www.techrepublic.com
Open in
urlscan Pro
151.101.2.132
Public Scan
URL:
https://www.techrepublic.com/article/cybersecurity-best-practices-an-open-letter-to-end-users/?ftag=CMG-01-10aaa1b
Submission Tags: falconsandbox
Submission: On May 26 via api from US — Scanned from DE
Submission Tags: falconsandbox
Submission: On May 26 via api from US — Scanned from DE
Form analysis
8 forms found in the DOM/search/
<form action="/search/" class="search-bar">
<label id="label-nav-site-search" for="nav-site-search"> Search </label>
<input type="search" autocomplete="off" name="q" id="nav-site-search" value="" placeholder="What are you looking for?" required="">
<button type="submit" disabled="disabled">
<svg role="img" aria-labelledby="label-nav-site-search">
<use href="#smart-search-icon"></use>
</svg>
</button>
</form>
POST https://www.techrepublic.com/article/cybersecurity-best-practices-an-open-letter-to-end-users/
<form method="POST" action="https://www.techrepublic.com/article/cybersecurity-best-practices-an-open-letter-to-end-users/">
<input type="email" class="read-write" aria-label="Enter your email" name="join-signin-email" placeholder="Enter your email" autofocus="" required="">
<input type="submit" value="Continue" class="btn-trigger">
</form>
POST https://www.techrepublic.com/article/cybersecurity-best-practices-an-open-letter-to-end-users/?ftag=CMG-01-10aaa1b?tr-login=1
<form method="POST" action="https://www.techrepublic.com/article/cybersecurity-best-practices-an-open-letter-to-end-users/?ftag=CMG-01-10aaa1b?tr-login=1">
<input type="hidden" name="redirect_to" value="https://www.techrepublic.com/article/cybersecurity-best-practices-an-open-letter-to-end-users/?ftag=CMG-01-10aaa1b">
<input type="email" name="join-signin-email" value="" readonly="" required="" class="readonly">
<input type="password" name="signin-pw" aria-label="Enter your password" placeholder="Enter your password" autofocus="" required="" class="read-write">
<input id="submit-login" type="submit" value="Continue" class="btn-trigger">
</form>
POST
<form method="POST" id="forgot-pw">
<input type="hidden" name="forgot-pw" value="1">
<input type="hidden" name="join-signin-email" value="">
<input type="submit" value="Forgot password" class="forgot-pw">
</form>
POST https://www.techrepublic.com/article/cybersecurity-best-practices-an-open-letter-to-end-users/?tr-login=1
<form action="https://www.techrepublic.com/article/cybersecurity-best-practices-an-open-letter-to-end-users/?tr-login=1" method="post">
<input type="hidden" name="redirect_to" value="https://www.techrepublic.com/article/cybersecurity-best-practices-an-open-letter-to-end-users/">
<input type="email" name="join-signin-email" value="" class="readonly" readonly="" required="">
<input type="text" class="read-write" aria-label="Enter a username" name="username" value="" placeholder="Enter a unique username" required="">
<input type="password" name="join-pw" class="read-write" autofocus="" aria-label="Choose a password" placeholder="Choose a password" required="">
<select id="country" name="country" class="readonly" required="">
<option value="NOTSELECTED">Country</option>
<option value="US"> United States </option>
<option value="AF"> Afghanistan </option>
<option value="AX"> Aland Islands </option>
<option value="AL"> Albania </option>
<option value="DZ"> Algeria </option>
<option value="AS"> American Samoa </option>
<option value="AD"> Andorra </option>
<option value="AO"> Angola </option>
<option value="AI"> Anguilla </option>
<option value="AQ"> Antarctica </option>
<option value="AG"> Antigua And Barbuda </option>
<option value="AR"> Argentina </option>
<option value="AM"> Armenia </option>
<option value="AW"> Aruba </option>
<option value="AU"> Australia </option>
<option value="AT"> Austria </option>
<option value="AZ"> Azerbaijan </option>
<option value="BS"> Bahamas </option>
<option value="BH"> Bahrain </option>
<option value="BD"> Bangladesh </option>
<option value="BB"> Barbados </option>
<option value="BY"> Belarus </option>
<option value="BE"> Belgium </option>
<option value="BZ"> Belize </option>
<option value="BJ"> Benin </option>
<option value="BM"> Bermuda </option>
<option value="BT"> Bhutan </option>
<option value="BO"> Bolivia </option>
<option value="BA"> Bosnia and Herzegovina </option>
<option value="BW"> Botswana </option>
<option value="BV"> Bouvet Island </option>
<option value="BR"> Brazil </option>
<option value="IO"> British Indian Ocean Territory </option>
<option value="BN"> Brunei Darussalam </option>
<option value="BG"> Bulgaria </option>
<option value="BF"> Burkina Faso </option>
<option value="BI"> Burundi </option>
<option value="KH"> Cambodia </option>
<option value="CM"> Cameroon </option>
<option value="CA"> Canada </option>
<option value="CV"> Cape Verde </option>
<option value="BQ"> Caribbean Netherlands </option>
<option value="KY"> Cayman Islands </option>
<option value="CF"> Central African Republic </option>
<option value="TD"> Chad </option>
<option value="CL"> Chile </option>
<option value="CN"> China </option>
<option value="CX"> Christmas Island </option>
<option value="CC"> Cocos (Keeling) Islands </option>
<option value="CO"> Colombia </option>
<option value="KM"> Comoros </option>
<option value="CG"> Congo </option>
<option value="CD"> Congo, DROC </option>
<option value="CK"> Cook Islands </option>
<option value="CR"> Costa Rica </option>
<option value="CI"> Cote D'ivoire </option>
<option value="HR"> Croatia </option>
<option value="CU"> Cuba </option>
<option value="CW"> Curazao </option>
<option value="CY"> Cyprus </option>
<option value="CZ"> Czech Republic </option>
<option value="DK"> Denmark </option>
<option value="DJ"> Djibouti </option>
<option value="DM"> Dominica </option>
<option value="DO"> Dominican Republic </option>
<option value="TL"> East Timor </option>
<option value="EC"> Ecuador </option>
<option value="EG"> Egypt </option>
<option value="SV"> El Salvador </option>
<option value="GQ"> Equatorial Guinea </option>
<option value="ER"> Eritrea </option>
<option value="EE"> Estonia </option>
<option value="ET"> Ethiopia </option>
<option value="FK"> Falkland Islands (Malvinas) </option>
<option value="FO"> Faroe Islands </option>
<option value="FJ"> Fiji </option>
<option value="FI"> Finland </option>
<option value="FR"> France </option>
<option value="GF"> French Guiana </option>
<option value="PF"> French Polynesia </option>
<option value="TF"> French Southern Territories </option>
<option value="GA"> Gabon </option>
<option value="GM"> Gambia </option>
<option value="GE"> Georgia </option>
<option value="DE"> Germany </option>
<option value="GH"> Ghana </option>
<option value="GI"> Gibraltar </option>
<option value="GR"> Greece </option>
<option value="GL"> Greenland </option>
<option value="GD"> Grenada </option>
<option value="GP"> Guadeloupe </option>
<option value="GU"> Guam </option>
<option value="GT"> Guatemala </option>
<option value="GG"> Guernsey </option>
<option value="GN"> Guinea </option>
<option value="GW"> Guinea-Bissau </option>
<option value="GY"> Guyana </option>
<option value="HT"> Haiti </option>
<option value="HM"> Heard And Mc Donald Islands </option>
<option value="VA"> Holy See (Vatican City State) </option>
<option value="HN"> Honduras </option>
<option value="HK"> Hong Kong </option>
<option value="HU"> Hungary </option>
<option value="IS"> Iceland </option>
<option value="IN"> India </option>
<option value="ID"> Indonesia </option>
<option value="IR"> Iran (Islamic Republic Of) </option>
<option value="IQ"> Iraq </option>
<option value="IE"> Ireland </option>
<option value="IM"> Isle of Man </option>
<option value="IL"> Israel </option>
<option value="IT"> Italy </option>
<option value="JM"> Jamaica </option>
<option value="JP"> Japan </option>
<option value="JE"> Jersey </option>
<option value="JO"> Jordan </option>
<option value="KZ"> Kazakhstan </option>
<option value="KE"> Kenya </option>
<option value="KI"> Kiribati </option>
<option value="KW"> Kuwait </option>
<option value="KR"> Korea, Republic Of </option>
<option value="XK"> Kosovo </option>
<option value="KG"> Kyrgyzstan </option>
<option value="LA"> Lao People's Democratic Republic </option>
<option value="LV"> Latvia </option>
<option value="KP"> Korea, Democratic People's Republic of </option>
<option value="LB"> Lebanon </option>
<option value="LS"> Lesotho </option>
<option value="LR"> Liberia </option>
<option value="LY"> Libyan Arab Jamahiriya </option>
<option value="LI"> Liechtenstein </option>
<option value="LT"> Lithuania </option>
<option value="LU"> Luxembourg </option>
<option value="MO"> Macau </option>
<option value="MK"> Macedonia </option>
<option value="MG"> Madagascar </option>
<option value="MW"> Malawi </option>
<option value="MY"> Malaysia </option>
<option value="MV"> Maldives </option>
<option value="ML"> Mali </option>
<option value="MT"> Malta </option>
<option value="MH"> Marshall Islands </option>
<option value="MQ"> Martinique </option>
<option value="MR"> Mauritania </option>
<option value="MU"> Mauritius </option>
<option value="YT"> Mayotte </option>
<option value="MX"> Mexico </option>
<option value="FM"> Micronesia, Federated States of </option>
<option value="MD"> Moldova, Republic Of </option>
<option value="MC"> Monaco </option>
<option value="MN"> Mongolia </option>
<option value="ME"> Montenegro </option>
<option value="MS"> Montserrat </option>
<option value="MA"> Morocco </option>
<option value="MZ"> Mozambique </option>
<option value="MM"> Myanmar </option>
<option value="NA"> Namibia </option>
<option value="NR"> Nauru </option>
<option value="NP"> Nepal </option>
<option value="NL"> Netherlands </option>
<option value="AN"> Netherlands Antilles </option>
<option value="NC"> New Caledonia </option>
<option value="NZ"> New Zealand </option>
<option value="NI"> Nicaragua </option>
<option value="NE"> Niger </option>
<option value="NG"> Nigeria </option>
<option value="NU"> Niue </option>
<option value="NF"> Norfolk Island </option>
<option value="MP"> Northern Mariana Islands </option>
<option value="NO"> Norway </option>
<option value="OM"> Oman </option>
<option value="PK"> Pakistan </option>
<option value="PW"> Palau </option>
<option value="PS"> Palestinian Territory, Occupied </option>
<option value="PA"> Panama </option>
<option value="PG"> Papua New Guinea </option>
<option value="PY"> Paraguay </option>
<option value="PE"> Peru </option>
<option value="PH"> Philippines </option>
<option value="PN"> Pitcairn </option>
<option value="PL"> Poland </option>
<option value="PT"> Portugal </option>
<option value="PR"> Puerto Rico </option>
<option value="QA"> Qatar </option>
<option value="RE"> Reunion </option>
<option value="RO"> Romania </option>
<option value="RU"> Russia </option>
<option value="RW"> Rwanda </option>
<option value="GS"> S. Georgia And S. Sandwich Isles </option>
<option value="BL"> Saint Barthelemy </option>
<option value="KN"> Saint Kitts And Nevis </option>
<option value="LC"> Saint Lucia </option>
<option value="MF"> Saint Martin </option>
<option value="VC"> Saint Vincent And The Grenadines </option>
<option value="WS"> Samoa </option>
<option value="SM"> San Marino </option>
<option value="ST"> Sao Tome And Principe </option>
<option value="SA"> Saudi Arabia </option>
<option value="SN"> Senegal </option>
<option value="RS"> Serbia </option>
<option value="CS"> Serbia and Montenegro </option>
<option value="SC"> Seychelles </option>
<option value="SL"> Sierra Leone </option>
<option value="SG"> Singapore </option>
<option value="SX"> Sint Maarten </option>
<option value="SK"> Slovakia </option>
<option value="SI"> Slovenia </option>
<option value="SB"> Solomon Islands </option>
<option value="SO"> Somalia </option>
<option value="ZA"> South Africa </option>
<option value="SS"> South Sudan </option>
<option value="ES"> Spain </option>
<option value="LK"> Sri Lanka </option>
<option value="SH"> St. Helena </option>
<option value="PM"> St. Pierre And Miquelon </option>
<option value="SD"> Sudan </option>
<option value="SR"> Suriname </option>
<option value="SJ"> Svalbard And Jan Mayen Islands </option>
<option value="SZ"> Swaziland </option>
<option value="SE"> Sweden </option>
<option value="CH"> Switzerland </option>
<option value="SY"> Syrian Arab Republic </option>
<option value="TW"> Taiwan </option>
<option value="TJ"> Tajikistan </option>
<option value="TZ"> Tanzania, United Republic Of </option>
<option value="TH"> Thailand </option>
<option value="TG"> Togo </option>
<option value="TK"> Tokelau </option>
<option value="TO"> Tonga </option>
<option value="TT"> Trinidad And Tobago </option>
<option value="TN"> Tunisia </option>
<option value="TR"> Turkey </option>
<option value="TM"> Turkmenistan </option>
<option value="TC"> Turks And Caicos Islands </option>
<option value="TV"> Tuvalu </option>
<option value="UM"> U.S. Minor Outlying Islands </option>
<option value="UG"> Uganda </option>
<option value="UA"> Ukraine </option>
<option value="AE"> United Arab Emirates </option>
<option value="GB"> United Kingdom </option>
<option value="UY"> Uruguay </option>
<option value="UZ"> Uzbekistan </option>
<option value="VU"> Vanuatu </option>
<option value="VE"> Venezuela </option>
<option value="VN"> Viet Nam </option>
<option value="VG"> Virgin Islands (British) </option>
<option value="VI"> Virgin Islands (U.S.) </option>
<option value="WF"> Wallis And Futuna Islands </option>
<option value="EH"> Western Sahara </option>
<option value="YE"> Yemen </option>
<option value="YU"> Yugoslavia </option>
<option value="ZM"> Zambia </option>
<option value="ZW"> Zimbabwe </option>
</select>
<label for="tos">
<input type="checkbox" name="tos" id="tos" required="">
<span class="terms-of-service">
<p>By registering, you agree to the <a href=" https://technologyadvice.com/terms-conditions/" target="_blank">Terms of Use</a> and acknowledge the data practices outlined in the
<a href="https://technologyadvice.com/privacy-policy/" target="_blank">Privacy Policy</a>.</p>
<p>You will also receive a complimentary subscription to TechRepublic's News and Special Offers newsletter and the Top Story of the Day newsletter. You may unsubscribe from these newsletters at any time.</p>
</span>
</label>
<input id="submit-join" type="submit" value="Continue" class="btn-trigger">
</form>
POST
<form class="share-email-form" method="post">
<input type="hidden" name="share-email-title" value="Cybersecurity best practices: An open letter to end users">
<input type="hidden" name="share-email-url" value="https://www.techrepublic.com/article/cybersecurity-best-practices-an-open-letter-to-end-users/">
<input type="email" name="from-email" class="read-write" placeholder="Your Email" required="">
<input type="email" name="to-email" class="read-write" placeholder="Recipient Email" required="">
<textarea name="msg" class="readonly">Check out this article I found on TechRepublic.</textarea>
<input type="submit" value="Submit">
<p class="response-msg">Your email has been sent</p>
</form>
POST
<form class="share-email-form" method="post">
<input type="hidden" name="share-email-title" value="Cybersecurity best practices: An open letter to end users">
<input type="hidden" name="share-email-url" value="https://www.techrepublic.com/article/cybersecurity-best-practices-an-open-letter-to-end-users/">
<input type="email" name="from-email" class="read-write" placeholder="Your Email" required="">
<input type="email" name="to-email" class="read-write" placeholder="Recipient Email" required="">
<textarea name="msg" class="readonly">Check out this article I found on TechRepublic.</textarea>
<input type="submit" value="Submit">
<p class="response-msg">Your email has been sent</p>
</form>
POST
<form class="email-author-form" method="post">
<input type="hidden" name="author_id" value="37114796">
<input type="text" name="from-name" class="read-write" placeholder="Your Name" required="">
<input type="email" name="from-email" class="read-write" placeholder="Your Email" required="">
<input type="text" name="subject" class="read-write" placeholder="Subject" required="">
<textarea name="msg" placeholder="Message" required="" class="read-write"></textarea>
<input type="submit" value="Send Message">
<p class="response-msg">Your message has been sent</p>
</form>
Text Content
WE VALUE YOUR PRIVACY We and our partners store and/or access information on a device, such as cookies and process personal data, such as unique identifiers and standard information sent by a device for personalised ads and content, ad and content measurement, and audience insights, as well as to develop and improve products.With your permission we and our partners may use precise geolocation data and identification through device scanning. You may click to consent to our and our partners’ processing as described above. Alternatively you may access more detailed information and change your preferences before consenting or to refuse consenting.Please note that some processing of your personal data may not require your consent, but you have a right to object to such processing. Your preferences will apply to this website only. You can change your preferences at any time by returning to this site or visit our privacy policy. AGREE MORE OPTIONS Skip to content TECHREPUBLIC Search Close Search TRENDING NOW Image: iQoncept/Adobe Stock Article TOP 5 THINGS TO KNOW ABOUT STABLECOINS Image: Prostock-studio/Adobe Stock Article DOUBLE YOUR PHONE SCREEN’S SIZE WITH THIS CLEVER MAGNIFIER Image: bakhtiarzein/Adobe Stock Article GOOGLE COLAB VS JUPYTER NOTEBOOK: COMPARE DATA SCIENCE SOFTWARE Image: Gorodenkoff/Adobe Stock Article HOW TO BACK UP A DATABASE WITH BORGMATIC * Top Products Lists * Developer * 5G * Security * Cloud * Artificial Intelligence * Tech & Work * Mobility * Big Data * Innovation * Cheat Sheets * TechRepublic Academy * CES Toggle TechRepublic mobile menu More * TechRepublic Premium * Top Products Lists * Developer * 5G * Security * Cloud * Artificial Intelligence * Tech & Work * Mobility * Big Data * Innovation * Cheat Sheets * TechRepublic Academy * CES * See All Topics * Newsletters * Forums * Resource Library TechRepublic Premium Join / Sign In ACCOUNT INFORMATION TechRepublic close modal JOIN OR SIGN IN Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below. Use Your Email Use Facebook Use Linkedin JOIN OR SIGN IN We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms. WELCOME BACK! Invalid email/username and password combination supplied. RESET PASSWORD An email has been sent to you with instructions on how to reset your password. Back to TechRepublic WELCOME TO TECHREPUBLIC! Country United States Afghanistan Aland Islands Albania Algeria American Samoa Andorra Angola Anguilla Antarctica Antigua And Barbuda Argentina Armenia Aruba Australia Austria Azerbaijan Bahamas Bahrain Bangladesh Barbados Belarus Belgium Belize Benin Bermuda Bhutan Bolivia Bosnia and Herzegovina Botswana Bouvet Island Brazil British Indian Ocean Territory Brunei Darussalam Bulgaria Burkina Faso Burundi Cambodia Cameroon Canada Cape Verde Caribbean Netherlands Cayman Islands Central African Republic Chad Chile China Christmas Island Cocos (Keeling) Islands Colombia Comoros Congo Congo, DROC Cook Islands Costa Rica Cote D'ivoire Croatia Cuba Curazao Cyprus Czech Republic Denmark Djibouti Dominica Dominican Republic East Timor Ecuador Egypt El Salvador Equatorial Guinea Eritrea Estonia Ethiopia Falkland Islands (Malvinas) Faroe Islands Fiji Finland France French Guiana French Polynesia French Southern Territories Gabon Gambia Georgia Germany Ghana Gibraltar Greece Greenland Grenada Guadeloupe Guam Guatemala Guernsey Guinea Guinea-Bissau Guyana Haiti Heard And Mc Donald Islands Holy See (Vatican City State) Honduras Hong Kong Hungary Iceland India Indonesia Iran (Islamic Republic Of) Iraq Ireland Isle of Man Israel Italy Jamaica Japan Jersey Jordan Kazakhstan Kenya Kiribati Kuwait Korea, Republic Of Kosovo Kyrgyzstan Lao People's Democratic Republic Latvia Korea, Democratic People's Republic of Lebanon Lesotho Liberia Libyan Arab Jamahiriya Liechtenstein Lithuania Luxembourg Macau Macedonia Madagascar Malawi Malaysia Maldives Mali Malta Marshall Islands Martinique Mauritania Mauritius Mayotte Mexico Micronesia, Federated States of Moldova, Republic Of Monaco Mongolia Montenegro Montserrat Morocco Mozambique Myanmar Namibia Nauru Nepal Netherlands Netherlands Antilles New Caledonia New Zealand Nicaragua Niger Nigeria Niue Norfolk Island Northern Mariana Islands Norway Oman Pakistan Palau Palestinian Territory, Occupied Panama Papua New Guinea Paraguay Peru Philippines Pitcairn Poland Portugal Puerto Rico Qatar Reunion Romania Russia Rwanda S. Georgia And S. Sandwich Isles Saint Barthelemy Saint Kitts And Nevis Saint Lucia Saint Martin Saint Vincent And The Grenadines Samoa San Marino Sao Tome And Principe Saudi Arabia Senegal Serbia Serbia and Montenegro Seychelles Sierra Leone Singapore Sint Maarten Slovakia Slovenia Solomon Islands Somalia South Africa South Sudan Spain Sri Lanka St. Helena St. Pierre And Miquelon Sudan Suriname Svalbard And Jan Mayen Islands Swaziland Sweden Switzerland Syrian Arab Republic Taiwan Tajikistan Tanzania, United Republic Of Thailand Togo Tokelau Tonga Trinidad And Tobago Tunisia Turkey Turkmenistan Turks And Caicos Islands Tuvalu U.S. Minor Outlying Islands Uganda Ukraine United Arab Emirates United Kingdom Uruguay Uzbekistan Vanuatu Venezuela Viet Nam Virgin Islands (British) Virgin Islands (U.S.) Wallis And Futuna Islands Western Sahara Yemen Yugoslavia Zambia Zimbabwe By registering, you agree to the Terms of Use and acknowledge the data practices outlined in the Privacy Policy. You will also receive a complimentary subscription to TechRepublic's News and Special Offers newsletter and the Top Story of the Day newsletter. You may unsubscribe from these newsletters at any time. Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces). Loading ACCOUNT INFORMATION TechRepublic close modal Image: 1550539, Getty Images/iStockPhoto CYBERSECURITY BEST PRACTICES: AN OPEN LETTER TO END USERS * * * * ACCOUNT INFORMATION TechRepublic close modal SHARE WITH YOUR FRIENDS Cybersecurity best practices: An open letter to end users Check out this article I found on TechRepublic. Your email has been sent by Jack Wallen in Security on October 1, 2020, 2:16 PM PDT CYBERSECURITY BEST PRACTICES: AN OPEN LETTER TO END USERS In an effort to make IT pros' jobs easier, Jack Wallen offers cybersecurity tips to end users--in particular, what not to do to keep company networks, equipment, and data secure. Image: iStockPhoto/1550539 MUST-READ SECURITY COVERAGE * Best encryption software 2022 * The 10 best antivirus products you should consider for your business * 8 enterprise password managers and the companies that will love them * Security incident response: Critical steps for cyberattack recovery (TechRepublic Premium) First, a note to IT admins about this open letter. The admin’s job is never done. Ever. Period. End of story. You work all day, you go home, you think about work, you dream about work, you eat your work feelings, and you do it all over again. Part of the reason for this is because you’re always fighting an uphill battle named end users. I hope the following security advice for end users (which you might consider passing along to the people you support) helps make your job easier. And seeing as how it’s Cybersecurity Awareness month, this is the perfect time to remind your end users just how important it is that they do their part to keep the company’s data safe from harm. Now that we’re on the same page, let’s jump on this hayride and see how fast we can go. (Also read: Cybersecurity Awareness Month: Train employees to be first line of defense.) SEE: Security Awareness and Training policy (TechRepublic Premium) Dear end users, It is not with any pleasure that I write this to you, nor is it intended to make you feel like you’ve done anything wrong. You might have–you just didn’t realize it, but don’t worry, you’re not alone. In fact, I imagine many employees that you work with have fallen prey to one or more of the behaviors that I mention. With that said, when it comes to keeping your computer safe from malware, ransomware, evening wear… scrap that last bit. My intended pun will probably confuse you. Just in case, there is no threat against your PC called “evening wear,” but you see how easy it is to fall victim to such nonsense? It’s really easy. Back to the point. You probably believe magic goes on behind the velvet curtain labeled IT that protects your computers from harm–and, in a way, there is. Your IT staff works tirelessly to prevent all of those desktops and servers from getting hacked or infected with malware, ransomware, and other security threats. The truth is, those desktops, servers, and networks are only as secure as you allow them to be. That’s right, in many instances the burden falls on your shoulders. Don’t worry–it’s not that hard. Instead of couching this advice in terms you may or may not understand, I’ll make it as clear as possible. The best piece of cybersecurity advice I can give you is this: When in doubt, don’t do it. Such generalities could leaving you staring blankly at your monitor and unable to function, so here are specific security best practices. * Don’t click suspicious links. If you don’t know if a link is suspicious, ask. * Don’t install any software on your PC or phone unless it comes from the operating system’s built-in software store. * Don’t install browser add-ons unless they are sanctioned by your company. * Don’t visit websites that seem dodgy. What is a dodgy website? Products advertised on social media, sites that advertise products or services that sound too good to be true, sites that want to install applications on your computer, or any domain found on a list like the Fake Sites Database. * If you absolutely must visit a dodgy site (say you’re doing research for your marketing department and want to know why a product is listed as must have), do it on a tablet that can easily be reset to factory default and doesn’t contain company data. * Update your passwords with really strong ones that you can’t memorize. I know that’s a pain, but there’s a solution: Ask your IT staff about how to use a password manager. * Don’t open email attachments that haven’t been checked by your antivirus. * Don’t open text messages from unknown senders. I know this list seems daunting, but it all supports the original idea of, “When in doubt, don’t do it.” SEE: Social engineering: A cheat sheet for business professionals (free PDF) (TechRepublic) It is no secret that, among IT pros, the pervading feeling is that the weakest link in a company’s security is the end users, but it doesn’t have to be that way. All you have to do is stick to the above list of cybersecurity best practices, and you’ll make the lives of your IT staff exponentially easier. I don’t mean to lay this all at your feet, but those admins who’ve been working day and night to keep your PC up and running need a bit of help, and chances are pretty good they know they can’t look you in the eye and say, “This is your fault,” without risking their jobs. So I take that burden upon myself. Don’t take this personally. It’s not you, it’s… okay, it might be you. Not 100% of the time… more like 80-90%. Just remember, it’s not that hard to keep those PCs safe from evening wear and formalwear… got you again! Come on, end users… keep up with me. You can do this. I have faith in you. Just in case, repeat to yourself, “When in doubt, don’t do it.” CYBERSECURITY INSIDER NEWSLETTER Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays Sign up today Jack Wallen Published: October 1, 2020, 2:16 PM PDT Modified: January 19, 2021, 10:38 AM PST See more Security ALSO SEE * Quick glossary: Cybersecurity attacks (TechRepublic Premium) * Quick glossary: Cybersecurity attack response and mitigation (TechRepublic Premium) * Phishing and spearphishing: A cheat sheet for business professionals (TechRepublic) * Botnets: A cheat sheet for business users and security admins (free PDF) (TechRepublic) * Online security 101: Tips for protecting your privacy from hackers and spies (ZDNet) * All the VPN terms you need to know (CNET) * Cybersecurity and cyberwar: More must-read coverage (TechRepublic on Flipboard) WHITE PAPERS, WEBCASTS, AND DOWNLOADS INTEL® EDGE AI CERTIFICATION Training from Intel Register Now IVACY VPN: LIFETIME SUBSCRIPTION Downloads from TechRepublic Academy Learn More RASPBERRY PI & ARDUINO DEVELOPER BUNDLE Training from TechRepublic Academy Read More PDF CONVERTER PRO: LIFETIME LICENSE Tools & Templates from TechRepublic Academy Give It A Try! HIRING KIT: COMPUTER RESEARCH SCIENTIST Tools & Templates from TechRepublic Premium View This Now * * * * ACCOUNT INFORMATION TechRepublic close modal SHARE WITH YOUR FRIENDS Cybersecurity best practices: An open letter to end users Check out this article I found on TechRepublic. Your email has been sent Share: Cybersecurity best practices: An open letter to end users By Jack Wallen Jack Wallen is an award-winning writer for TechRepublic, The New Stack, and Linux New Media. He's covered a variety of topics for over twenty years and is an avid promoter of open source. For more news about Jack Wallen, visit his website jackwallen.com. * ACCOUNT INFORMATION TechRepublic close modal CONTACT JACK WALLEN Your message has been sent * | * See all of Jack's content * Security EDITOR'S PICKS * Image: Rawpixel/Adobe Stock TechRepublic Premium TECHREPUBLIC PREMIUM EDITORIAL CALENDAR: IT POLICIES, CHECKLISTS, TOOLKITS, AND RESEARCH FOR DOWNLOAD TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project. TechRepublic Staff Published: May 20, 2022, 5:30 AM PDT Modified: May 21, 2022, 3:52 AM PDT Read More See more TechRepublic Premium * Image: Andy Wolber Software BEST CLOUD BACKUP SERVICES AND SOLUTIONS 2022 These 11 cloud-to-cloud solutions back up your organization’s data so you’ll be covered in the event of deletions, malware or outages. Compare the best online cloud backup services now. Andy Wolber Published: April 11, 2022, 4:58 AM PDT Modified: May 25, 2022, 7:44 AM PDT Read More See more Software * Image: Microsoft Software HOW TO USE THE WALKIE-TALKIE FEATURE IN MICROSOFT TEAMS You can use a mobile device to speak with another person directly through the Teams app. Lance Whitney shows you how to use this handy feature. Lance Whitney Published: April 8, 2022, 8:17 AM PDT Modified: April 11, 2022, 6:38 AM PDT Read More See more Software * Image: metamorworks, Getty Images/iStockphoto Security “BROWSER IN THE BROWSER” ATTACKS: A DEVASTATING NEW PHISHING TECHNIQUE ARISES A phishing technique called Browser in the Browser (BITB) has emerged, and it’s already aiming at government entities, including Ukraine. Find out how to protect against this new threat. Cedric Pernet Published: April 1, 2022, 6:34 AM PDT Modified: April 1, 2022, 6:36 AM PDT Read More See more Security * Image: iStock/Deagreez Software BEST PROJECT MANAGEMENT SOFTWARE AND TOOLS 2022 With so many project management software options to choose from, it can seem daunting to find the right one for your projects or company. We’ve narrowed them down to these nine. Moira Alexander Published: March 11, 2022, 7:10 AM PST Modified: May 25, 2022, 7:43 AM PDT Read More See more Software * Image: iStockphoto/a-image Innovation QUANTUM COMPUTING ECOSYSTEM EXPANDS IN ALL DIRECTIONS Start-ups, DARPA and Accenture Ventures announce research partnerships, new hardware and strategic investments. Veronica Combs Published: April 11, 2022, 7:42 AM PDT Modified: April 11, 2022, 10:51 AM PDT Read More See more Innovation TECHREPUBLIC PREMIUM * TechRepublic Premium HOW TO RECRUIT AND HIRE AN OPERATIONS RESEARCH ANALYST Recruiting an Operations Research Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job.This hiring kit from TechRepublic Premium includes a job description, sample interview questions ... Downloads Published: May 19, 2022, 5:00 PM PDT Modified: May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium * TechRepublic Premium QUICK GLOSSARY: INDUSTRIAL INTERNET OF THINGS The digital transformation required by implementing the industrial Internet of Things (IIoT) is a radical change from business as usual. This quick glossary of 30 terms and concepts relating to IIoT will help you get a handle on what IIoT is and what it can do for your business.. From the glossary’s introduction: While the ... Downloads Published: May 19, 2022, 5:00 PM PDT Modified: May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium * TechRepublic Premium SOFTWARE PROCUREMENT POLICY Procuring software packages for an organization is a complicated process that involves more than just technological knowledge. There are financial and support aspects to consider, proof of concepts to evaluate and vendor negotiations to handle. Navigating through the details of an RFP alone can be challenging, so use TechRepublic Premium’s Software Procurement Policy to establish ... Published: April 14, 2022, 5:00 PM PDT Modified: April 16, 2022, 1:00 PM PDT Read More See more TechRepublic Premium * TechRepublic Premium HOW TO RECRUIT AND HIRE A SECURITY ANALYST Recruiting a Security Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This hiring kit from TechRepublic Premium includes a job description, sample interview questions and a basic want ad that you can customize for your business to find, interview, recruit and hire the best candidates for a ... Downloads Published: April 14, 2022, 5:00 PM PDT Modified: April 16, 2022, 2:00 PM PDT Read More See more TechRepublic Premium SERVICES * About Us * Membership * Newsletters * RSS Feeds * Site Map * Site Help & Feedback * FAQ * Advertise * Do Not Sell My Information EXPLORE * Downloads * TechRepublic Forums * Meet the Team * TechRepublic Academy * TechRepublic Premium * Resource Library * Photos * Videos * TechRepublic * TechRepublic on Twitter * TechRepublic on Facebook * TechRepublic on LinkedIn * TechRepublic on Flipboard © 2022 TechnologyAdvice. All rights reserved. * Privacy Policy * Terms of Use * Property of TechnologyAdvice