<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=573132769549581&amp;ev=PageView&amp;noscript=1">
5 Remarkably Simple IT Security Tips Blog Feature
Courtney Casey

By: Courtney Casey on February 17th, 2015

Print/Save as PDF

5 Remarkably Simple IT Security Tips

Cyber Security | Tech Girl

As a business owner or executive, you’re probably investing in some high-tech IT security measures to keep your company’s data safe and out of the wrong hands.

What about the simple, low-tech security steps?

Unfortunately, sometimes people overlook the simple things they can to do to mitigate the risk of someone getting hold of something that they shouldn’t.

Here Are a Few Remarkably Simple IT Security Tips That Business Owners Should Consider:

1. Don't Write Your Password on a Sticky Note

Passwords can be hard to remember, especially if you just changed it or if you are a new employee, so sometimes people will write it down and keep it handy. The problem is that keeping it on, in or around your desk means that if someone finds it, they’ll be able to get into the company’s network and access whatever you have access to.

2. Sensitive Information Should NEVER Be Emailed

If you have to share information such as credit card numbers, user names, or passwords with someone, emailing it is risky. It would be better to tell them in person or give them a call.

3. Log off or Lock Your Computer When You Step Away From Your Desk

It may seem unlikely that someone would mess with your computer while you’re over at the copier, but it happens. It’s worth taking the extra couple of seconds to enter your password when you return.

4. Set a Password or Passcode for Your Laptop, Tablet and Smartphone

Having a password gives an extra layer of protection to your data. It may not prevent the device from getting lost or stolen, but it does make it harder for someone to access your information without the magic words or numbers.

5. Lock Your Server Room

There’s a small list of people that need access to the server room, including IT and some managers or executives. Other than that, if someone wants to access the core of your company’s IT infrastructure, they should need to have a key or be accompanied by someone who is authorized to be in there.

There’s no way for an organization to be 100 percent secure, but with the right high-tech IT security measures in place and with employees following the low-tech ones, your risk will be reduced significantly.

Related: Get the Executive Guide to Cyber Security: Essential Information for Managing Business Risk

Have a conversation with your IT support provider to make sure your company’s security is up to IT best practices.

New call-to-action

Related: Tech Alert: Are You Making These BIG IT Security Mistakes?

As featured in February 15th issue of The Press-Enterprise.


About Courtney Casey

In an industry dominated by men, Courtney Casey, Director of Marketing for Accent Computer Solutions, Inc., is making her mark on the world of information technology. Courtney has been immersed in the IT field most of her life and has been molded into the tech savvy expert she is today. She began working for Accent while earning her Bachelor's degree from California State University, Long Beach. Known in the Inland Empire as the "Tech Girl," Courtney is a regular columnist for the region's newspaper of record, The Press-Enterprise. Her columns address topical news trends, new technology products, and offer advice on how to embrace technology or avoid common IT pitfalls.