Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Be Sure to Take These 4 Actions Before Leaving Your Desk Unattended

b2ap3_thumbnail_leave_your_workspace_400.jpgWe’ve published several blog articles about enterprise security technologies, but it’s equally important to focus on the other side of the security equation and make sure people know how to properly log off, lock, and walk away from their workspace. To that end, even something as seemingly-mundane as forgetting to lock your computer can leave your network vulnerable, big-time.

Here are four actions every office worker should take before leaving for the day--even if you feel like you can fully trust your co-workers. Not to sound paranoid, but when it comes to crime, the old saying is true: “It’s always the person you least suspect.”

Log Out of Your Web Accounts Before Logging Off Your PC
Before leaving your workstation, it’s best practice to log out of whatever online accounts you have open. It might seem like you’re safe by simply closing your web browser, but if you didn’t take the time to actually log off from your account, your browser may keep your account open; despite the fact that the browser itself is closed. In a situation like this, all a person has to do to “hack” your account is open the browser and go to the active website. Upon doing this, they may find your account open. They will then have complete control to navigate your account as if they were you, which can lead to some pretty hilarious social media posts. They could also change your account settings, revoking your control. Social media isn’t the only culprit here - bank accounts and online email accounts are just as susceptible.

The consequences of not logging out could be more serious if a malicious hacker were to remotely take control of your computer while you were away from it. All they would have to do is open your web browser, look at your history to see what sites you frequent, and then visit these links from your browser. An account that’s still logged in will grant them instant access. In a situation like this, an account that’s been manually logged out of would be more difficult for a hacker to access. For serious threats like this, it’s extremely beneficial to have Total Tech Care monitoring your network for any suspicious activity.

Be Sure to Log Off Before Stepping Away From Your PC
For similar reasons as logging out of your account, you will want to log off of your PC before walking away from it. If you don’t, a co-worker could easily access your desktop and mess with it in ways only limited by their computer know-how. What’s more, if you work in an office where strangers have easy access, like customers and delivery personnel, you will want to log off before stepping away from your PC. You never know who is going to walk through your front door and snoop around the place.

Put Away and Lock Up Any Mobile Devices
It may seem harmless to close your laptop and leave it on your desk when it’s time to go home, but for someone in the mood to do some crime, a mobile device left out in the open is an easy target. You may think that your co-workers can be trusted to leave your device unattended, but all it takes is one conniving worker who has it out for you to grab your device, dig in, and set you up for failure. Instead of leaving your device out in the open, lock it up in a drawer or a closet, utilize a laptop lock cable, or just take it home with you if it’s your device.

Lock Up the Office Before You Leave
This may sound like a no-brainer, but you’d be surprised by how many businesses overlook the security of side doors, windows, and other access points around their building. Being fully dependent on security measures like access cards, codes, and keys, isn’t enough to fully protect your assets, especially if several different employees can unlock your office. An employee that isn’t wise to the ways of security may see nothing wrong with loaning their access code to another worker, and if you don’t regularly change your locks, then employees who were let go may still have access to your building (and they may have an ax to grind).

Additionally, it’s good to have a surveillance system in place, especially one that you can access from your mobile device, wherever you may be. Because a smart surveillance system like this would piggyback off your company’s network, Total Tech Care can help set it up for you, as well as recommend a system that best suits your security needs.

Are there any additional security measures that you take before calling it a day? Share your tips in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Google Business Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Network Browser Small Business Productivity Collaboration Quick Tips Cybersecurity Business Management Users Windows Upgrade Managed IT Services Phishing Outsourced IT Ransomware Data Backup Windows 10 Office Cloud Computing Server Save Money Data Recovery Passwords Windows 10 Saving Money Holiday Tech Term Chrome Gadgets Virtualization Social Media Microsoft Office Managed IT Services Automation Managed Service Operating System Facebook Computers Artificial Intelligence Cybercrime Mobile Device Management Networking IT Support Hacking Internet of Things Wi-Fi Health BYOD Spam Managed Service Provider Office 365 Remote Telephone Systems Information Technology Alert Covid-19 Information Bandwidth Router Social Engineering Mobility BDR Employer-Employee Relationship Recovery Encryption Remote Monitoring Applications Big Data Data Breach App Law Enforcement History Mobile Computing Human Resources Password Money Application Remote Computing Data Storage Mobile Office Patch Management Government Office Tips Training Private Cloud Blockchain Paperless Office VPN Managed IT How To Apps Voice over Internet Protocol Mouse HaaS Vulnerability Google Drive Windows 7 Word Avoiding Downtime Servers Wireless Flexibility Data Security Gmail Marketing WiFi Settings Bring Your Own Device IT solutions Entertainment Data Management Website Work/Life Balance Budget Two-factor Authentication Infrastructure Apple End of Support Social Education Physical Security Conferencing Safety User Error Sports Meetings Scam HIPAA Data Protection Redundancy Keyboard Risk Management Vendor Management Hacker The Internet of Things Vendor Lithium-ion battery Managed Services Save Time Staff Software as a Service Display Telephone System Machine Learning Connectivity Remote Work Firewall Cleaning Employee/Employer Relationship USB RMM Virtual Reality Hiring/Firing Computing IT Consultant Battery Shadow IT Network Congestion Legal eWaste Augmented Reality Humor Fraud Internet Exlporer Digital Signage Remote Worker Business Intelligence PDF Cryptocurrency Worker Wearable Technology Audit IT Management Retail Hard Drives Proactive IT Procurement Instant Messaging Net Neutrality Excel Comparison Workplace Strategy Botnet Robot Best Practice IT Plan CES YouTube Biometrics Help Desk Black Market Printing Virtual Desktop Unsupported Software Virus Content Management Business Technology Charger Access Control DDoS Managed Services Provider Document Management Unified Threat Management Computer Accessories Solid State Drive Wireless Technology SharePoint Virtual Assistant Compliance Database Computer Care Authentication How to Downtime OneNote Current Events Telephony Remote Workers Customer Service Samsung Data storage Processor Environment Automobile Printer Update Fax Server Bluetooth Value Computing Infrastructure Hard Drive Google Docs Going Green Spam Blocking Electronic Medical Records Identity Theft SaaS Accountants Techology Ergonomics Laptop Mobile Windows 10s Smartwatch MSP Cast Maintenance OLED Microchip Thought Leadership Credit Cards Customers IaaS Development PCI DSS Tip of the week Virtual Machine webinar Bloatware Password Management Emergency Audiobook Password Manager Employer Employee Relationship Multi-Factor Security 2FA Touchpad Professional Services Fiber Optics Public Cloud Employee Cabling Search Engine Assessment Tablets Twitter Messaging Advertising Policy Windows Server 2008 Hypervisor Entrepreneur NIST Politics Business Mangement Smart Tech Trending Dark mode Tools Trend Micro SMS Notifications Shortcut Default App Television Addiction Amazon Procedure Saving Time Cost Management Consultant Recycling Google Search Wiring Analytics Practices dark theme Shopping Social Networking AI IT Infrastructure Public Computer Cache Amazon Web Services Relocation Criminal FinTech Regulations Best Available Bing Safe Mode Transportation WIndows 7 GDPR Rootkit Hosted Computing Video Games Running Cable Social Network Computer Fan Investment Memory Wireless Internet Worker Commute Online Shopping Employees Employee/Employer Relationships Workers File Sharing Benefits Experience ISP Camera Inventory Scalability Specifications Windows 365 FENG Video Conferencing ROI IBM Wire Business Owner Evernote Travel Sales NarrowBand Flash Bitcoin Shortcuts Smart Technology User Cryptomining Printers Science PowerPoint Search Windows Media Player Millennials Point of Sale Personal Supply Chain Management Software Tips Supercomputer Smart Office Wireless Charging iPhone Monitoring Sync Batteries Emails Managing Stress Virtual Private Network Workforce Windows 8.1 Distributed Denial of Service Digitize Customer Relationship Management Windows Server 2008 R2 Analyitcs Cables Files Cameras Customer relationships Chromecast Netflix Programming Two Factor Authentication Manufacturing Project Management Nanotechnology Telecommuting Email Best Practices IT Assessment Root Cause Analysis Uninterrupted Power Supply HBO Knowledge Music Cortana Colocation Digital Signature Computer Tips Skype Antivirus Managed IT Service Security Cameras Biometric Security Warranty Windows 8 Virtual CIO Monitor OneDrive Data loss Peripheral Outlook IT service Leadership HVAC Troubleshooting Google Apps Printer Server Analysis Digital Security Cameras Start Menu Using Data Streaming Media Screen Mirroring 5G Administrator Loyalty Tablet Devices Reputation Copiers Quick Tip Tech Support Frequently Asked Questions Domains Enterprise Content Management Books Content

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code