2 Unpopular Essentials for Computer Security

IT support specialists play both hero and villain in a lot of offices. If you can save the day and solve an outage much faster than anyone expected, you’re a hero. But long-term projects that restrict web access, put safety procedures in place, and force the occasional reboot come with a lot of complaints and heated glares. Unfortunately, security is always conflicting with convenience and sometimes all people see is the inconvenience. Here are two essential changes that you may need to ease your coworkers into accepting:

They shouldn’t be clicking on links from unverified third-parties.

Everyone takes time out of their workday to check personal email. Keeping email, social media, and time wasters off your network is an exercise in futility, so sometimes all you can do is protect against the worst of the damage. Phishers and hackers know this, too, and there has been an increase in people taking advantage of it with embedded links. When your coworkers click on an embedded link, they might be lead to a completely different site that fills their browser with dangerous cookies before continuing on to the intended site (or, even worse, a fake). While you can’t stop it, you might be able to educate them. At the very least, make sure there are good malware programs in place and automated programs for getting rid of everyone’s cookie cache remotely.

The network needs to be business only.

Most larger corporations already have this procedure in place: the business network is for business devices only. If your company establishes this policy from the beginning and makes it clear that all data will be monitored, employees generally leave well enough alone. But if you work for or with a small computer where everyone knows the (singular!) password to the wifi, then you will have a bunch of smartphones, Fitbits, and more on your network. These devices bring their poor security or Internet usage with them. Talk to key personnel about keeping the business network protected.

Go to Kotori Technologies, LLC for the right techniques to keep your network secure.