Understanding IT Security Policies at ECSAHC
Solution:
- Follow Organization Security guidelines – Use only approved IT devices and software.
- Do not share login credentials – Every account must be used by a single authorized user.
- Use strong passwords – And update them regularly.
- Lock your workstation when away – Press Win + L to lock Windows devices.
- Report lost or stolen devices immediately – IT can help secure or wipe data remotely.
- Avoid installing unauthorized software – Unverified software can contain malware.