Cyber Security Tip: What the heck is an AUP

Cyber Security Tip: What the heck is an AUP

Feb 13, 2024

..and why do you want it?

With people working from who knows where and so many access points from cell phones to laptops and home computers, how can anyone hope to keep their network safe from hackers, viruses and other unintentional security breaches? The answer is not “one thing” but a series of things you have to implement and constantly be vigilant about, such as installing and continually updating your firewall, antivirus, spam-filtering software and backups. This is why clients hire us – it’s a full-time job for someone with specific expertise (which we have!).

Once that basic foundation is in place, the next most important thing you can do is create an Acceptable Use Policy (AUP) and TRAIN your employees on how to use company devices and other security protocols, such as never accessing company e-mail, data or applications with unprotected home PCs and devices (for example). Also, how to create good passwords, how to recognize a phishing e-mail, what websites to never access, etc. NEVER assume your employees know everything they need to know about cyber security. Threats are ever-evolving, and attacks are getting more sophisticated and clever by the minute.

This e-mail series is one great way to keep your employees informed, but you STILL need training and a good AUP in place. If you’d like our help in creating an AUP for your company, based on best practices, call us at 480-999-5468
or reply to this e-mail You’ll be glad you did.

Have questions about cyber security or some other IT-related issues? Book Now to book a quick, 15-minute session, or call 480-999-5468 to speak to someone now.

Related Posts

Cyber Security Tip: POP QUIZ: You’re hacked…what do you do?

Cyber Security Tip: POP QUIZ: You’re hacked…what do you do?

IT Security Tip #40:

Think fast: what’s the first thing you do after realizing you just replied to the e-mail from the Nigerian prince wanting to give you a sum of $34 million? Okay, you most likely didn’t reply to that…but let’s suppose you suddenly realize your machine or device has been compromised and you’re staring at a ransom note. Now what?