Unified Threat Management Mobile Office Public Cloud Streaming Media Customer Relationship Management Internet Exlporer Infrastructure IT Consultant Data Storage Data storage Encryption Best Available Biometrics HIPAA People Word Saving Time Comparison Programming eWaste Network Congestion Trending Hard Drives Online Currency Facebook Printer IT Management Solid State Drive Best Practice Social Networking Wireless Charging Servers User Wireless Internet Chromecast Criminal Files Password Analyitcs Workforce Print Server FENG Licensing Wi-Fi Samsung Fiber-Optic Flash Software as a Service Twitter Laptop Settings Colocation Insurance Telecommuting Electronic Medical Records Distributed Denial of Service Crowdfunding Virtual Desktop Net Neutrality Cables Computer Repair Sync Touchpad Hosted Solution IT service Content Management Computing Infrastructure Practices Legal Virtual Reality Remote Work Software Tips Relocation Uninterrupted Power Supply Unified Communications Telephony Google Docs Domains Blockchain End of Support Hosted Computing Bloatware Windows Media Player IaaS Customer Service Touchscreen Theft Start Menu Voice over Internet Protocol Audit Staff Internet exploMicrosoft Inventory Entrepreneur HBO Root Cause Analysis Hiring/Firing Tech Support Cortana Mobile WIndows 7 Multi-Factor Security Screen Mirroring Patch Management Digital Signature Advertising Hacker Access Control Cost Management Fraud Frequently Asked Questions Thought Leadership Shadow IT Google Apps Professional Services Managing Stress Science Lifestyle Cast Scam Wireless Strategy Authentication LinkedIn Instant Messaging Amazon Tip of the week Virus Charger Content Filter Shortcut Tools Windows 8 Debate SharePoint Analysis Hybrid Cloud Nanotechnology Amazon Web Services Windows Server 2008 Computer Accessories Computer Care Storage Sports Password Manager Bluetooth Tablets Spam Blocking Monitor Accountants PDF Notifications Connectivity Video Surveillance Company Culture Online Shopping Windows 7 Cameras Consultant Addiction YouTube Keyboard Business Mangement USB Windows 8.1 Update Botnet Specifications Data Warehousing Reputation Education Wearable Technology Devices Social Evernote Regulations Printer Server Cache NarrowBand Recycling Travel Millennials Computer Fan Worker Commute Customers Piracy IoT Assessment Music Television Wire Troubleshooting Techology Users Public Computer Employer Employee Relationship Data Breach Automobile Emails Books CrashOverride IBM Webinar Emergency Worker Supercomputer Content IT solutions Video Games Rootkit Knowledge Audiobook Netflix Scalability Politics Transportation How to webinar Benefits Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication