As a Fully Managed client, your system is getting the best care there is – but keeping your network healthy is a team effort. Here are a few steps you can take to get the most out of your partnership with Computer Options.

Workstations

  • Log out of all workstations every evening.
  • Leave your workstations on at all times (but feel free to turn off your screens).
  • Make sure there is enough space for good air flow around each workstation.
  • Reboot all workstations at least once per week.

Password security

  • Keep your passwords safe and private, to prevent unauthorized access to your company’s information.
  • All passwords should be at least 8 characters long and include letters, numbers and symbols.
  • Each user should have their own username and password – never reveal your password to anyone except your IT manager.

Servers & Backups

  • Do not store files on workstations – always save your work to a server.
  • Do not use a server as a workstation.
  • Make sure servers are always connected to a working battery backup (UPS).
  • Where possible, servers should be in a physically secure location – preferably behind a locked door.
  • Keep several backups, and rotate backup media.
  • Store an offsite backup in a secure location – do not leave it in a car, briefcase, etc. any longer than is absolutely necessary.

Keep in touch

  • When an employee is hired or leaves the company, inform us immediately so we can set up or disable their account.
  • Don’t use shared logon accounts, unless there is a clear business need for them. Discuss the implications with us, and make sure you have our approval before sharing accounts.
  • Consult us before purchasing new software, computers, printers, cellphones, and other equipment to make sure it will fit in with your existing computer network.

Network Security 101: Recognizing spam emails

Spam emails continue to be a problem for businesses, and can sometimes carry viruses. To protect your network from suspicious emails, look for the following red flags:

Content:

  • Subject line is ambiguous, or blank
  • Content is very brief or missing entirely – it doesn’t follow usual communication rules
  • Contains spelling and grammatical errors
  • Requests you click a web link for further information (that might link to a virus)
  • Requests or insists that you provide personal or financial information
  • Insists that something terrible will happen if you don’t respond immediately

Addressing:

  • The “From” field contains your email address
  • The “To” field doesn’t actually contain your address – or it contains multiple addresses
  • You don’t know the sender, or you didn’t request the information
  • The sender’s email address is from another country (eg .eu = European Union, .uk = United Kingdom, .rn = Russia, .cn = China, .ca = Canada)

Images and attachments:

  • It has a .zip file attachment – these are the most suspicious files, and can carry viruses
  • The email appears to be from a respected company, but logos are missing or incorrect (just because there’s a logo, that doesn’t mean it’s safe!)
  • The email contains an image instead of any text
  • This email has many of the red flags from above: unknown sender from another country, an ambiguous subject line, little content, and a suspicious attachment that could contain a virus.