Cyber Secure Return to the Office
Security in the work environment is always critical – perhaps now more than ever. As employees begin returning to the office, revisiting basic cybersecurity practices is encouraged and cannot be overlooked. In addition to consulting with your own information and cyber security teams, there are several best practices we recommend reviewing.
Review and revise employees access controls to networked devices as necessary (reflect any changes to roles, responsibilities, etc.)
Update old login credentials (administrator, community strings, etc.) according to your company policies or follow guidelines for password complexity.
Make sure only necessary devices are connected and securely configured (image overwrite enabled, authentication required, disable unused ports, etc.)
Ensure you have the latest security related software releases/patches installed on your multifunction devices or printers.
Print Security for Home Office
While not everyone is returning to the office, home office can be a safe haven. Security should still be top of mind. Here are a few security tips for the home office:
ensure home/remote network is using secure authentication for your router or (WPA2 or later)
Keep printer software up to date. Use auto software update when possible.
Set a unique local printer administrative password to prevent accidental re-configuration or snooping.
of organizations have had a print breach1
of all breaches are carried out within minutes2
What We Provide
We provide Managed Information Technology Services, Document Management, and Print Solutions. We offer free consultations to ensure you are maximizing your productivity workflow and network security. Our Specialists can put together a strategic plan that is impactful and cost-effective. Altek can analyze your current infrastructure and office technology to create a plan that aligns with your company’s needs while staying within a monthly budget.
1. 2010 “Annual Study: US Cost of a Data Breach.” The Ponemon Institute, LLC, March 2011
2. Verizon 2015 data breach investigations report