Understanding IT Security Policies at ECSAHC

Solution:

  • Follow Organization Security guidelines – Use only approved IT devices and software.
  • Do not share login credentials – Every account must be used by a single authorized user.
  • Use strong passwords – And update them regularly.
  • Lock your workstation when away – Press Win + L to lock Windows devices.
  • Report lost or stolen devices immediately – IT can help secure or wipe data remotely.
  • Avoid installing unauthorized software – Unverified software can contain malware.