Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Be Sure to Take These 4 Actions Before Leaving Your Desk Unattended

b2ap3_thumbnail_leave_your_workspace_400.jpgWe’ve published several blog articles about enterprise security technologies, but it’s equally important to focus on the other side of the security equation and make sure people know how to properly log off, lock, and walk away from their workspace. To that end, even something as seemingly-mundane as forgetting to lock your computer can leave your network vulnerable, big-time.

Here are four actions every office worker should take before leaving for the day--even if you feel like you can fully trust your co-workers. Not to sound paranoid, but when it comes to crime, the old saying is true: “It’s always the person you least suspect.”

Log Out of Your Web Accounts Before Logging Off Your PC
Before leaving your workstation, it’s best practice to log out of whatever online accounts you have open. It might seem like you’re safe by simply closing your web browser, but if you didn’t take the time to actually log off from your account, your browser may keep your account open; despite the fact that the browser itself is closed. In a situation like this, all a person has to do to “hack” your account is open the browser and go to the active website. Upon doing this, they may find your account open. They will then have complete control to navigate your account as if they were you, which can lead to some pretty hilarious social media posts. They could also change your account settings, revoking your control. Social media isn’t the only culprit here - bank accounts and online email accounts are just as susceptible.

The consequences of not logging out could be more serious if a malicious hacker were to remotely take control of your computer while you were away from it. All they would have to do is open your web browser, look at your history to see what sites you frequent, and then visit these links from your browser. An account that’s still logged in will grant them instant access. In a situation like this, an account that’s been manually logged out of would be more difficult for a hacker to access. For serious threats like this, it’s extremely beneficial to have Total Tech Care monitoring your network for any suspicious activity.

Be Sure to Log Off Before Stepping Away From Your PC
For similar reasons as logging out of your account, you will want to log off of your PC before walking away from it. If you don’t, a co-worker could easily access your desktop and mess with it in ways only limited by their computer know-how. What’s more, if you work in an office where strangers have easy access, like customers and delivery personnel, you will want to log off before stepping away from your PC. You never know who is going to walk through your front door and snoop around the place.

Put Away and Lock Up Any Mobile Devices
It may seem harmless to close your laptop and leave it on your desk when it’s time to go home, but for someone in the mood to do some crime, a mobile device left out in the open is an easy target. You may think that your co-workers can be trusted to leave your device unattended, but all it takes is one conniving worker who has it out for you to grab your device, dig in, and set you up for failure. Instead of leaving your device out in the open, lock it up in a drawer or a closet, utilize a laptop lock cable, or just take it home with you if it’s your device.

Lock Up the Office Before You Leave
This may sound like a no-brainer, but you’d be surprised by how many businesses overlook the security of side doors, windows, and other access points around their building. Being fully dependent on security measures like access cards, codes, and keys, isn’t enough to fully protect your assets, especially if several different employees can unlock your office. An employee that isn’t wise to the ways of security may see nothing wrong with loaning their access code to another worker, and if you don’t regularly change your locks, then employees who were let go may still have access to your building (and they may have an ax to grind).

Additionally, it’s good to have a surveillance system in place, especially one that you can access from your mobile device, wherever you may be. Because a smart surveillance system like this would piggyback off your company’s network, Total Tech Care can help set it up for you, as well as recommend a system that best suits your security needs.

Are there any additional security measures that you take before calling it a day? Share your tips in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Google Business Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Network Browser Small Business Collaboration Productivity Cybersecurity Quick Tips Business Management Users Phishing Upgrade Windows Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Office Cloud Computing Server Save Money Data Recovery Passwords Windows 10 Saving Money Holiday Chrome Virtualization Tech Term Gadgets Social Media Microsoft Office Managed Service Managed IT Services Automation Artificial Intelligence Cybercrime Operating System Computers Facebook Mobile Device Management Wi-Fi Health Networking IT Support Hacking Internet of Things BYOD Covid-19 Managed Service Provider Spam Information Office 365 Telephone Systems Information Technology Remote Alert Recovery Employer-Employee Relationship Bandwidth Social Engineering Mobility Router BDR Password Human Resources Money Encryption Big Data Remote Monitoring Applications Data Breach App Law Enforcement History Mobile Computing Application Managed IT Apps Remote Computing Data Storage Patch Management Blockchain Mobile Office Paperless Office Government Office Tips Training Private Cloud How To VPN Settings Bring Your Own Device Data Management Work/Life Balance Two-factor Authentication Vulnerability Mouse HaaS Windows 7 Word Google Drive Servers Flexibility Avoiding Downtime Marketing Infrastructure WiFi Voice over Internet Protocol Wireless Data Security IT solutions Entertainment Website Budget Gmail Data Protection Firewall Cleaning Vendor Managed Services Virtual Reality Display Apple Conferencing End of Support Social Scam Education Physical Security Employee/Employer Relationship User Error Safety Software as a Service RMM Telephone System Staff HIPAA Sports Meetings Machine Learning Redundancy Keyboard Connectivity Remote Work Vendor Management Risk Management Hacker The Internet of Things Lithium-ion battery USB Save Time Customer Service Cryptocurrency Data storage Environment IT Consultant Spam Blocking Electronic Medical Records Automobile Managed Services Provider Fax Server Computing Infrastructure Comparison Humor Hiring/Firing Database Going Green SaaS CES Remote Workers Processor Business Technology Battery Content Management Access Control Shadow IT Network Congestion eWaste Legal Business Intelligence Hard Drive Virtual Assistant Authentication Audit Internet Exlporer Worker IT Management Botnet PDF Computing Virus Wearable Technology IT Plan Update Retail Hard Drives Instant Messaging Proactive IT Unified Threat Management Computer Accessories Robot Excel Unsupported Software Google Docs Best Practice Biometrics Identity Theft YouTube Charger Digital Signage Virtual Desktop Black Market Compliance OneNote Computer Care Current Events Printer DDoS Telephony Bluetooth Procurement Augmented Reality Document Management SharePoint Solid State Drive Workplace Strategy Fraud Wireless Technology Samsung Net Neutrality How to Downtime Help Desk Remote Worker Printing Value Leadership ROI Troubleshooting Outlook Recycling Video Conferencing Start Menu Practices Colocation Sales Uninterrupted Power Supply Bitcoin Shortcuts Wiring Antivirus Cache Point of Sale Screen Mirroring Amazon Web Services Personal Loyalty Cryptomining Supply Chain Management Books Safe Mode Windows 8 Frequently Asked Questions Criminal Monitor Mobile Hosted Computing Monitoring Windows 10s Batteries IT service GDPR Wireless Internet Windows 8.1 Cast Online Shopping Digitize webinar Streaming Media Windows Server 2008 R2 Emergency File Sharing Tablet Tip of the week Reputation Professional Services Inventory Customer relationships Public Cloud Specifications Tech Support Employer Employee Relationship Domains Camera Content Manufacturing Wire Techology Email Best Practices Evernote Laptop Consultant IT Assessment Assessment Travel Analytics IaaS Maintenance Windows Server 2008 Customers Bloatware Tools Computer Tips Millennials Managed IT Service Security Cameras Printers Audiobook Biometric Security Smart Office Virtual CIO Wireless Charging Touchpad Best Available OneDrive Television WIndows 7 Peripheral Tablets Entrepreneur Advertising Digital Security Cameras Workforce Using Data Virtual Private Network Politics 5G Cables Copiers Public Computer Quick Tip Notifications Transportation Shortcut Regulations Project Management Cost Management Nanotechnology Ergonomics Computer Fan Telecommuting Rootkit Smartwatch OLED Social Networking Cortana Development Digital Signature Relocation User PCI DSS Workers PowerPoint Virtual Machine Benefits Windows Media Player Warranty 2FA FENG Fiber Optics Employee Cabling Running Cable HVAC Video Games Google Apps Messaging IBM Flash Analysis Managing Stress Policy Hypervisor Smart Technology Worker Commute Memory Administrator Experience Devices Dark mode Trend Micro Supercomputer Cameras Default App Enterprise Content Management Scalability Software Tips SMS Sync Accountants Procedure Emails Saving Time MSP Business Owner Microchip Thought Leadership dark theme Credit Cards NarrowBand Shopping Google Search IT Infrastructure Password Management Search Science Password Manager AI iPhone FinTech Netflix Multi-Factor Security Two Factor Authentication Bing Search Engine Twitter Root Cause Analysis Social Network Knowledge Printer Server Investment Music Distributed Denial of Service Customer Relationship Management NIST HBO Business Mangement Analyitcs Skype Smart Tech Files Employees Trending Employee/Employer Relationships Programming Addiction Windows 365 Data loss Amazon Chromecast ISP

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code