• Register

Data Net Blog

Tip of the Week: Best Practices to Keep IT Happy

Tip of the Week: Best Practices to Keep IT Happy

I want to ask you a question: how is your working relationship with your IT provider, whether you’ve contracted another business, or you have your own internal department? If you suspect it isn’t great, there may be good reason for that.

Chances are, you’re what IT would refer to as an “end user.” If you’re concerned that IT may not be too fond of you, it’s likely because the relatively inexperienced end user tends to be involved with a lot of the security problems that IT commonly worries about.

Let’s try and fix that. That way, it’ll be more likely that IT isn’t being called for avoidable issues, so their time and energy can be better spent on driving your business forward.

To do so, let’s review a few of the most common cybersecurity gaffs that the average end user tends to make. Seems pretty fitting for Cybersecurity Month, doesn’t it?

Clicking Everything

Okay, here’s the deal: if I were to add a link into this blog, there’s a pretty good chance that you’d click it automatically. You might even do it if I specifically told you not to.

Seriously, don’t click on this link.

If you didn’t click that link, congratulations! You’ve passed our test, and we want to offer you a free Caribbean Cruise. Fill out this form to claim your vacation!

See how easy it is for a cybercriminal to fool someone? This is a very basic form of a practice called phishing. By presenting a target with a ruse, the cybercriminal can then pull a bait-and-switch and carry out their attack. Sometimes, the link will install malware. Sometimes, it will lead to a spoofed website where you’ll be prompted for your credentials, or your payment card information, or some other form of sensitive data.

A user clicking these kinds of links, and generally falling for phishing attacks, could allow a cybercriminal to sidestep all your defenses. Really, it’s no wonder that these attacks stress IT out so much.

Installing Things

In a similar vein, the “Install” button is another problematic button for the end user. Whether it’s an application found online or a nifty browser add-on, there’s a pretty fair chance that one of your users might consider clicking it.

Rule of thumb: unless it comes from your operating system’s built-in store or has been given the a-okay by your IT team, don’t install anything. Better yet, leave it to IT to install anything you need for your responsibilities.

Neglecting Password Hygiene

Finally, if none of the other issues get under your IT resource’s skin, this one surely will. Passwords are the current standard in identity authentication, so if your users aren’t following best practices like:

  • Using a different one for each account
  • Avoiding common password combinations and conventions
  • Keeping them private, instead sharing their passwords
  • Memorizing them, instead writing them down

…among other cardinal security sins, your business could have vulnerabilities right under your nose.

One way that you can help fix this is by implementing a password management system. By saving all their passwords in an encrypted vault, the password manager ensures that your user has access to the credentials they need, when they need them. Plus, they’ll only have to remember the one password needed to get in. It’s a win-win.

Not only will taking better care of your security make IT’s lives easier, it will also help keep your entire business safe online.

With a cyberattack taking place against a business every 39 seconds or so, your IT team has enough on their plate to deal with without your other users contributing. At Data Net, we’re aware of this, and can lend them a hand with our managed IT services. To learn more about what we offer, reach out to us at (760) 466-1200 today.

The Relative Benefits of Wired and Wireless Connec...
Drones are for More than Espionage: Today’s Most U...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, October 23, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Data Efficiency Privacy Communication IT Support Malware Hackers Google Smartphones Hardware Cloud Innovation Small Business Email Workplace Tips User Tips Microsoft Users VoIp Software Communications Managed IT Services Computer Cybersecurity Business Mobile Device Collaboration Tech Term Internet Hosted Solutions Android Mobile Devices Business Management Ransomware Miscellaneous Outsourced IT Network Cloud Computing Windows 10 Social Media Covid-19 Phishing IT Services Passwords Backup Smartphone Information Browser Managed Service Upgrade Saving Money Data recovery Data Backup Wi-Fi Apps Bandwidth Applications Wireless Facebook Internet of Things Holiday Networking Windows Microsoft Office Gadgets Compliance VPN Employer-Employee Relationship Patch Management BDR Gmail Marketing Blockchain Access Control Automation Chrome Quick Tips Data Breach Apple Remote Work Managed IT services Office 365 Value Mobile Office Analytics Employee-Employer Relationship Business Intelligence Conferencing Router Health Save Money Remote Managed IT Service Word Laptop Voice over Internet Protocol Going Green Net Neutrality Remote Monitoring Processor Education Content Filtering Paperless Office Server How To Data Protection Data Security Virus Settings Retail Mobility G Suite Telephone System Telephony Data Management Physical Security Batteries Training Bring Your Own Device Cost Management Windows 7 Remote Monitoring and Management RAM Business Technology Tech Terms Mobile Device Management Excel Computers Battery Medical IT Cortana Business Continuity Scam Payment Cards Twitter Wireless Charging Artificial Intelligence Cybercrime Connectivity Social Network Government Remote Computing Password Company Culture Disaster Recovery Office Virtual Assistant iPhone Virtualization Healthcare Sales Online Shopping disposal Ink Current Events PCI DSS User Tip Spyware Certification Managing Stress IT Maintenance Vulnerabilities Plug-In Scams News Remote Workers Staff Windows Server 2008 R2 Microsoft Office 365 Licensing Customer Relationship Management IT Management Mobile Security IT Service Streaming Media Solid State Drive Storage Fleet Management Information Technology Hard Drives Recycling BYOD Tablet Server Management PowerPoint Human Resources Regulations Compliance Display Troubleshooting Live Streaming Hosted Desktop Internet Explorer Cryptocurrency Proactive IT Project Management Digital WannaCry Websites Unified Communications Taskbar Authentication Tech Support WiFi Managed Service Provider User Security Operating System Mobile Comparison Telecommute Downloads Hard Disk Drive Dark Web Multi-Factor Authentication YouTube Workers SSD Personal Information Wireless Internet Sports Reporting Managed Services Provider Remote Support Meetings Tip of the week Benchmarks Update Firewall Threat Search Cleaning Management HIPAA Safety Help Desk National Security Authorization Alert Vulnerability Co-Managed IT Voice over IP Recovery Specifications Data loss Trends Video Error Tip of the Week/Security File Sharing Millennials E-Commerce Amazon Bitcoin Knowledge Database Electronic Health Records Vendor Printer Big Data Technology Tips Security Cameras Hybrid Cloud Risk Management Outlook Profiles Network Attached Storage Environment Printing Time Management Insurance Remote Working Edge Hard Drive Microsoft Teams Humor Payment Virtual Reality HP Lead Generation Spam A.I. Customer Service Holidays IT budget SaaS Encryption Wearables Cables Profitability Congratulations Shadow IT eCommerce e-waste Paper Chrome OS File Management Botnet Processors Dongle Updates Travel Memes instant Messaging Threats Document Management Antivirus Movies OneNote Touchscreen Virtual Private Network Inventory Machine Learning Tactics Employees GDPR Distribution Website Innovations Law Enforcement Telecommuting Backup and Disaster Recovery Eliminating Downtime WhatsApp Computer Repair Printers Regulation Thank You Analysis Financial

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123