10 security tips: part 2
TRANSCRIPT
![Page 1: 10 Security Tips: Part 2](https://reader034.vdocuments.us/reader034/viewer/2022042716/55a7cc941a28abeb408b465b/html5/thumbnails/1.jpg)
![Page 2: 10 Security Tips: Part 2](https://reader034.vdocuments.us/reader034/viewer/2022042716/55a7cc941a28abeb408b465b/html5/thumbnails/2.jpg)
Watch for Malware in Disguise
Cybercriminals know that
users are concerned about
security and often employs
messages and pop-up
screens that appear to be
legit programs on your PC
requesting updates.
![Page 3: 10 Security Tips: Part 2](https://reader034.vdocuments.us/reader034/viewer/2022042716/55a7cc941a28abeb408b465b/html5/thumbnails/3.jpg)
If you see a warning claiming your PC is
infected, don’t click anything. Contact IT.
Don’t take the chance.
![Page 4: 10 Security Tips: Part 2](https://reader034.vdocuments.us/reader034/viewer/2022042716/55a7cc941a28abeb408b465b/html5/thumbnails/4.jpg)
Back it Up
There is a family of malware known as ransomware, and just
like the name implies, these malicious programs take your
PC hostage.
G I v e u S T h e
M o n e y o R e L S e
![Page 5: 10 Security Tips: Part 2](https://reader034.vdocuments.us/reader034/viewer/2022042716/55a7cc941a28abeb408b465b/html5/thumbnails/5.jpg)
Avoid ransomware by being safe online, but
be prepared for the worst and back up all
crucial files your business can’t do without.
![Page 6: 10 Security Tips: Part 2](https://reader034.vdocuments.us/reader034/viewer/2022042716/55a7cc941a28abeb408b465b/html5/thumbnails/6.jpg)
Stay Safe While Mobile
Malware is no longer limited to just PCs.
Malware have switched tactics to take
advantage of the rise of mobile devices in
the workplace.
![Page 7: 10 Security Tips: Part 2](https://reader034.vdocuments.us/reader034/viewer/2022042716/55a7cc941a28abeb408b465b/html5/thumbnails/7.jpg)
Don’t think that your
device is safe from
threats. Only download
apps from trusted sources
and only choose apps
from trusted developers.
Moreover, install a trusted
security app onto your
mobile device.
![Page 8: 10 Security Tips: Part 2](https://reader034.vdocuments.us/reader034/viewer/2022042716/55a7cc941a28abeb408b465b/html5/thumbnails/8.jpg)
Don’t be a Carrier
Just like people can spread the flu or a cold
to colleagues, users can spread malware
infections to their work PC and network.
![Page 9: 10 Security Tips: Part 2](https://reader034.vdocuments.us/reader034/viewer/2022042716/55a7cc941a28abeb408b465b/html5/thumbnails/9.jpg)
Only connect your PC to trusted devices and
scan all USB drives with your antivirus
software before opening any files. Be
mindful who is using a home PC if you are
opening work documents on it.
![Page 10: 10 Security Tips: Part 2](https://reader034.vdocuments.us/reader034/viewer/2022042716/55a7cc941a28abeb408b465b/html5/thumbnails/10.jpg)
Avoid Friendly Threats
Security threats on social media continue to
grow exponentially. Shortened links are
effective tools to hide malicious URLs, and
threats tied to compelling images and videos
shared on Facebook can spread quickly
among friends.
![Page 11: 10 Security Tips: Part 2](https://reader034.vdocuments.us/reader034/viewer/2022042716/55a7cc941a28abeb408b465b/html5/thumbnails/11.jpg)
Be careful what you click and share on
Facebook, Twitter, LinkedIn and other popular
social channels.
Also use different
passwords for all your
accounts, so if one is
compromised the others
are still secure.
![Page 12: 10 Security Tips: Part 2](https://reader034.vdocuments.us/reader034/viewer/2022042716/55a7cc941a28abeb408b465b/html5/thumbnails/12.jpg)
Stay Safe
By adopting these 10 tips, users can do their part to
protect their network from data breaches, protecting
critical data, safeguarding customer privacy and
defending your organization’s reputation.
![Page 13: 10 Security Tips: Part 2](https://reader034.vdocuments.us/reader034/viewer/2022042716/55a7cc941a28abeb408b465b/html5/thumbnails/13.jpg)
CentraComm is an industry leading managed IT service provider. CentraComm has built its reputation by offering security / routing / switching expertise, experienced engineers, unmatched customer service, best-of-breed products and a deep history of cloud-based services.
About CentraComm
Connect with Us