End User Security Tips

6 Helpful End User Security Tips

Cybercriminals are tricky fellows. They try their best to sneak into your organization’s network and wreak havoc. Often, their goal is to steal your company data and hold it for ransom. From an IT department’s perspective, there are many things that can be done on the system level to prevent such cyberattacks. You can upgrade to a newer firewall, utilize different anti-malware programs, and deploy network monitoring tools, among many other things.


But in the end, the cybercriminals aren’t targeting the hard-to-crack IT department.


They’re targeting the end users.


It makes total sense; end users don’t have the technical know-how to spot malicious attacks. They are by far the most likely to be in direct contact with cyberattacks, and they’re the ones most likely to interact with the attackers. Statistics show that 30 percent of phishing emails get opened. With so many end users dealing with these cybercriminals, you must ask yourself:


Are you training them well enough to deal with these attackers?


It’s vital to have employee training to minimize the risk of attacks affecting your company. We’ve compiled six helpful end user security tips to guide them to better security practices for your company.

1. Lock It Up

Many people simply get up from their computer and walk away. That’s an open invitation for someone to jump onto it and do whatever they want. Instead, make it a habit to teach employees to lock their computer every time that they move away from it, and adjust their automatic lock setting in case they forget. If your car is full of stuff, you definitely wouldn’t leave it unlocked in the middle of a busy street.


Why wouldn’t you do the same for your computer?

2. Open Sesame

A no-brainer, but it still needs to be mentioned from time to time. Picking a good password is critical to securing your data. In a similar vein, leaving your password on a sticky note near your computer is a big no-no. Literally anyone can walk by and access your data.


Stop doing that.

3. Triple-Double Check

Why is the CEO of your company asking for your bank information and social security number? They shouldn’t do that, and you know that. Often times, they aren’t even the ones asking. They may be the victim of email spoofing or may have had their email compromised entirely. Always call or contact the person (or their assistant) directly to double-check for legitimate requests.


A simple phone call can save everyone from a massive data breach.

4. The Latest and the Greatest

Software updates contain patches to security holes. Keeping your software updated to the latest edition is your best bet for keeping cyberattackers away from your data. If you don’t have administrative rights on your computer, let your IT department know that you need updates.


Better safe than sorry.

5. Easy on the Downloads

When you download things, especially programs, you need to make sure that they’re completely safe. Installing a malicious program on your computer could spell doom for not just you, but anyone connected to your computer on your network. When downloading files, make sure that they come from a trusted source.


Don’t get your download privileges removed.

6. Check That WiFi

Often a company will allow their employees to connect to an office WiFi network. This network is typically secured and comes with various built-in security protocols. Malicious cybercriminals can (and will) create open WiFi networks with a similar name as the real one. This means that you might connect to their network, which would allow them access to all of your data on the connected device.


Don’t give hackers your data through WiFi.

End User Security with Diverge IT

So there you have it. Six perfectly good security tips to help your end users navigate the dangerous internet a little bit better. With those tips in use, you’ll see greatly reduced numbers of successful cyberattacks.

And if you thought those were useful, you should see what we can do for your company. Reach out to us and we’ll work out a detailed security plan that will keep your business more protected than ever before.

Should have virtualized

The Man Who Should Have Virtualized (A Short Story)

The computer screen went completely blank. Joe blinked, and sighed deeply.


“Not again”, he muttered, as he got up from his chair.


He excused himself from the meeting. After weeks of preparation, it was all falling apart. Michelle glared at him as he got up. Clark shot him a sly grin.


Joe pretended not to notice either.


“Sorry, everyone. I gotta go check on the server. Hunk of junk is acting up again.”


Hastily he walked out of the conference room and began the long trek over to the server. With each step he took, Joe’s stomach knotted further. He worried about how much the repairs were going to cost, and how long it would take for the server to come back on.


If it would even come back on, at all.


Before he knew it, his hand was on the doorknob to the server room. The smell of burnt plastic and musty air surrounded him immediately. He glanced at the screen for activity.




Joe quickly deduced that a cheap cable had fried the power supply to the server. He begrudgingly dialed the product support line, and was greeted by an enthusiastic man named David.


“Hello, Mr. Phillips. How may I help you today?” David said, with boundless cheer.


“I need a new power supply to my server. This one is totally wrecked. Looks like there might be other damage, too.”


“We can absolutely do that for you! We’ll need to schedule a technician to go out there and assess any further damage. I see that you’re no longer covered by our warranty, so this will be an independent charge. Is that okay?”


Joe froze.


Unsure of what to do, he racked his brain for options.

What Should Joe Do?

Joe could very well pay for a replacement part for his server. But, would it be worth it?


The answer is that it would not.


Joe’s next action should be to look into virtualizing his server. For him, that means that his precious data is stored in a secured facility. He can access it from anywhere, and he can avoid annoying (and potentially embarrassing) situations like his failed meeting.  


Aside from simply accessing his data, Joe would also save lots of money. Without the need for repairs, he could allocate funds to other areas of the business. Additionally, not having a server would save him a considerable amount on energy costs and help the company go green too.


As an added bonus, Joe would also eliminate the need for tedious updates and constant support. His IT team could focus on other areas of his organization, improving overall infrastructure instead of focusing on a defunct server.


The benefits of moving to a virtualized server are clear. But, Joe would need an experienced partner to virtualize all of his data.


Who could possibly help him with the task?

Virtualization with Diverge IT

Partnering with Diverge IT makes virtualization a breeze. Joe should partner with us to experience minimum downtime during his transition to the virtualized server. He’ll receive support along the way, and save money in the process.


If you and your company are like Joe, you should chat with us today. We’ll work with you to determine how to go about virtualization, and we’ll build a plan that will outline your path to success.