More and more companies are attacked by hackers. Your workplace already applies many measures to maintain security, but you can also contribute. This article provides you, the employee, with tips for how you can help your workplace keep hackers out.

Mobile units are a challenge

Your being on the move with your mobile phone and laptop causes challenges. If you log onto Wi-Fi networks without a password, the so-called open networks, you may cause for your workplace to become vulnerable.

It is a challenge to your company – and you may ease their work by being careful with using these networks.

To mention an example, you can avoid the risk by remembering to use a VPN solution. A VPN hides your connection so that it is more difficult, if not impossible, to hack your unit. This is the safest way to connect to your workplace when you’re on the go. Your workplace probably already has a VPN solution that you can use. Use it! Then you’ll help protect your workplace.

If you want to be entirely sure that nothing will happen, use the 4G network of your phone. Using the 4G network, you will entirely avoid using the open and insecure network.

Be aware of phishing

Phishing mails are now widely used. They are emails that pretend to be from your bank or a public authority, but when you click on a link in the email, hackers will steal your data or open a port to your computer through which they can come in.

The spam filter at your workplace will catch some of these emails before they enter your inbox, but unfortunately, not them all. Therefore, pay attention to whom you receive emails from and what they send you. For example, check the email address from which they are sent or whether they ask for information which for example your bank already has. If it looks suspicious – then: Delete it.

The little things make a big difference

Of course, there are also many little things that you can do to improve security. For example, a so-called two-factor login may contribute to stopping uninvited guests.

A two-factor login is quite simple. Instead of one password, you need two. One for e.g. your email, and one that you will receive on your phone and that you will have to enter in the same way as NemId before you gain access.

The hacker will have to know both your email password and to have access to your phone to break in. Two-factor logins are not limited to emails. They can often be used for your email account, iCloud, social media and may other services on the Internet.

Your passwords must be strong

Use strong passwords! You’ve heard it before, but it’s important. Instead of a password such as thomas1976, use a password that is not related to you as a person or in which it is too easy to find a pattern (Summer2018). A strong password uses capital letters as well as lower-case letters, numbers and characters and is long. It doesn’t have to be difficult to remember. HolidayinSwitzerland2017! Is a very strong password and is also easy to remember. Especially if you have been on holiday in Switzerland.

So-called password banks are a very good alternative. They save your passwords for you and also allow you to generate strong passwords of up to 17 numbers.

You have probably experienced having to change passwords every six months. It might be difficult, but it makes things difficult for hackers and boosts security. Again, password banks can help you. In many cases, they change passwords for you automatically with a single push on a button. They also keep track of which password you use in a six-month period. All of these steps are relatively simple and easily accessible. And they make the world of a difference. If you start updating your IT security at work (and on your home computer) already today, you will remove at least one issue for your workplace already tomorrow.

Leave security to CapaSystems – read more

Download the free Whitepaper

 

"From operations to strategy"

 

You’re very likely facing this every day—a requirement for increased automation throughout the organization in order to raise competitiveness and also increase user satisfaction. That’s a difficult balancing act, and only few people succeed.

 

Download the free Whitepaper from CapaSystems and read more...

Thank you for signing up. You will receive a link to our free Whitepaper in your inbox.

Download the free Whitepaper regarding Digital Employee Analytics

 

"Employees are (also) the real success factor in the digital era"

 

In today’s digital world, employees build their careers on the ever-changing opportunities presented to them. So, competitiveness requires more from companies than ever before — you need to present your corporation as attractive as possible to existing as well as future employees.

Therefore, you need to incorporate the Employee Experience, which includes all aspects of the relation between the employee and the employer.

 

Download the free Whitepaper from CapaSystems and read more...

Thank you for signing up. You will receive a link to our free Whitepaper in your inbox.

Download the free Whitepaper

 

"How to select the right software provider"

 

Software providers abound, and very likely they will call you again and again wanting to present their solutions.

CapaSystems has made a brief guide with concrete advice on what you need to be aware of when you contemplate switching software providers or wish to integrate a new system in your organization.

 

Download the free Whitepaper from CapaSystems and read more...

Thank you for signing up. You will receive a link to our free Whitepaper in your inbox.

Download a free Whitepaper regarding the CIOs role in the future

 

"CIO as business developer"

 

It is crucial that businesses’ CIOs are able to identify, select and evaluate the IT services that provide maximum insight and increase growth and productivity. That requires tools that provide up-to-date operational insight into services’ functionality and stability.

 

Download the free Whitepaper from CapaSystems and read more...

Thank you for signing up. You will receive a link to our free Whitepaper in your inbox.

User Experience

Download free whitepaper regarding performance issues and end user simulation

 

"Solve your performance issues with end user simulation"

 

A recent study showed that Danish employees waste an average of 144 hours a year on slow computers. To a company of 500 employees, that is hundreds of thousands of Danish kroner. This whitepaper describes how you can minimise waiting time by having your IT provider comply with your service agreements.

 

Download the free Whitepaper from CapaSystems and read more...

Thank you for signing up. You will receive a link to our free Whitepaper in your inbox.

Download free Whitepaper from CapaSystems regarding performance issues and how to awoid wasting time

 

"Analyze infrastructure and use time efficiently"

 

Performance problems and long login times can easily cost businesses and organizations time that corresponds to several full-time jobs every year. It can be hard to identify the roots of the problems with traditional solutions.

End-user performance monitoring, however, provides an overview that covers the entire infra-structure – from end users to network and server applications. That provides an accurate, factual basis for correcting current problems and for nipping future problems in the bud.

 

Download the free Whitepaper from CapaSystems and read more...

Thank you for signing up. You will receive a link to our free Whitepaper in your inbox.

Download free whitepaper regarding BYOD

 

"Bring Your Own Device?"

 

Mix of personal and business applications on same IT devices makes IT departments worry.

But what about the security of your company in this universe of personal and business apps provided by a Bring Your Own Device (BYOD) culture?

 

 

 

Download the white paper from CapaSystems and read more...

Thank you for signing up. You will receive a link to our free Whitepaper in your inbox.

Download free whitepaper regardingShadow IT

 

"Cast new light on Shadow-IT"

 

It’s a challenge when employees and business units purchase technology and IT services without involving the IT department. You easily lose perspective of finances, agreements and where important information is located –and if you’re not able to name who’s responsible for support from day one, a service outage risks being interpreted as internal trouble, even though the IT department has nothing to do with it.

 

 

Download the Whitepaper from CapaSystems and read more...

Thank you for signing up. You will receive a link to our free Whitepaper in your inbox.

Download free whitepaper regarding security

 

"3 steps to secure the company against data sheft"

 

It is said that a chain is only as strong as its weakest link. Therefore, your weakest link in the IT systems will have to be properly secured. Here are our suggestions for three things that can secure your IT infrastructure.

 

 

Download the Whitepaper from CapaSystems and read more...

Thank you for signing up. You will receive a link to our free Whitepaper in your inbox.