Proper Workstation Use
Workstation Image

Proper Workstation Use

Personal pictures, social networking, online banking are all services that you should not do, or be logged in to on your work computer. Work computers are for work, visiting work-related websites, researching, emailing, generating Powerpoint slideshows, and other work-related actions. Much like posts to social networking sites, everything you say or do can be used against you.

Acceptable Use Policy

Most organizations have a ‘workstation acceptable use policy’ that explains the proper use of your work computer. If your organization has this type of policy, make sure you take the time to read it. All of the things you do on your work computer such as, visiting websites, how much time is spent on Facebook, playing solitaire, using instant messenger chat, can be monitored and logged. Think about what you’re doing, anything you post on the internet is there forever.

Be Safe Online

When it comes to visiting websites or opening personal emails, those actions can affect your work computer and other work computers in your organization. If you happen to visit a site that has malware, you may now have exposed the rest of the company to a malware infection. Try to be aware that you are using a computer that is not yours, the things you do on that computer are not private and could have an impact on your entire company.



Knowbe4 Logo

Stop, Look, and Think. Don’t be fooled.

Like this article?

Share on Facebook
Share on Twitter
Share on Linkdin
Share on Pinterest

More Posts

Incognito Mode Image
Cybersecurity

3 Myths About Incognito Mode

In today’s digital age, protecting our online privacy has become increasingly important. Many users turn to incognito mode, also known as private browsing, believing it

Hacker Fire Image
Cybersecurity

Insights from 3.5 Billion Cyber Attacks

90% involve social engineering (see below)   In the realm of cybersecurity, the ability to predict and prepare for attacks is invaluable. Much like how

Deepfake Image
Cybersecurity

Deepfake Voice Phishing

How It WorksDeepfake technology uses artificial intelligence to mimic voices with astonishing accuracy. Scammers obtain samples of the target’s voice, often from social media or

SuperPod with WiFi 6E

Plume SuperPod WiFi 6E Specs

SuperPod with WiFi 6

Plume SuperPod WiFi 6 Specs

SuperPod

Plume SuperPod Secs