Clear your browser history and cookies regularly.
This critical step helps protect against tracking or exposure of sensitive data from saved sessions.
This critical step helps protect against tracking or exposure of sensitive data from saved sessions.
Do not open it unless you are confident you need to run the macro code embedded in the document.
The “S” stands for secure. Check for HTTPS to keep usernames, passwords, and financial information encrypted during transmission.
Tailoring these settings can help protect personal or company information from unwanted exposure or misuse.
Oversharing personal or company information can put you and your organization at risk, making you a target for cybercriminals.
These exist to keep the company’s IT resources secure.
They are your first line of defense in maintaining security. Don’t hesitate to reach out or report concerns.
The sooner you act, the better chance you have of stopping threats.
Keep an eye on things with regular checks to catch unauthorized access early and prevent further damage.
Public networks are often insecure, making it easy for attackers to intercept your data. Connect to a VPN whenever possible to protect data in transit.
This step prevents unauthorized users from accessing your network and stealing your data.
Rather than throwing them in the trash or recycling, use a cross-cut shredder to protect confidential documents by ensuring they can’t be pieced back together by prying eyes.
Don’t just toss them out. Make sure nothing can be retrieved to protect your personal and company data.
Watch for tailgating, which is when someone enters a secured area without authenticating themselves. Always check that everyone has proper access.
Promptly locking your device stops unauthorized access and guarantees your data remains secure while you’re away.
Keep sensitive information out of sight. Leaving documents or devices unattended can invite unwanted access, even in secure environments.
Always follow your company’s policy regarding appropriate software programs to avoid introducing security risks or breaking compliance.
This setting ensures you are always protected with the latest security fixes without having to remember to manually install them.
Third-party or unknown websites can harbor hidden malware that might compromise your computer and data.
It is the first line of defense against malware, viruses, and other cyber threats. Regular scans can help keep your system clean and secure.
