IT Support Services | Data Backup | Security | Ransomware Removal | Reviews | Careers | Videos (973) 882-4644 Get A Quote Remote Support
Contact Us

IT Security End-User Checklist

Search a domain

IT Security End-User Checklist

Your work is important, but so is staying safe and sound. By working together, we can protect this business. This guide was created so that business owners, office managers, and IT departments can provide it as an educational resource to showcase some of the most basic IT security practices that can be implemented in your workplace.

Avoid Sharing Confidential Information

  • ▢ Never give out company or customer information to unsolicited emails or phone calls.
  • ▢ Always be wary of suspicious activity. If you notice anything, especially in regard to confidential or sensitive information, please inform us immediately.
  • ▢ Never email usernames and passwords to anyone–not even yourself.
  • ▢ Be cautious of suspicious messages that come from sources like PayPal, Amazon, or a bank.

Use Strong Passwords

  • ▢ Don’t use the same password for multiple accounts. How To Memorize Complex Passwords.
  • ▢ Use complex passwords that contain both upper and lower-case letters, numbers, and symbols.

Restrict Access Sensitive Information on Unprotected Devices

  • ▢ Implement Two Factor Authentication to strictly verify authorized users. Learn more.
  • ▢ Never access sensitive information from public computers or devices, as others could also access it. Don’t assume public Wi-Fi spots are secure.
  • ▢ Malware could potentially allow onlookers to steal information like usernames, passwords, and credit card information from your unsecured devices.
  • ▢ Ask your IT department about installing a VPN on your device for maximum security.

Keep Sensitive Data In A Secured Location

  • ▢ Avoid recording passwords on sticky notes.
  • ▢ Shred or destroy documents that contain sensitive information.
  • ▢ Always lock your devices before moving away from them.
  • ▢ On a Windows device, use the Windows key + L to quickly lock your computer.
  • ▢ Keep small devices like phones, hard drives, and flash drives close at hand, especially while traveling.

Report Suspicious Activity to IT

  • ▢ Let us know if you notice any suspicious activity on your network or devices. We’ll be able to diagnose and address the issue before it becomes a bigger problem.
  • ▢ If you lose a mobile device, inform us us immediately.

If you have a service agreement with Quikteks that includes end-user support, please reach out to us at the provided phone number and email address to put in support tickets:

Phone: (973) 882-4644

  • Was this Helpful?
  • YesNo

About Us

Since 2002 Quikteks has provided cutting edge, reliable business technology solutions to small and medium sized businesses in the Tri-State area. Our support solutions include technical help desk support, computer support and advising in order to deliver enterprise level IT solutions to the small and medium-sized business sectors at affordable rates.

Contact Us
(973) 882-4644
373 US 46 Fairfield, NJ 07004

Connect With Quikteks
Reviews Referral Program Press Releases Newsletter Archives Careers
© 2020 Quikteks, LLC. All Rights Reserved