Are You Having A Technology Emergency?

True North Networks Blog

Cybersecurity Starts with Training Your Employees

Training employees is a critical element of security and protecting your company online starts with making sure they are prepared to keep your computers and networks safe.  It is our shared responsibility to talk to our employees to ensure a safer environment at your company:

Talk to Your Employees About:

  • Keeping a clean machine: Your company should have clear rules for what employees can install and keep on their work computers.  Make sure they understand and abide by these rules. Unknown outside programs can open security vulnerabilities in your network.
  • Following good password practices: A strong password is a sentence that is at least 12 characters long. Focus on positive sentences or phrases that you like to think about and are easy to remember (for example, “I love country music.”). Additionally, having separate passwords for every account helps to thwart cybercriminals. At a minimum, they should separate work and personal accounts and make sure that critical accounts have the strongest passwords. Finally, writing down passwords and keeping them in a safe place away from the computer and enabling two-step authentication are other important ways to secure accounts.
  • When in doubt, throw it out: Employees should know not to open suspicious links in email, tweets, posts, online ads, messages or attachments – even if they know the source. Employees should also be instructed about your company's spam filters and how to use them to prevent unwanted, harmful email.
  • Backing up their work: Whether you set your employees' computers to back up automatically or ask that they do it themselves, employees should be instructed on their role in protecting their work.
  • Staying watchful and speaking up: Your employees should be encouraged to keep an eye out and say something if they notice strange happenings on their computer.  

Information taken from:

Your Biggest Cybersecurity Weakness is Your Phone
How to Create a Successful Cybersecurity Policy
Comment for this post has been locked by admin.


By accepting you will be accessing a service provided by a third-party external to