Contact Us! 469-272-0777

LiveZilla Live Help

AspireTech Blog

AspireTech has been serving the Mansfield area since 1999 , providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Be Sure to Take These 4 Actions Before Leaving Your Desk Unattended

b2ap3_thumbnail_leave_your_workspace_400.jpgWe’ve published several blog articles about enterprise security technologies, but it’s equally important to focus on the other side of the security equation and make sure people know how to properly log off, lock, and walk away from their workspace. To that end, even something as seemingly-mundane as forgetting to lock your computer can leave your network vulnerable, big-time.

Here are four actions every office worker should take before leaving for the day--even if you feel like you can fully trust your co-workers. Not to sound paranoid, but when it comes to crime, the old saying is true: “It’s always the person you least suspect.”

Log Out of Your Web Accounts Before Logging Off Your PC
Before leaving your workstation, it’s best practice to log out of whatever online accounts you have open. It might seem like you’re safe by simply closing your web browser, but if you didn’t take the time to actually log off from your account, your browser may keep your account open; despite the fact that the browser itself is closed. In a situation like this, all a person has to do to “hack” your account is open the browser and go to the active website. Upon doing this, they may find your account open. They will then have complete control to navigate your account as if they were you, which can lead to some pretty hilarious social media posts. They could also change your account settings, revoking your control. Social media isn’t the only culprit here - bank accounts and online email accounts are just as susceptible.

The consequences of not logging out could be more serious if a malicious hacker were to remotely take control of your computer while you were away from it. All they would have to do is open your web browser, look at your history to see what sites you frequent, and then visit these links from your browser. An account that’s still logged in will grant them instant access. In a situation like this, an account that’s been manually logged out of would be more difficult for a hacker to access. For serious threats like this, it’s extremely beneficial to have AspireTech monitoring your network for any suspicious activity.

Be Sure to Log Off Before Stepping Away From Your PC
For similar reasons as logging out of your account, you will want to log off of your PC before walking away from it. If you don’t, a co-worker could easily access your desktop and mess with it in ways only limited by their computer know-how. What’s more, if you work in an office where strangers have easy access, like customers and delivery personnel, you will want to log off before stepping away from your PC. You never know who is going to walk through your front door and snoop around the place.

Put Away and Lock Up Any Mobile Devices
It may seem harmless to close your laptop and leave it on your desk when it’s time to go home, but for someone in the mood to do some crime, a mobile device left out in the open is an easy target. You may think that your co-workers can be trusted to leave your device unattended, but all it takes is one conniving worker who has it out for you to grab your device, dig in, and set you up for failure. Instead of leaving your device out in the open, lock it up in a drawer or a closet, utilize a laptop lock cable, or just take it home with you if it’s your device.

Lock Up the Office Before You Leave
This may sound like a no-brainer, but you’d be surprised by how many businesses overlook the security of side doors, windows, and other access points around their building. Being fully dependent on security measures like access cards, codes, and keys, isn’t enough to fully protect your assets, especially if several different employees can unlock your office. An employee that isn’t wise to the ways of security may see nothing wrong with loaning their access code to another worker, and if you don’t regularly change your locks, then employees who were let go may still have access to your building (and they may have an ax to grind).

Additionally, it’s good to have a surveillance system in place, especially one that you can access from your mobile device, wherever you may be. Because a smart surveillance system like this would piggyback off your company’s network, AspireTech can help set it up for you, as well as recommend a system that best suits your security needs.

Are there any additional security measures that you take before calling it a day? Share your tips in the comments.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 04 July 2020
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!


Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Cloud Network Security Hosted Solutions Privacy Productivity Hackers Email Innovation Internet VoIP Backup Mobile Devices Efficiency Malware Data Google Data Backup Workplace Tips Business Microsoft communications Hardware Software IT Support User Tips Data Recovery IT Services Disaster Recovery Outsourced IT Smartphones Business Continuity Managed IT Services Cybersecurity Phishing Communication Internet of Things Productivity Cloud Computing Upgrade Small Business Collaboration Managed IT Services Computer Android Miscellaneous Network Server Browser Saving Money Business Management Gadgets BDR Smartphone Tech Term Windows Artificial Intelligence Ransomware IT Support Windows 10 Save Money Automation Cybercrime Chrome Social Media Users Mobile Device Windows 10 Mobility Computers Microsoft Office Virtualization Office Holiday Passwords Bandwidth Facebook BYOD Social Engineering Managed IT Mobile Device Management Training Windows 7 Office 365 Employer-Employee Relationship Spam Telephone Systems Encryption Quick Tips Networking Data Security Avoiding Downtime Recovery Information Technology Information Blockchain Managed Service Wi-Fi Operating System Managed Service Provider Remote Monitoring How To Remote Work Firewall Applications Two-factor Authentication Mobile Computing Compliance Data Breach Wireless History Router Redundancy Big Data Apps Telephone System Private Cloud Help Desk Patch Management Data Storage Alert Mobile Office App Health Money Business Intelligence Meetings Access Control Word Website Data Protection Human Resources Application Servers Paperless Office Mouse Government Gmail Hacking VPN Business Technology Software as a Service Settings Proactive IT Vendor Management Machine Learning Education Manufacturing Voice over Internet Protocol Managed Services Provider Identity Theft Lithium-ion battery Downtime Data Management WiFi Staff Vulnerability Bring Your Own Device Virtual Private Network Remote Computing Marketing User Error Budget Hacker Infrastructure Display IT Management Risk Management Analysis Document Management Google Drive Office Tips Biometrics Employee/Employer Relationship Sports Connectivity File Sharing The Internet of Things HIPAA Law Enforcement Healthcare Telephony Digital Signage CES Virtual Assistant Update Smart Tech Keyboard Data loss SaaS YouTube GDPR Cables Black Market Saving Time Fax Server Google Docs Hard Drives Content Management Spam Blocking Covid-19 Procurement HaaS Environment Content Filtering Solid State Drive Network Congestion Wireless Technology Apple Cleaning Credit Cards Professional Services eWaste Data storage Streaming Media IT solutions Virtual Reality Scam Value Windows Server 2008 Processor Fraud Audit Vendor Entertainment USB Shadow IT Password Project Management Hard Drive Social Business Owner Regulations Humor Workers Going Green Cryptocurrency Botnet Internet Exlporer Comparison IT Plan Save Time DDoS Public Cloud Augmented Reality Unsupported Software Robot Work/Life Balance OneNote Safety Retail Running Cable Fiber-Optic Leadership IT solutions Supply Chain Management Antivirus Search Engine Hypervisor Customer Service Operations Distribution Consultant iPhone Charger IT Assessment IT service Investment Tablets Telecommuting Content Filter Electronic Health Records Skype Managed Services Bing IaaS Files Google Search Projects Logistics Analyitcs Insurance Best Available Hosted Solution Screen Mirroring Unified Threat Management HBO OneDrive Domains NarrowBand E-Commerce ROI Storage User Unified Communications webinar Start Menu Colocation Net Neutrality Computing Excel Practices Cast Computer Care Frequently Asked Questions Uninterrupted Power Supply Copiers Camera Memory Twitter Managing Stress Theft HVAC Conferencing Mobile Windows 10s Peripheral Shortcuts Employee/Employer Relationships Computing Infrastructure ISP Fiber Optics Biometric Security Multi-Factor Security Hosted Computing Samsung Tip of the week Development Chromecast Printers Windows Server 2008 R2 Addiction Virtual Desktop Cortana Enterprise Content Management Quick Tip eCommerce Bitcoin File Versioning Trend Micro Proactive 5G Trending Inventory Tech Support Messaging Cache Bluetooth Google Apps Password Management Tools Digital Signature PCI DSS Outlook Batteries End of Support Multiple Versions Shopping Remote Monitoring and Maintenance OLED Bloatware Lifestyle Transportation Data Warehousing SMS Amazon Wireless Internet NIST Strategy Computer Fan Policy Wearable Technology Monitor Remote Workers Internet exploMicrosoft Restore Data Social Network Line of Business Cabling Entrepreneur Authentication Legal AI Warranty Azure Amazon Web Services Wire Maintenance Password Manager FENG Procedure Security Cameras Managed IT Service Advertising Backup and Disaster Recovery Printing MSP Default App Science Nanotechnology Current Events Contracts Laptop Printer RMM Social Networking Online Shopping Smart Office Business Analytics Business Mangement Safe Mode Travel Accountants FinTech Relocation Notifications Cryptomining Personal Proactive Maintenance Windows 8 Specifications Electronic Medical Records Knowledge Flash Emails Remote SharePoint Touchpad Administrator Smart Devices Evernote Smartwatch Using Data Shortcut Recycling Distributed Denial of Service PDF Business Cost Remote Worker Remote Maintenance Tablet Millennials Devices WIndows 7 Software Tips Students IT Consultant Sync Instant Messaging Webinar Video Conferencing Microchip Virtual Machine Customer Relationship Management Wireless Charging Employee Window 10 Criminal Database IoT Root Cause Analysis Best Practice Digitize Wiring IT Infrastructure Programming Workforce Thought Leadership Physical Security