As a Fully Managed client, your system is getting the best care there is – but keeping your network healthy is a team effort. Here are a few steps you can take to get the most out of your partnership with Computer Options.
- Log out of all workstations every evening.
- Leave your workstations on at all times (but feel free to turn off your screens).
- Make sure there is enough space for good air flow around each workstation.
- Reboot all workstations at least once per week.
- Keep your passwords safe and private, to prevent unauthorized access to your company’s information.
- All passwords should be at least 8 characters long and include letters, numbers and symbols.
- Each user should have their own username and password – never reveal your password to anyone except your IT manager.
Servers & Backups
- Do not store files on workstations – always save your work to a server.
- Do not use a server as a workstation.
- Make sure servers are always connected to a working battery backup (UPS).
- Where possible, servers should be in a physically secure location – preferably behind a locked door.
- Keep several backups, and rotate backup media.
- Store an offsite backup in a secure location – do not leave it in a car, briefcase, etc. any longer than is absolutely necessary.
Keep in touch
- When an employee is hired or leaves the company, inform us immediately so we can set up or disable their account.
- Don’t use shared logon accounts, unless there is a clear business need for them. Discuss the implications with us, and make sure you have our approval before sharing accounts.
- Consult us before purchasing new software, computers, printers, cellphones, and other equipment to make sure it will fit in with your existing computer network.
Network Security 101: Recognizing spam emails
Spam emails continue to be a problem for businesses, and can sometimes carry viruses. To protect your network from suspicious emails, look for the following red flags:
- Subject line is ambiguous, or blank
- Content is very brief or missing entirely – it doesn’t follow usual communication rules
- Contains spelling and grammatical errors
- Requests you click a web link for further information (that might link to a virus)
- Requests or insists that you provide personal or financial information
- Insists that something terrible will happen if you don’t respond immediately
- The “From” field contains your email address
- The “To” field doesn’t actually contain your address – or it contains multiple addresses
- You don’t know the sender, or you didn’t request the information
- The sender’s email address is from another country (eg .eu = European Union, .uk = United Kingdom, .rn = Russia, .cn = China, .ca = Canada)
Images and attachments:
- It has a .zip file attachment – these are the most suspicious files, and can carry viruses
- The email appears to be from a respected company, but logos are missing or incorrect (just because there’s a logo, that doesn’t mean it’s safe!)
- The email contains an image instead of any text
- This email has many of the red flags from above: unknown sender from another country, an ambiguous subject line, little content, and a suspicious attachment that could contain a virus.