With GDPR buzzing in your ear, it is a good time to review (or create) your IT Security.

Although this sounds like something only businesses should do, it is also worth individuals having things in place to protect not only their personal data but the data they hold on other people.

So here are 5 quick things you can do to protect yourself:


Quick Step:         Set a passwordIT Security -Computer Login

It seems obvious, but many computers do not have a password and boot straight to desktop.

Next Step:           2 Factor Authentication

Even if someone gets access to your password. You have a 2nd authentication in the form of a Mobile Phone or Authenticator App.

Extra Step:          Lock your computer when you leave your desk.

Windows + L or Command + Shift +Power


Device Protection

Quick Step:         Use a Standard Computer Account

Stop users by intentionally or accidentally installing unwanted programs. Where possible, devices should have a standard users account for everyday activities and a password protected administrator account.

Next Step: Restrict Boot Options

With all the device and password security, it is still possible to bypass that using a CD or USB. These can be used to boot into a separate Operating System and access the files stored on the hard disk.

Extra Step:          Encrypt your Devices

Encrypting your devices ensures that even if your password is bypassed your data is still protected.



Quick Step:         Check Sender address

It says from BT Mail however the e-mail address is not.

Spoofed E-mail

Next Step:           always be diligent

If your gut says it doesn’t sound right, then you are probably right. There is always time to stop and think, never let fear force you to click that link or sign in to the weird looking website.

Extra Step:          Increase Spam Settings

If you find that too many spam e-mails are getting to your inbox, then increase the Spam filter.

Although you do need to be aware that this may result in some legitimate e-mails ending up in the spam folder.


Confidential Data

IT Security - Protect Document

Quick Step:         Password Protect Files

The 1st Option in MS Office it to Protect Document. For other file types a password protected zip will do the trick.

Next Step:           Separate files

Keep you work and personal systems separate, especially if you work at home. You don’t want to mix up any files.

Extra Step:          Data disposal service

When disposing of a machine, make sure you get it wiped correctly. Delete doesn’t really mean delete.


Wireless Access

Quick Step:         Guest Network

Access to your wifi, can mean access to your network. Some routers have a guest feature which puts wireless devices on to another network.

Next Step:           Review Mobile Devices

Is your super fast internet running slow? Review how many mobile devices are connected. They love wifi as for them its unlimited download. App Updates, System Updates and backups.

Extra Step:          Turn Off Public Wifi

Some systems come with a public function which allows subscribers to use your wifi and connection. although this is separate from your network, it still puts a load on the router and connection.


5 Quick IT Security Tips
Tagged on:

Leave a Reply

Your email address will not be published.