Proper Workstation Use
Workstation Image

Proper Workstation Use

Personal pictures, social networking, online banking are all services that you should not do, or be logged in to on your work computer. Work computers are for work, visiting work-related websites, researching, emailing, generating Powerpoint slideshows, and other work-related actions. Much like posts to social networking sites, everything you say or do can be used against you.

Acceptable Use Policy

Most organizations have a ‘workstation acceptable use policy’ that explains the proper use of your work computer. If your organization has this type of policy, make sure you take the time to read it. All of the things you do on your work computer such as, visiting websites, how much time is spent on Facebook, playing solitaire, using instant messenger chat, can be monitored and logged. Think about what you’re doing, anything you post on the internet is there forever.

Be Safe Online

When it comes to visiting websites or opening personal emails, those actions can affect your work computer and other work computers in your organization. If you happen to visit a site that has malware, you may now have exposed the rest of the company to a malware infection. Try to be aware that you are using a computer that is not yours, the things you do on that computer are not private and could have an impact on your entire company.



Knowbe4 Logo

Stop, Look, and Think. Don’t be fooled.

Like this article?

Share on Facebook
Share on Twitter
Share on Linkdin
Share on Pinterest

More Posts

Cybersecurity

Beware of the “Unsolicited Package Scam”

A New QR Code Scheme Targeting Victims In the fast-paced world of online shopping, receiving packages is a common occurrence. However, scammers have found a

Hacked Emails Phishing Cyber Image
The Latest Scams

Beware of Dropbox Phishing Scams

Protect Your Microsoft Credentials Dropbox is a widely used file-sharing service that many rely on to share photos, files, and documents. Unfortunately, cybercriminals are leveraging

Hologram Airplane Image
Cybersecurity

Beware of Fake TSA PreCheck Emails

Travelers rely on TSA PreCheck to breeze through airport security. This U.S. airport screening program streamlines the security process, allowing members to avoid long lines

SuperPod with WiFi 6E

Plume SuperPod WiFi 6E Specs

SuperPod with WiFi 6

Plume SuperPod WiFi 6 Specs

SuperPod

Plume SuperPod Secs