Tactical Advice

5 Ways to Reduce IT Risk

Build these basic guidelines into your corporate user training to reduce IT risk.
This story appears in the June 2011 issue of BizTech Magazine.
5 Ways to Reduce IT Risk

Successful IT departments are staffed with people who never stop learning. Most started with Computing 101 and broadened their skill sets from there, each working to master their respective specialties. But it’s easy to forget that not every user has taken Computing 101, and all too often IT equips them with computers while not giving them the information they need to stay out of trouble.

Malware attacks, virus outbreaks and crippled networks cost businesses an exorbitant amount of money each year. Every one of these disasters started with a single compromised machine. In an effort to mitigate risk and prevent the preventable, ensure that these five basic guidelines are part of your company’s new-user training.

1. Avoid Installing Unsupported Software

Such programs can degrade computer performance and may introduce network security risks. As a general rule, users should always avoid toolbars, download accelerators and unsupported programs that run in the system tray and update in real time.

2. Understand the Signs of Phishing Attacks and Other Suspicious E-mail

Most companies go to great pains to filter unwanted junk, phishing and other malevolent e-mail, but even the best solutions will let an occasional bad one slip through.

Ask users to be on the lookout for characteristics of suspicious e-mail and learn to discern what should and shouldn’t be opened. Broken English? An unexpected e-mail from someone you know with a strange subject line? When in doubt, contact the help desk before opening it. Most technicians would rather spend two minutes identifying a false alarm than two hours working to fix a compromised machine.

3. Perform Frequent Backups

Even though IT departments regularly back up user and group network shares, many users also save files to their workstation’s hard drive — or worse yet, to a removable thumb drive. The convenience of always having these files available offline quickly becomes a nightmare the moment a drive is lost or a notebook is stolen. Don’t keep files “local” for any longer than necessary, and back up all workstation data files to the network at least once weekly.

4. Treat Every Public Connection as Just That

Public wireless hotspots are a playland for identity thieves and other cyberfelons. Treat every public Wi-Fi network as though other users can see everything you’re doing, because chances are, someone will be watching. Be vigilant in these situations and sparing in what you do, and always avoid making purchases over unsecured networks.

To encrypt sensitive data, use VPNs to perform work-related tasks such as checking mail and transferring files. If practical, tether with a mobile phone and skip the hotspot altogether. Though this will cause arguably slower performance, mobile networks tend to employ better security measures.

5. Stay on Top of Software Updates

Nobody likes having their work interrupted by the ubiquitous “update available” pop-up, and it can seem overwhelming when so many programs want to update — from Windows to a litany of browser plug-ins, readers, productivity suites and driver software. Unfortunately, this is a necessary evil.

These updates not only add stability enhancements, but are frequently released to address critical security concerns as well. Encourage users to install these updates as soon as they’re prompted to do so.

Sign up for our e-newsletter

About the Author

Jason Holbert

Jason Holbert

Jason covers desktop applications and help desk utilities, including reviews geared toward the IT end-user support function. Jason is the PC infrastructure manager for Harcros Chemicals, a worldwide leader in chemical manufacturing and distribution. At Harcros, Jason supports over 350 end users at 30 branch locations. In his free time, Jason enjoys reading, motorcycling, competitive shooting and remodeling his starter home with his wife.


Heartbleed: What Should Your... |
One of the biggest security vulnerabilities has almost every user and every industry...
Why Businesses Need a Next-G... |
Devices investigate patterns that could indicate malicious activity.
Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....


The New Backup Utility Proce... |
Just getting used to the Windows 8 workflow? Prepare for a change.
How to Perform Traditional W... |
With previous versions going unused, Microsoft radically reimagined the backup utility in...
5 Easy Ways to Build a Bette... |
While large enterprises have the resources of an entire IT department behind them, these...

Infrastructure Optimization

Businesses Must Step Careful... |
Slow and steady wins the race as businesses migrate IT operations to service providers,...
Why Cloud Security Is More E... |
Cloud protection services enable companies to keep up with security threats while...
Ensure Uptime Is in Your Dat... |
Power and cooling solutions support disaster recovery and create cost savings and...


Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...
How to Maximize WAN Bandwidt... |
Understand six common problems that plague wide area networks — and how to address them.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Mobile & Wireless

Mobility: A Foundational Pie... |
Other technologies rely on mobile computing, which has the power to change lives, Lextech...
Now that Office for iPad Is... |
After waiting awhile for Microsoft’s productivity suite to arrive, professionals who use...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.

Hardware & Software

Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....
New Challenges in Software M... |
IT trends such as cloud, virtualization and BYOD pose serious hurdles for software...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.