{"id":15691,"date":"2024-02-06T11:36:40","date_gmt":"2024-02-06T16:36:40","guid":{"rendered":"https:\/\/collierclerk.com\/?p=15691"},"modified":"2026-01-20T12:59:34","modified_gmt":"2026-01-20T17:59:34","slug":"best-practices-for-computer-users","status":"publish","type":"post","link":"https:\/\/app.collierclerk.com\/collierclerkcom\/best-practices-for-computer-users\/","title":{"rendered":"Best Practices for Computer Users"},"content":{"rendered":"<p><strong>Avoiding Phishing and Social Engineering Attacks<\/strong>\u00a0<\/p>\n<p>What should you do if you&#8217;re involved in a phishing attack?\u00a0<\/p>\n<p>Don\u2019t click! If you feel like something isn\u2019t right, you shouldn\u2019t click on a link or attachment or give out sensitive information.\u00a0<\/p>\n<p><strong>Never Reuse Passwords<\/strong>\u00a0<\/p>\n<p>Whether you are working from home or in the office you must make sure the passwords you use are unique to you and not easy to guess.\u00a0\u00a0<\/p>\n<p>Reusing passwords increases the potential damage that a data breach could cause. If an attacker manages to gain unauthorized access to your password on one account, they will then have access to all of your accounts that use the same credentials.\u00a0<\/p>\n<p><strong>Create Strong Passwords<\/strong>\u00a0<\/p>\n<p>The passwords you use should be unique for each account and difficult for a potential attacker to guess. You should never share your passwords with anyone.\u00a0<\/p>\n<ul>\n<li><strong>Use Passphrases.<\/strong> A strong password doesn\u2019t have to be hard for you to remember. Simply memorize a series of unrelated words and combine them together into a passphrase.\u00a0<\/li>\n<li><strong>Easy to remember, hard to guess.<\/strong> If you have an easy to remember password you will not have to write it down, reducing the opportunity that someone will find your written password. Ideally the password you make should not contain any personal details about you such as birthdays or the names of children\/pets.<\/li>\n<\/ul>\n<p><strong>Beware of Eavesdropping and Shoulder Surfing<\/strong>\u00a0<\/p>\n<p>Working remotely comes with its fair share of freedoms. The ability to work from anywhere is a great perk but it\u2019s also a significant security risk. If you decide to leave home to work in a public space, you should be mindful of who has a line-of-sight towards your laptop. You should also refrain from openly discussing sensitive company topics when working in public.\u00a0<\/p>\n<p><strong>Beware of Public Wi-Fi<\/strong>\u00a0<\/p>\n<ul>\n<li>Attackers could make a \u201choneypot\u201d where they spoof an existing hotspot. Once you connect to their hotspot they can perform a man-in-the-middle (MITM) attack to intercept your connection with a fake domain that looks like the one you were trying to visit. Once you login to the fake domain they now have your login credentials.<\/li>\n<li>Traffic Sniffing. Other users of the hotspot could potentially see your traffic on unencrypted websites if the provider of the public Wi-Fi does not have adequate security controls in place.<\/li>\n<\/ul>\n<p>Hacking, phishing, and malware incidents are becoming the number one cause of security breaches today. But, what\u2019s more troubling, these hacking attempts are the result of human errors in some way. Education and awareness are critically important in the fight against cybercriminal activity and preventing security breaches.\u00a0<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-15692\" src=\"https:\/\/collierclerk.com\/wp-content\/uploads\/CIT-300x175.png\" alt=\"\" width=\"500\" height=\"292\" srcset=\"https:\/\/app.collierclerk.com\/collierclerkcom\/wp-content\/uploads\/CIT-300x175.png 300w, https:\/\/app.collierclerk.com\/collierclerkcom\/wp-content\/uploads\/CIT-150x88.png 150w, https:\/\/app.collierclerk.com\/collierclerkcom\/wp-content\/uploads\/CIT.png 624w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>By following these best practices, end users can contribute to a more secure computing environment.\u00a0<\/p>\n<p><strong><a href=\"https:\/\/designrr.page?id=270070&amp;token=1480180582&amp;h=5158\">Read the full February 2024 Newsletter here.<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Avoiding Phishing and Social Engineering Attacks\u00a0 What should you do if you&#8217;re involved in a phishing attack?\u00a0 Don\u2019t click! If &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"Best Practices for Computer Users\" class=\"read-more button\" href=\"https:\/\/app.collierclerk.com\/collierclerkcom\/best-practices-for-computer-users\/#more-15691\" aria-label=\"Read more about Best Practices for Computer Users\">Read more<\/a><\/p>\n","protected":false},"author":19,"featured_media":15693,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[549,954,856,955,956],"class_list":["post-15691","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-announcements","tag-best-practices","tag-passwords","tag-phishing","tag-public-wi-fi","tag-surfing","infinite-scroll-item","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-25","resize-featured-image"],"_links":{"self":[{"href":"https:\/\/app.collierclerk.com\/collierclerkcom\/wp-json\/wp\/v2\/posts\/15691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/app.collierclerk.com\/collierclerkcom\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/app.collierclerk.com\/collierclerkcom\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/app.collierclerk.com\/collierclerkcom\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/app.collierclerk.com\/collierclerkcom\/wp-json\/wp\/v2\/comments?post=15691"}],"version-history":[{"count":2,"href":"https:\/\/app.collierclerk.com\/collierclerkcom\/wp-json\/wp\/v2\/posts\/15691\/revisions"}],"predecessor-version":[{"id":15734,"href":"https:\/\/app.collierclerk.com\/collierclerkcom\/wp-json\/wp\/v2\/posts\/15691\/revisions\/15734"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/app.collierclerk.com\/collierclerkcom\/wp-json\/wp\/v2\/media\/15693"}],"wp:attachment":[{"href":"https:\/\/app.collierclerk.com\/collierclerkcom\/wp-json\/wp\/v2\/media?parent=15691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/app.collierclerk.com\/collierclerkcom\/wp-json\/wp\/v2\/categories?post=15691"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/app.collierclerk.com\/collierclerkcom\/wp-json\/wp\/v2\/tags?post=15691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}