It makes sense and sounds so simple, but keeping a clean desk is often overlooked when talking about cyber-security. It’s also the perfect place to start the security discussion with employees.
Employees that keep a cluttered desk tend to leave USB drives and smartphones out in the open. They also often forget to physically secure their desktops and laptops, allowing someone to simply walk off with them.
A messy desk also makes it more difficult to realize something is missing, such as a folder with hard copy printouts of customer lists. In addition to increasing the likelihood of something being removed, a cluttered desk means that the discovery of a theft would be delayed—perhaps by days or even weeks if the employee is out of the office. Such delays make it more difficult to determine who the perpetrator is and where the stolen material might be located.
Encouraging employees to maintain a neat desk pays off in two ways. First, digital and paper assets will be more secure, and second, employees with clean desks are more apt to be productive, because they can quickly and safely access the tools and resources they need to do their jobs.
The following list presents 10 “messy desk” mistakes employees are prone to commit, and which could cause irreparable harm to the business, the employee, fellow employees, customers, and business partners. These are all bad habits for which to educate employees to stop:
Be sure to lock computer screen when leaving the computer unattended.
It’s best to keep documents locked and or closed in drawers and file cabinets.
Shred all paper information rather than taking a risk of someone finding & using private information.
Keep Mobile Phones and USB Devices on your person at all times.
Erase all confidential information from whiteboards when left unattended.
Keep a close eye on your personal belongings always and do not leave unattended.
Do not leave usernames and passwords out for the public to see.
Do not leave keys for file cabinets out, they may get lost or stolen.
Keep confidential information off of desk calendars, and personal calendars locked up.
Any and all personal belongings should not be left unattended.
Unsecured Desk
Secured Desk
In today’s fast-paced world where employees are always on the go, it takes too much time to determine whether documents, USB drives, devices and other items contain sensitive information. The safe bet is to make sure everything is filed away and kept locked up or else properly destroyed.
Read this next: Top 3 Cyber Attacks Your Business is Likely to Face
In the world of IT, problems happen. Computers crash, viruses are found, passwords are lost, email stops working, and the list goes on. And without proper technical support in place, these problems can bring your business to an abrupt – and potentially damaging – halt.
With Ray Morgan Company’s Managed IT Services, you can enjoy peace of mind knowing that our certified technicians can quickly and efficiently resolve even your most complex technical problems.
Our Help Desk supports:
Not every support issue can be called a catastrophe…until it prevents you from being able to do your job. We’re here to help you stay ahead of the curve, so you can focus on growing your business – and to do so, we’ve adopted a proactive approach to network monitoring and IT maintenance.