Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Be Sure to Take These 4 Actions Before Leaving Your Desk Unattended

b2ap3_thumbnail_leave_your_workspace_400.jpgWe’ve published several blog articles about enterprise security technologies, but it’s equally important to focus on the other side of the security equation and make sure people know how to properly log off, lock, and walk away from their workspace. To that end, even something as seemingly-mundane as forgetting to lock your computer can leave your network vulnerable, big-time.

Here are four actions every office worker should take before leaving for the day--even if you feel like you can fully trust your co-workers. Not to sound paranoid, but when it comes to crime, the old saying is true: “It’s always the person you least suspect.”

Log Out of Your Web Accounts Before Logging Off Your PC
Before leaving your workstation, it’s best practice to log out of whatever online accounts you have open. It might seem like you’re safe by simply closing your web browser, but if you didn’t take the time to actually log off from your account, your browser may keep your account open; despite the fact that the browser itself is closed. In a situation like this, all a person has to do to “hack” your account is open the browser and go to the active website. Upon doing this, they may find your account open. They will then have complete control to navigate your account as if they were you, which can lead to some pretty hilarious social media posts. They could also change your account settings, revoking your control. Social media isn’t the only culprit here - bank accounts and online email accounts are just as susceptible.

The consequences of not logging out could be more serious if a malicious hacker were to remotely take control of your computer while you were away from it. All they would have to do is open your web browser, look at your history to see what sites you frequent, and then visit these links from your browser. An account that’s still logged in will grant them instant access. In a situation like this, an account that’s been manually logged out of would be more difficult for a hacker to access. For serious threats like this, it’s extremely beneficial to have Total Tech Care monitoring your network for any suspicious activity.

Be Sure to Log Off Before Stepping Away From Your PC
For similar reasons as logging out of your account, you will want to log off of your PC before walking away from it. If you don’t, a co-worker could easily access your desktop and mess with it in ways only limited by their computer know-how. What’s more, if you work in an office where strangers have easy access, like customers and delivery personnel, you will want to log off before stepping away from your PC. You never know who is going to walk through your front door and snoop around the place.

Put Away and Lock Up Any Mobile Devices
It may seem harmless to close your laptop and leave it on your desk when it’s time to go home, but for someone in the mood to do some crime, a mobile device left out in the open is an easy target. You may think that your co-workers can be trusted to leave your device unattended, but all it takes is one conniving worker who has it out for you to grab your device, dig in, and set you up for failure. Instead of leaving your device out in the open, lock it up in a drawer or a closet, utilize a laptop lock cable, or just take it home with you if it’s your device.

Lock Up the Office Before You Leave
This may sound like a no-brainer, but you’d be surprised by how many businesses overlook the security of side doors, windows, and other access points around their building. Being fully dependent on security measures like access cards, codes, and keys, isn’t enough to fully protect your assets, especially if several different employees can unlock your office. An employee that isn’t wise to the ways of security may see nothing wrong with loaning their access code to another worker, and if you don’t regularly change your locks, then employees who were let go may still have access to your building (and they may have an ax to grind).

Additionally, it’s good to have a surveillance system in place, especially one that you can access from your mobile device, wherever you may be. Because a smart surveillance system like this would piggyback off your company’s network, Total Tech Care can help set it up for you, as well as recommend a system that best suits your security needs.

Are there any additional security measures that you take before calling it a day? Share your tips in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Google Business Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Managed IT Services Windows Phishing Upgrade Data Backup Outsourced IT Ransomware Windows 10 Server Save Money Data Recovery Office Cloud Computing Passwords Windows 10 Gadgets Tech Term Chrome Virtualization Social Media Saving Money Holiday Microsoft Office Automation Managed IT Services Managed Service Artificial Intelligence Operating System Facebook Computers Cybercrime Wi-Fi Hacking BYOD Health Mobile Device Management Internet of Things Networking IT Support Spam Alert Managed Service Provider Office 365 Telephone Systems Remote Information Technology Covid-19 Information Social Engineering Mobility Recovery Employer-Employee Relationship Router BDR Bandwidth Remote Monitoring Big Data Password Money App Data Breach History Encryption Applications Mobile Computing Application Human Resources Law Enforcement Managed IT Data Storage Patch Management Apps Office Tips Training VPN Blockchain Paperless Office Government How To Remote Computing Private Cloud Mobile Office Voice over Internet Protocol Bring Your Own Device Vulnerability Data Management Windows 7 Work/Life Balance Word Wireless Servers Flexibility Marketing WiFi Gmail Google Drive IT solutions Settings Entertainment Website Data Security Budget Two-factor Authentication Avoiding Downtime Mouse HaaS Infrastructure User Error Save Time Meetings Conferencing Cleaning Scam Risk Management Hacker Data Protection End of Support The Internet of Things Vendor Management Education Physical Security Lithium-ion battery Safety Sports HIPAA Redundancy Vendor Firewall Keyboard USB Managed Services Staff Software as a Service Display Telephone System Virtual Reality Machine Learning Apple Connectivity Remote Work Employee/Employer Relationship Social RMM Computing Data storage Augmented Reality Wearable Technology Automobile Retail Hard Drives Fraud Instant Messaging Business Intelligence Remote Worker Excel Digital Signage Robot Computing Infrastructure Going Green Audit Worker Biometrics IT Management Cryptocurrency Virus Virtual Desktop Botnet Procurement Battery Unified Threat Management IT Plan Computer Accessories Workplace Strategy Shadow IT Comparison Net Neutrality DDoS Legal CES Help Desk SharePoint Unsupported Software Internet Exlporer Printing Charger Content Management Business Technology Printer Access Control Compliance Customer Service PDF Bluetooth Environment OneNote Computer Care Managed Services Provider Current Events Virtual Assistant Telephony Proactive IT Authentication Database Fax Server Samsung Remote Workers Best Practice YouTube SaaS IT Consultant Black Market Value Processor Update Spam Blocking Electronic Medical Records Network Congestion Humor Hard Drive Google Docs eWaste Document Management Solid State Drive Wireless Technology Hiring/Firing Identity Theft How to Downtime Tip of the week MSP Ergonomics webinar Accountants Emergency Smartwatch Consultant Files Shortcut Analytics Professional Services Microchip Chromecast Public Cloud Thought Leadership Development Employer Employee Relationship Credit Cards OLED Assessment Password Manager Virtual Machine Cost Management Password Management PCI DSS Windows Server 2008 2FA Uninterrupted Power Supply Fiber Optics Multi-Factor Security Employee Best Available Social Networking Colocation Tools Search Engine Twitter Messaging Cabling WIndows 7 Television Business Mangement Hypervisor Monitor NIST Policy Dark mode Smart Tech Trend Micro Trending Running Cable Memory Addiction SMS Amazon Default App Public Computer Recycling Saving Time Reputation Procedure Streaming Media Regulations Wiring dark theme Tech Support Practices Shopping Transportation Google Search Content User Techology PowerPoint Laptop Windows Media Player Computer Fan Cache AI Rootkit Amazon Web Services IT Infrastructure Criminal Bing Customers Safe Mode FinTech GDPR Science Workers Hosted Computing Social Network Benefits Audiobook Managing Stress Touchpad FENG Wireless Internet Online Shopping Investment IBM Employee/Employer Relationships File Sharing Employees Cameras Flash Camera Windows 365 Inventory Smart Technology Specifications ISP Distributed Denial of Service Politics Customer Relationship Management Advertising Analyitcs Wire Video Conferencing Evernote ROI Supercomputer Bitcoin Travel Shortcuts Programming Software Tips Sales Notifications Sync Printers Point of Sale Emails Personal Millennials Cryptomining Smart Office Supply Chain Management Wireless Charging Batteries Antivirus Relocation Monitoring Printer Server Virtual Private Network Windows 8.1 Windows 8 Netflix Digitize Two Factor Authentication Workforce IT service Video Games Root Cause Analysis Cables Windows Server 2008 R2 Knowledge Music Worker Commute HBO Customer relationships Skype Project Management Email Best Practices Tablet Nanotechnology IT Assessment Telecommuting Manufacturing Experience Domains Scalability Data loss Cortana Leadership Digital Signature Managed IT Service Troubleshooting Security Cameras Business Owner Outlook Computer Tips Maintenance Start Menu Warranty Virtual CIO NarrowBand OneDrive Biometric Security IaaS Search Bloatware Screen Mirroring HVAC Peripheral Loyalty Google Apps Frequently Asked Questions Digital Security Cameras Analysis Using Data Books iPhone Mobile Administrator Tablets Windows 10s Devices Copiers 5G Entrepreneur Cast Enterprise Content Management Quick Tip

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code