More IT Support Tips and Secrets Revealed!

This past Spring we revealed a few IT support tips and IT secrets and found this to be a fun blog post! We figured… why not share a few more tips and secrets this Fall too. In this blog post, we’re revealing a few more helpful IT security tips and IT secrets that will keep your technology safe from hackers and cyber attacks.

IT Security Tip #1: The on-screen keyboard: use it!

One of the most notorious spyware/malware targets is your keyboard – keylogger software has been around for ages. The longtime favorite of electronic crooks, keyloggers are made even easier for bad guys to distribute and for you to accidently come in contact with by modern security breaches. The keylogger does just what it sounds like – it logs every key that you type, and then sends a log of all the keystrokes back to the attacker. How many passwords, account numbers and other sensitive data do you type on a daily basis? These are all valuable on the black market.

Luckily, there’s an easy way you can make sure sensitive passwords and data are safe from these keystroke-stealing criminals –  SECRET REVEALED!   >> use an on-screen keyboard when typing in sensitive passwords, social security numbers or other data. Your computer will see the on-screen keyboard taps as mouse-clicks instead of keyboard input. Banks are making on-screen keyboards more accessible to their clients on a daily basis because of the added security over traditional keypads and keyboards. This simple change in habit could prevent complex problems in the future.

 

IT Security Tip #2: Back to Basics

A lot of time is spent on staying protected from the newest type of scam or the newest cybercrimes, but as is true with many things, remembering the basics is the entire foundation of making sure you, your company and your clients remain safe.

Everyone in the company or organization should know basic security principles. Security principles and policies should be documented and part of every new employee training. Strong password requirements, only connecting remotely over VPN and Internet usage guidelines are examples of some common security policy items. Strict penalties for violating the security policies should be detailed.

SECRET REVEALED!   >>  It’s not a good habit to save files onto your computer if there is a location on the network or on your server that they can live. They’re much less likely to be backed up on your computer, whereas they’ll reliably and regularly be backed up if they are saved on the server.

If you use websites or software that do not require regular password changes, set a calendar reminder to change the password yourself every other month.

As with other things, a little prevention goes a long way – remembering the security basics, and asking about them if you don’t know what they are, is the single best thing you can do to protect yourself and protect the company.

 

IT Security Tip #3: Remove that unwanted freeware

Like it or not, PC manufacturers LOVE to stuff your brand-new PC full of “free” applications (they get paid to do it, so you’ve got a slim chance of getting one without a side of spamware).  SECRET REVEALED!   >>  But clutter is the enemy of a speedy PC, and if you’re not using a particular software on a regular basis, it’s best to REMOVE it completely. That way you don’t have it sucking up processing speed AND leaving the door open to hackers and malware. 

 

IT Security Tip #4: The No. 1 threat to your security is…

YOU! And your employees. Like it or not, human beings are our own worst enemies online, inviting hackers, viruses, data breaches, data loss, etc., through the seemingly innocent actions taken every day online. In most cases, this is done without malicious intent – but if you as a manager or owner aren’t monitoring what websites your employees are visiting, what files they’re sending and receiving, and even what they’re posting in company e-mail, you could be opening yourself up to a world of hurt. 

That’s because employees’ actions can subject the company they work for to monetary loss, civil lawsuits, data theft and even criminal charges if they involve disclosure of confidential company information, transmission of pornography or exposure to malicious code.

SECRET REVEALED!   >>  One thing you can (and should) do is configure your firewall to document and monitor which websites users are visiting. Almost all enterprise-level firewalls have this ability built in; you simply need to configure it and monitor the reports (something we can certainly help you with). But it’s up to you to set the rules, write it into an Acceptable Use Policy (AUP), TRAIN employees on what is and isn’t acceptable and then get them to sign the AUP. 

 

If you’re a SDTEK client, we got you covered. If not, please  contact us  today to learn more about our IT support services. We can help create a secure IT environment for you and your employees.

SDTEK is a top rated IT support company servicing San Diego county. We are a creative managed it service provider who specializes in personalized technology support to help our clients accelerate the success and growth of their business.

June 17, 2025
Meeting IT security compliance standards is crucial for businesses that handle sensitive data, particularly in industries such as healthcare, finance, defense, and e-commerce. Regulatory frameworks such as HIPAA, CMMC, PCI-DSS, and GDPR exist to help ensure businesses protect customer information and maintain robust cybersecurity practices. Unfortunately, many organizations fall short of these requirements, often due to common, avoidable mistakes. These gaps can result in costly fines, data breaches, and reputational damage, which can significantly impact the business's bottom line and customer trust. 1. Failing to Conduct Regular Risk Assessments The Pitfall: Many businesses overlook the importance of conducting routine risk assessments. Without these, it’s challenging to identify vulnerabilities or evaluate whether your current cybersecurity controls meet compliance standards. How to Avoid It: Implement a regular risk assessment schedule. Work with a qualified IT provider to evaluate your systems, identify weaknesses, and document remediation plans. These assessments should be performed at least annually, or whenever significant changes to the system occur. 2. Inadequate Employee Training The Pitfall: Your employees are your first line of defense—and often your most significant vulnerability. A common compliance issue arises when businesses fail to train staff on cybersecurity best practices or on handling sensitive data appropriately. How to Avoid It: Invest in ongoing cybersecurity awareness training. Ensure employees understand how to recognize phishing emails, create strong passwords, and report any suspicious activity. Training should be updated regularly to reflect current threats and compliance requirements. 3. Improper Data Handling and Storage The Pitfall: Storing sensitive data in unsecured locations, failing to encrypt information, or retaining data longer than necessary are significant compliance risks. These practices are often flagged during audits. How to Avoid It: Adopt data classification policies that define how different types of data should be handled; encrypt sensitive data both at rest and in transit. Establish clear data retention policies and ensure that obsolete data is disposed of securely. 4. Lack of Incident Response Planning The Pitfall: When a security incident occurs, time is of the essence. Many businesses lack a documented incident response plan, or their existing plan hasn’t been thoroughly tested. This can lead to delayed responses, increased damage, and regulatory penalties. How to Avoid It: Develop a formal incident response plan that includes roles, responsibilities, communication protocols, and steps for containment and recovery. Run simulated breach scenarios with your IT team to ensure everyone knows how to respond effectively. 5. Using Outdated Software or Systems The Pitfall: Running outdated operating systems, software, or firmware is a common issue that can lead to compliance failures. Unsupported technologies are more vulnerable to exploitation. How to Avoid It: Keep all systems and applications up to date with the latest patches. Use automated tools to track software versions and receive alerts about end-of-life technologies. Schedule regular maintenance windows to apply updates and upgrades. 6. Insufficient Access Controls The Pitfall: Allowing too many employees access to sensitive data—or failing to revoke access when it’s no longer needed—can lead to data breaches and non-compliance. How to Avoid It: Implement role-based access controls and follow the principle of least privilege. This principle means that each user should have the minimum level of access necessary to perform their job. Regularly audit user accounts and permissions to ensure access is current and appropriate. Use multi-factor authentication (MFA) to add an additional layer of protection. 7. Neglecting Third-Party Vendor Risks The Pitfall: Businesses often overlook the fact that their compliance responsibilities extend to third-party vendors. If a vendor mishandles your data, you could still be held accountable. How to Avoid It: Vet third-party vendors carefully. Ensure they meet the same compliance standards as your business and include security requirements in your contracts. Conduct periodic audits or request compliance certifications from your vendors. 8. Failing to Document Policies and Procedures The Pitfall: Even if your security practices are strong, failing to document your compliance policies can result in audit failures. Regulators want to see evidence that you have formal processes in place. How to Avoid It: Create and maintain clear documentation for all compliance-related policies, including data protection, access control, incident response, and employee training. Make these documents easily accessible for audits and regularly review them to ensure updates are current. Conclusion Compliance with IT security standards is not a one-time project—it requires ongoing attention, regular updates, and a proactive approach to maintain effectiveness. By understanding and addressing these common pitfalls, your business can stay ahead of regulatory requirements, strengthen its security posture, and reduce the risk of costly incidents. This ongoing attention is crucial to maintaining your business's security and audit readiness. If you’re unsure whether your business is meeting current IT compliance standards, professional support can help. Contact SDTEK today to schedule a compliance assessment and learn how our IT services can keep your business secure and audit-ready. With our support, you can navigate the complex landscape of IT security compliance with confidence.
April 9, 2025
In today’s digital-first world, cybersecurity isn’t just a luxury—it’s a necessity. Whether you run a small startup or a growing enterprise in Fort Wayne , protecting your business’s data, systems, and clients is essential for long-term success. From ransomware attacks to phishing scams, cyber threats are evolving every day, and the best way to stay ahead of them is by partnering with a reliable IT services provider that understands the unique needs of local businesses. Here’s why investing in professional business IT support is one of the smartest decisions Fort Wayne businesses can make—and how working with SDTEK helps protect your operations, your data, and your reputation.