Blog / Security

3 Reasons Why Your Coffee Break is Leaving Your System Vulnerable to a Cyber Attack

10/24/2018

As you move towards creating a more secure environment at your organization, it’s important to have policies in place that protect your assets from unauthorized access and changes. You should consider implementing something such as a lockout policy that will dim your screen after 10 minutes of inactivity and will require a logon password after 15 minutes.

Why is this important?

A common misconception, is that locking your computer ONLY protects against internal threats. Mythbusted! Not only does it protect us from internal threats but also helps by delaying external attacks.

  1. Accidents Happen

Sometimes screens power off or revert to screen savers, commonly most people use a key like “space” or “enter” to wake up the computer without realizing that often a button can trigger a command i.e. submitting a form, saving changes.

  1. Confidential Communications and Documents

Not locking your computer is like surrendering access of your files, whether personal, confidential or public to unauthorized persons. Next time you leave your computer unlocked just remember, anyone can gain access to your computer and modify, remove or even share data from your computer.

  1. Keyloggers

A keylogger is a hacking software or device that is designed to record your keystrokes and send the data back to its server. Data collected can range from pins, passwords, account number and email addresses. Opening emails and files from unknown providers (phishing emails) often contain these types of viruses. By locking your computer you help prevent others from accessing your system.

Locking your computer is easy.

lock-your-computer

So, if you are getting up to grab a coffee or take a restroom break, please remember to lock your computer before leaving your desk.

Related Resources

BlogBlog

People Who Deliver: Spotlight Interview with Greg Pettine

Enter go to Blog : People Who Deliver: Spotlight Interview with Greg Pettine
BlogBlog

Recover from a Ransomware Attack with Involta Backup-as-a-Service

Enter go to Blog : Recover from a Ransomware Attack with Involta Backup-as-a-Service
BlogBlog

Involta Cares: Lambda Lambda Lambda and Involta Raise Money for a Tucson-based Nonprofit

Enter go to Blog : Involta Cares: Lambda Lambda Lambda and Involta Raise Money for a Tucson-based Nonprofit
BlogBlog

People Who Deliver: Spotlight Interview with Brett Beuckman

Enter go to Blog : People Who Deliver: Spotlight Interview with Brett Beuckman
BlogBlog

Involta’s Backup Health Check: Prepare Your Business With 3 Simple Steps

Enter go to Blog : Involta’s Backup Health Check: Prepare Your Business With 3 Simple Steps
BlogBlog

Backup-as-a-Service FAQ

Enter go to Blog : Backup-as-a-Service FAQ

Stay up to date with the latest from Involta

We use cookies to offer you a better web experience. By continuing to use our website, you agree to the Privacy Policy.