Contact Us! 469-272-0777

LiveZilla Live Help

AspireTech Blog

AspireTech has been serving the Mansfield area since 1999 , providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Be Sure to Take These 4 Actions Before Leaving Your Desk Unattended

b2ap3_thumbnail_leave_your_workspace_400.jpgWe’ve published several blog articles about enterprise security technologies, but it’s equally important to focus on the other side of the security equation and make sure people know how to properly log off, lock, and walk away from their workspace. To that end, even something as seemingly-mundane as forgetting to lock your computer can leave your network vulnerable, big-time.

Here are four actions every office worker should take before leaving for the day--even if you feel like you can fully trust your co-workers. Not to sound paranoid, but when it comes to crime, the old saying is true: “It’s always the person you least suspect.”

Log Out of Your Web Accounts Before Logging Off Your PC
Before leaving your workstation, it’s best practice to log out of whatever online accounts you have open. It might seem like you’re safe by simply closing your web browser, but if you didn’t take the time to actually log off from your account, your browser may keep your account open; despite the fact that the browser itself is closed. In a situation like this, all a person has to do to “hack” your account is open the browser and go to the active website. Upon doing this, they may find your account open. They will then have complete control to navigate your account as if they were you, which can lead to some pretty hilarious social media posts. They could also change your account settings, revoking your control. Social media isn’t the only culprit here - bank accounts and online email accounts are just as susceptible.

The consequences of not logging out could be more serious if a malicious hacker were to remotely take control of your computer while you were away from it. All they would have to do is open your web browser, look at your history to see what sites you frequent, and then visit these links from your browser. An account that’s still logged in will grant them instant access. In a situation like this, an account that’s been manually logged out of would be more difficult for a hacker to access. For serious threats like this, it’s extremely beneficial to have AspireTech monitoring your network for any suspicious activity.

Be Sure to Log Off Before Stepping Away From Your PC
For similar reasons as logging out of your account, you will want to log off of your PC before walking away from it. If you don’t, a co-worker could easily access your desktop and mess with it in ways only limited by their computer know-how. What’s more, if you work in an office where strangers have easy access, like customers and delivery personnel, you will want to log off before stepping away from your PC. You never know who is going to walk through your front door and snoop around the place.

Put Away and Lock Up Any Mobile Devices
It may seem harmless to close your laptop and leave it on your desk when it’s time to go home, but for someone in the mood to do some crime, a mobile device left out in the open is an easy target. You may think that your co-workers can be trusted to leave your device unattended, but all it takes is one conniving worker who has it out for you to grab your device, dig in, and set you up for failure. Instead of leaving your device out in the open, lock it up in a drawer or a closet, utilize a laptop lock cable, or just take it home with you if it’s your device.

Lock Up the Office Before You Leave
This may sound like a no-brainer, but you’d be surprised by how many businesses overlook the security of side doors, windows, and other access points around their building. Being fully dependent on security measures like access cards, codes, and keys, isn’t enough to fully protect your assets, especially if several different employees can unlock your office. An employee that isn’t wise to the ways of security may see nothing wrong with loaning their access code to another worker, and if you don’t regularly change your locks, then employees who were let go may still have access to your building (and they may have an ax to grind).

Additionally, it’s good to have a surveillance system in place, especially one that you can access from your mobile device, wherever you may be. Because a smart surveillance system like this would piggyback off your company’s network, AspireTech can help set it up for you, as well as recommend a system that best suits your security needs.

Are there any additional security measures that you take before calling it a day? Share your tips in the comments.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 29 February 2020
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!


Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Business Computing Network Security Privacy Hosted Solutions Hackers Email Innovation Malware Mobile Devices Internet Backup Efficiency VoIP Google Microsoft Workplace Tips Productivity Data Backup Data IT Services communications Software Hardware Business User Tips Data Recovery IT Support Outsourced IT Smartphones Cybersecurity Disaster Recovery Productivity Managed IT Services Phishing Internet of Things Business Continuity Communication Android Cloud Computing Upgrade Miscellaneous Computer Managed IT Services Network Small Business Server Gadgets Browser Saving Money Business Management Tech Term Collaboration Smartphone Artificial Intelligence Ransomware Windows 10 IT Support Windows BDR Chrome Users Social Media Save Money Cybercrime Mobile Device Windows 10 Automation Computers Mobility Holiday Passwords Bandwidth BYOD Microsoft Office Virtualization Training Office 365 Windows 7 Employer-Employee Relationship Spam Telephone Systems Quick Tips Facebook Managed IT Social Engineering Mobile Device Management Operating System Encryption Managed Service Provider Networking Remote Monitoring Recovery Avoiding Downtime Information Information Technology Blockchain Applications Firewall Office Two-factor Authentication Data Breach Mobile Computing History Router Data Security How To Managed Service Patch Management Alert Wi-Fi Business Intelligence Money App Access Control Word Data Protection Compliance Website Wireless Paperless Office Application Servers Business Technology Gmail VPN Mouse Software as a Service Settings Proactive IT Hacking Redundancy Telephone System Big Data Help Desk Private Cloud Identity Theft Downtime Data Storage Data Management Virtual Private Network Lithium-ion battery Health Staff Vulnerability WiFi Meetings Bring Your Own Device Remote Computing User Error Display Budget Marketing Hacker Infrastructure IT Management Risk Management Analysis Document Management Google Drive Office Tips Human Resources File Sharing Sports Connectivity Government The Internet of Things Law Enforcement Vendor Management Apps Machine Learning Manufacturing Managed Services Provider Education Voice over Internet Protocol Solid State Drive Network Congestion Wireless Technology Apple Cleaning Processor Credit Cards Professional Services eWaste Data storage Vendor IT solutions Virtual Reality Scam Streaming Media Project Management Fraud Value Windows Server 2008 Entertainment Shadow IT Password Social Business Owner Cryptocurrency USB Workers Botnet Employee/Employer Relationship Internet Exlporer Augmented Reality Biometrics Comparison Humor IT Plan Save Time DDoS Unsupported Software Public Cloud Robot Work/Life Balance OneNote Safety Healthcare Digital Signage Retail Virtual Assistant GDPR Saving Time Telephony Update Smart Tech Running Cable Keyboard Data loss SaaS CES YouTube Black Market Fax Server Cables Google Docs Content Management Spam Blocking Environment Content Filtering HaaS Hard Drives Uninterrupted Power Supply Development Printers Windows Server 2008 R2 Addiction Computer Care Frequently Asked Questions Conferencing Mobile Windows 10s eCommerce Bitcoin Excel Theft Enterprise Content Management Proactive 5G Managing Stress Multi-Factor Security Hosted Computing Computing Infrastructure File Versioning Trend Micro Memory Messaging Mobile Office Chromecast Cache Samsung Tip of the week Batteries Virtual Desktop Cortana Password Management Remote Monitoring and Maintenance OLED Trending Inventory Multiple Versions Shopping Tech Support SMS Hard Drive Wireless Internet Tools Digital Signature Audit Outlook Remote Workers Google Apps NIST Line of Business Cabling Bluetooth Bloatware Lifestyle Transportation Data Warehousing End of Support Restore Data Social Network Warranty Azure Amazon Wire Strategy Computer Fan Wearable Technology Monitor Security Cameras Managed IT Service MSP Default App Entrepreneur Authentication Internet exploMicrosoft Backup and Disaster Recovery Printing Legal Going Green Printer RMM Amazon Web Services Smart Office Regulations FENG Business Analytics Maintenance Password Manager Safe Mode Proactive Maintenance Nanotechnology Advertising Cryptomining Personal Laptop Administrator Smart Devices Social Networking Online Shopping Current Events Travel Accountants Relocation Smartwatch Using Data Science Business Mangement Remote Worker Remote Maintenance Specifications Electronic Medical Records Notifications Database Business Cost Emails SharePoint Touchpad Microchip Virtual Machine Evernote Students Knowledge Flash Distributed Denial of Service Employee Window 10 Windows 8 Shortcut Recycling Wiring IT Infrastructure Millennials Devices Software Tips PDF Digitize Instant Messaging Webinar Search Engine Hypervisor Customer Relationship Management Wireless Charging IT Consultant Sync WIndows 7 IoT HIPAA Root Cause Analysis Operations Tablet Criminal Distribution IT Assessment Investment Programming Workforce Thought Leadership Physical Security Best Practice IT solutions Antivirus Bing Customer Service Fiber-Optic Electronic Health Records Leadership Logistics iPhone Google Search Projects OneDrive IT service E-Commerce ROI Telecommuting Content Filter Charger Procurement Consultant Skype Analyitcs Insurance Hosted Solution Screen Mirroring IaaS Files Net Neutrality Computing Tablets Copiers Domains NarrowBand Camera Remote Work Storage Unified Threat Management HBO Start Menu Shortcuts Employee/Employer Relationships Unified Communications HVAC Best Available webinar Biometric Security User Practices Cast Colocation ISP Fiber Optics