End User IT Security Tips

  • Why Business Partnerships Remain Essential to Growth

    by Emma Tomlin  | December 05, 2018
    Emma Tomlin, CompTIA ANZ Channel Community executive council member, shares her thoughts on how essential business partnerships remain to driving technology.
    Full Story
  • Read All the Ways CompTIA Advanced the Business of Technology in 2018

    by Nancy Hammervik  | December 03, 2018
    The rapid pace at which technology evolves is no secret – especially to those of us immersed in the business of technology. It’s our job at CompTIA to provide you, our members, with what you need to flourish. Much was accomplished this year – make sure you’re taking advantage of everything we have to offer.
    Full Story
  • How to Network on Twitter

    by Kelly Stone  | November 30, 2018
    With more than 328 million users around the globe, Twitter continues to be a relevant way for people to connect and stay updated. Twitter is one of the top five social media tools and a venue for breaking news, robust debates and observations on life. But it can also be a powerful way to augment your professional network. We asked CompTIA’s followers on Twitter what advice they’d like to see most in CompTIAWorld magazine, and they voted for how to network on Twitter itself! Learn how to use social media like a pro to find relevant contacts and endear yourself to potential peers.
    Full Story
  • Eight Ways to Do Professional Development Now

    by Debra B. McCraw  | November 30, 2018
    We all know that professional development is an important key to career success, but between deadlines and meetings at work, not to mention personal commitments, it can be hard to find time for learning. Here are eight ways you can make learning fit your lifestyle.
    Full Story
  • Why Nashville and Atlanta Are Tech Hot Spots

    by Matthew Stern  | November 29, 2018
    CompTIA’s 2018 Cyberstates report on the tech job market shows that the U.S. tech workforce thrives well beyond those cities best known for tech. We spoke with two IT professionals who gave us the inside scoop on the lively, unique tech scenes of two Southern U.S. cities.
    Full Story
  • What an Opportunity in Technology Looks Like Today

    by Natalie Hope McDonald  | November 26, 2018
    As more companies rely on customized technology solutions to navigate a constantly evolving business landscape, both providers and clients have had to rethink how they work together – starting with communication. Here, we see how three companies are finding the most effective ways of implementing new technology in radically different industries.
    Full Story
  • The Next Tech Mecca: North Carolina

    by Daniel Margolis  | November 20, 2018
    When people think of tech hubs, certain names likely come to mind. Silicon Valley. Seattle. Austin. But a certain state is coming to dominate the conversation around tech – North Carolina. Read on to find out why.
    Full Story
  • These Dynamic Times: Women Shake up the IT Workforce

    by Michelle Lange  | November 16, 2018
    Listen in as two engaged CompTIA members talk about how to get girls interested in tech and how to keep women engaged in the tech workforce.
    Full Story
  • How Millennials Are Reshaping the Workforce

    by Matthew Stern  | November 14, 2018
    The millennial generation is one like no generation before it – right? Well, yes and no. Read on to understand how they’re different, how they’re similar and all they offer if you manage them right.
    Full Story
  • What is Blockchain’s Best Use?

    by Matthew Stern  | November 13, 2018
    There’s a lot we need to know and understand about blockchain to see where and how this powerful enabling technology can be practically, effectively and profitably applied.
    Full Story
First PagePrevious Page
Next PageLast Page
Page: of 193
Among the findings of CompTIA’s IT security research, is that most breaches are caused by simple user error, suggesting that no amount of IT security measures can protect an enterprise from accidental breaches caused by careless or uninformed employees.

Several organizations including the National Cyber Security Alliance have developed guidelines for individuals to stay safe online, while CompTIA’s Security Trustmark program validates that a business adheres to the industry’s best security practices.  However, we couldn’t find good guidelines for an IT security employee education program.  So with the help of our own in-house security expert we created our own!  The following tips can be integrated into a company’s internal awareness campaigns or used on their own in print, online or during media interviews:

• External storage devices can compromise security by allowing viruses and other malware to bypass network security safeguards.  Simply connecting a USB “thumb” drive, SD card or portable hard drive to a desktop computer can infect the entire network from inside the same way a hypodermic needle could easily transmit blood-borne viruses that couldn’t otherwise penetrate the skin.

• Sensitive, confidential data can be sent out inadvertently as part of routine email correspondence.  It isn’t difficult to imagine emailing a spreadsheet of names without noticing that one of the tabs contains credit card numbers.  An internal company owner of each data class should be appointed to monitor and maintain confidentiality.  Staff should be trained to identify, label and protect sensitive data so they don’t inadvertently give away the keys.

• The data contained on IT hardware such as laptops and smart phones can be as valuable as the hardware itself.  Staff should be aware of how hardware is commonly lost or stolen (from cars, airport security, hotel rooms, etc.) and be given the tools (such as cable locks) to secure their devices.  Further, they should know what is safe to store on the devices and how to use any included encryption software.

• Security can be compromised by staff accessing (or trying to access) sensitive data from an infected machine or over an insecure network connection.  Trying to log in to a secure network from a machine that is infected with a key-logger or other spyware can expose a user’s password and other sensitive data to a third party.  Using an insecure wireless network to access sensitive data also can pose a security risk.  Staff should be trained to avoid using insecure machines or unencrypted networks to access corporate networks or sensitive data.
Leave a Comment