Microsoft 365 on Laptop

Five Incredible Microsoft 365 Tips and Tricks

So, you’re just making the leap to Microsoft 365 from Office 2013? Or you’ve been using the 365 suite for a while now but know you’re not getting everything out of it that you could? Let’s take a look at some handy hints to help you get the most out of your subscription:

1. Access free stock images in Microsoft 365

Yes! You read that right – free! In Word, Excel and PowerPoint, you can access a veritable treasure trove of images (along with stickers, cartoon people, illustrations and icons) at the click of a button (or two!). Simply head to Insert > Pictures > Stock Images and use the tabs to click through the media options.

2. Use ‘search’ to find functions instantly

Skip the menu bar and discover the function or command you need by typing a few letters into the ‘magnifying glass’ search box. For instance, start typing ‘wor’ in Word and your ‘Best Action’ will be Word Count. But just in case you were looking for ‘Insert WordArt’ – that will be an option, too. In Excel, start typing ‘fil’ and you’ll be able to instantly add or remove filters. Keep going to ‘fill’ and you’ll have fill colours available. Every function you need is there at your fingertips!

3. Speed up your standard-text emails with Quick Parts

If you find yourself typing the same text into every second email, you’ll love this one! To create a ‘Quick Part’, highlight the text in an email you want to use next time (and the time after that!) and then, via the Insert menu, click ‘Quick Parts’ and ‘Save Quick Part’. The next time you want to add that saved text, just use the same menu and insert your saved Quick Part. No more typing out directions to the office 20 times a day!

4. Freak out less with a ‘Focused Inbox’ 

Streamline your email handling by making full use of Outlook’s ‘Focused’ and ‘Other’ folders. Keep actionable items at the top of your to-do list in your Focused folder, while backburner messages are easily accessible in ‘Other’, without cluttering up a busy day. And if something in ‘Other’ suddenly becomes a top priority? Just right-click the message and select ‘Move to Focused’ (or vice versa back to ‘Other’).

5. Leverage the power of OneNote

OneNote is a digital note-taking application. It allows you to store links, save photos and drawings, brainstorm with colleagues and, if you’re using a device with touch capability, write or draw directly onto your note pages. Furthermore, because it automatically syncs your notes to the cloud, you can use it on any device, anywhere. Essentially, imagine a bookcase full of notebooks, all of them with unlimited (and endlessly customisable) pages that you can instantly access and that you can also allow others to access wherever they happen to be in the world. Possibilities galore!

Take your IT support to the next level

Geelong Technology Group has got great tips and hints for all sorts of tech – from upgrading your software to buying new hardware to business server and networking solutions. Whatever your IT requirements, we’re here to help.

Contact us on 1300 GET GTG (1300 438 484) for more information, or drop by 166 Francis St, Belmont, to view our range of Windows and Apple products and to chat with our friendly team. 

Microsoft Office 2013 End of Life – what you need to know

Microsoft Office 2013 End of Life – what you need to know

Still comfortably using Office 2013? It’s time to upgrade, we’re afraid!

Support for Office 2013 will end on 11 April 2023. Less than six months away! And, just in case you were hoping for a stay of execution, Microsoft Support has stated: ‘there will be no extension and no extended security updates.’ But what does this mean for the Office 2013 individual or business user on the ground?

What does ‘end of life’ actually entail?

Most Microsoft products have a support lifecycle that lasts for a fixed number of years. Office 2013 users have now had five years of Mainstream Support, followed by close to five years of Extended Support. When this support concludes in April next year, Microsoft will no longer provide:

 

  • phone or chat technical support for user difficulties
  • security fixes for identified vulnerabilities
  • bug fixes or updates for software issues. 

 

After the EoL date, people running Microsoft Office 2013 will still be able to access and use the software, but there will be no further updates or security patches. Continued use of the software without this technical support may lead to performance or reliability issues (with the possibility of increased downtime) and increase the likelihood of security breaches by cybercriminals.

Upgrade options for Office 2013 users

With the increased risk of data security breaches, we highly recommend you upgrade Office. Microsoft offers the choice of on-premises or cloud-based upgrades:

 

  • Office 2021 is an on-premises, one-time purchase home or business solution tailored for PC or Mac. This option includes Microsoft support free for the first 60 days. If you’re just upgrading one or two computers, have no need for cloud storage, and just use the basic Office functions (Word, Excel, PowerPoint, Outlook), you may prefer the Office 2021 option.
  • Microsoft 365 is a subscription-based suite that allows access to Office productivity apps via the cloud – making it easy to share and collaborate on documents and to work from whichever device you have available, whether that be PC, laptop, tablet or mobile. With 1TB of cloud storage, this option is Microsoft’s ‘future-proof’ upgrade, as you’ll always have access to the latest versions of Microsoft products and features as they’re released.

Benefits of upgrading from Office 2013

Just a reminder that upgrading from Microsoft Office 2013 is well worth your time and money. Updating your software will provide:

  • decreased IT costs (no custom fixes for end-of-life programs and the ability to scale up users with Microsoft 365 without setting up additional servers)
  • improved compliance (keep up-to-date with compliance regulations with the latest security patches)
  • stronger cybersecurity (those security patches will also help you defend against the newest cybersecurity threats).

Need a hand with your Microsoft Office migration?

If you’re an individual or business still using Microsoft Office 2013, it’s time to leap into the future (or at least the present!). Talk to Geelong’s IT specialists for more information or to assist you with the transition. Geelong Technology Group is a leading managed IT services provider and our team can simplify and facilitate the migration process – kickstarting your business productivity, fueled by the full benefits of up-to-date software.

Proudly servicing Geelong, the Bellarine Peninsula, the Surf Coast, and surrounding regions, GTG is here to help. Give us a call today on 1300 GET GTG (1300 438 484) or stop by our showroom at 166 Francis St, Belmont.

reply chain email attacks

What are reply chain email attacks?

Remember those chain letters you used to receive that promised untold wealth if you sent the required copies, and untold terror if you didn’t? Well, other than being similarly aggravating, reply-chain email attacks aren’t at all like that!

A reply-chain email attack is a form of cyberattack that involves a phishing email tucked inside an ongoing email conversation (your ‘reply chain’). While typical phishing attacks attempt to parody a sender with a forged address, this more sophisticated attack hijacks a legitimate email correspondence chain and inserts a phishing email into the existing email conversation.

How do email reply chain cyber attacks work?

This technique, also known as ‘reply-chain phishing’ or ‘thread hijack spamming’, begins with hackers (using various methods) gaining access to one or more email accounts within an organisation. Once they’re ‘in’, cybercriminals can begin monitoring conversation threads for opportunities to infiltrate ongoing chains of conversation with ransomware/malware or links to a form to steal more login credentials.

Why are reply chain attacks so dangerous?

This sophisticated form of cyberattack works particularly well because:

  • The attacker can read a conversation trail and more convincingly pose as a member of the email chain, referencing items in the discussion and calling others by name.
  • The reply in the thread comes from a colleague’s email address – likely a co-worker that the email recipients know and trust, and who has previously been participating in the email conversation. 
  • Employees are not expecting malicious activity embedded in the middle of an ongoing discussion; their normal ‘phishing radar’ is not necessarily operative.  

How can you protect against reply chain phishing?

Best practice?

Firstly, ensure there is no re-use of passwords within your business. All accounts should have unique (strong!) passwords and should ideally be backed by multi-factor authentication

Secondly, and perhaps even more importantly, your employees need to be brought up to cyber-secure speed with regular, ongoing awareness training. Your staff should be trained to treat any email – even those within ongoing chains – with caution, particularly if they’re furnished with links or attachments. Your security training can also include the mandated use of other internal communication platforms – such as Slack or Microsoft Teams – to check the legitimacy of any emails that seem suspect.

How strong are your email account protections?

Remember, it can take businesses months or even years to recover from a successful cyberattack. You do not want your business to become a phishing statistic! If you’re not 100% certain that you have enough protection in place on your business email accounts to prevent a breach, please give us a call! Geelong Technology Group can provide email cybersecurity solutions that can keep you – and your sensitive business data – better protected.

Give us a call to find out more on 1300 GET GTG (1300 438 484) or stop by our showroom at 166 Francis St, Belmont.

managed IT services

Starting a new business 101

Let’s for a moment assume you have the business idea (the kind of idea that comes along once in a lifetime). You’ve done your market research and chosen a business model. You’re ready for the going-solo responsibility and you’ve transcended the existential fear. Essentially, you’ve just about got all your ducks in a row to become an SMB owner. But what now? What tasks need to be ticked off to ensure not only that your business is a success, but also that it will be ready to run smoothly from the get-go?

 

Note: It’s important to clarify that there is no one-size-fits-all model for starting a new business, but the following steps will help to organise your ideas and iron out important details.

1. Write your business plan

There are 1000s of books and websites that will help you construct a business plan, but know that this is not a step you want to miss. A strong business plan sets out what you want to achieve and how you’re going to achieve it. Your business plan should address the problem(s) your business solves, your target audience(s), SWOT analysis and a financial plan. In writing your business plan, you should also choose your business structure – whether you’re planning on being a sole trader, a company, a partnership etc.

2. Choose a business name and register your business

Your business name is important! If you choose well, your business name will quickly identify who you are, what you do, and the image that you’re communicating, as well as help your customers find you online. The very best names are descriptive, different, short and snappy – not necessarily an easy recipe – but worth taking the time over.

 

Once you’ve chosen your name, you’ll need to register it (unless your business name is the same as your own name). You’ll also need to apply for an ABN. Depending on the nature of your business, you may also need to attend to tax registration, look into any licences or permits (such as a restaurant or café licence, for instance, or a licence to discharge trade waste) and possibly protect your business name with a trade mark.

3. Prepare your business finances

This will include setting up a business bank account, applying for financing or grants, and securing investors (if necessary). It will also involve learning how to organise your finances – managing your cash flow, your budget, your payments and invoices. It may help to secure the services of a bookkeeper or to invest in an accounting software package.

4. Purchase your business hardware and software

This is (what we consider!) the fun part. Whether you’re starting small, or hitting the ground huge, you’re going to need some tech. Purchasing the right equipment for your needs now – and with an eye toward future growth – is imperative. From desktops, printers and landline phones for the office, to laptops, tablets and mobiles for out-and-about business, you’ll want your tech investments to work smart for your company.

 

Other IT options to consider when starting a business include how you’ll access the internet, networking capabilities, cloud storage and cybersecurity solutions. Geelong Technology Group can help you with these – we even offer managed IT services!

5. Sort out your business admin

Starting a business is no small feat, and just as it takes a village to raise a child, so too it can take some outsourcing to raise and support a successful SMB. Beyond items that you’ll need to organise – such as business insurance – some business administration items that you can consider sending out-of-house (but still tethered firmly as part of your ‘team’) include managed IT services, accounting, and digital marketing and promotion.

Contact Geelong Technology Group for all your new business IT needs

As Geelong’s best business IT support company, we’re here to help seed and grow your business! We can advise you on the best tech to suit your requirements. We can build the best IT network solution for your situation. And we can provide ongoing support in the form of managed IT services and cybersecurity monitoring. 

 

Servicing Geelong, the Bellarine Peninsula, the Surf Coast and surrounding regions, GTG are your business IT specialists: contact our experienced team on 1300 GET GTG (1300 438 484) or email support@geelongtechnology.com.au and let’s get working together!

laptop battery

How to increase laptop battery life: five battery-saving tips

You’re at the café. You’ve got your coffee. And your muffin. You’re ready to work! But then you open your laptop and… your battery is almost dead. This time you might need to be that person, with your cord snaking between chair legs. But follow these high-yield, low-effort hacks and you’ll not only have tip-top power for your next café visit, but you’ll also be extending the overall life of your laptop battery. 

Avoid 0%

If possible, avoid draining your battery below a 20% charge. As long as your laptop is running on a lithium-ion battery (which most modern laptops do), it’s best practice to charge before your battery is completely drained. This hack will extend the life of your battery, as usage with a low charge puts a strain on the battery itself, and eventually reduces its charging capacity.

Takeaway: plug your laptop in while there is still some juice left.

Use power saver mode

When your laptop is unplugged, switching to battery saver mode will reduce the display brightness, prevent some background downloads/syncing and suspend most background apps. Unless you’re completing tasks that require a lot of battery power (editing videos, for example), you shouldn’t notice too much difference in overall performance. You can also tweak your settings manually to meet your needs – search for ‘Power Options’ on Windows machines and ‘Energy Saver’ if you are using macOS.

Takeaway: know your energy-saving options and use them when appropriate.

Streamline your workflow

Think of your laptop like a house, leaving six or seven apps open when you’re not using them is like leaving that many lights on in empty rooms. Try to minimise your open applications to just one or two – and check in Task Manager that you don’t have apps running unnecessarily in the background. If you don’t need the connectivity, disabling wi-fi and/or Bluetooth will reduce your power usage even more.

Takeaway: close unused apps and use Airplane mode if possible.

Ensure airflow and avoid overheating

Despite the name, laptops are designed to be used on a hard surface – this ensures airflow for the vents that pull in cool air and expel warm air, keeping your machine at an even temperature. Heat is the enemy of your device – affecting not only short-term life, but also longer-term battery health. Avoid placing your laptop in locations prone to heating up; don’t leave it in the car, for instance, or in direct sunlight.

Takeaway: Aim for cool environs and keep your laptop off your lap!

Stay up to date

Updating your operating system has all sorts of benefits – not the least is that patches and upgrades can help programs run more efficiently, conserving battery power. It’s best to schedule these processes only when you’re plugged in, though, as software updates can quickly suck battery life.

Takeaway: Don’t ignore software update notifications; do update software when plugged in.

Contact Geelong’s laptop repair and sales specialists

The strategies outlined will help you make the most of the battery you have. However, if you’re concerned about the health of your laptop battery, or you’re in the market for a new laptop, the team at Geelong Technology Group are here to help. We are experienced in laptop evaluations and repairs for both Windows and Apple machines, and we’re committed to providing the best customer service when it comes to sales.

 

Give us a call or drop by our specialised service center and showroom to chat in person:

 

📞 1300 GET GTG (1300 438 484)

📧 support@geelongtechnology.com.au

📍 166 Francis St, Belmont

cybersecurity awareness training

Cybersecurity awareness training: how often is often enough?

You’ve finally put together a gun team. Everyone is firing on all cylinders, despite the stress and upheavals of the past few years. The very last thing you need is one of your employees falling for a phishing attack that results in a costly ransomware infection. But how often should you be implementing cybersecurity awareness and phishing training? Is there a golden training window that will keep your staff alert but not alarmed?

Phishing training every four months

Research has shown that the cybersecurity training sweet spot is once every four months. Any sooner and you’ll be rehashing information that your staff already know – a loss of efficiency. Too much later and the ability to detect phishing emails, mastered through initial training, begins to wane – a possible loss of much more.

Why ongoing cybersecurity training is important

Looking at cybersecurity training as a set-and-forget option is no option at all. As we noted in our recent blog about the possible cybersecurity mistakes businesses can make, developing a sustainable company culture of good cybersecurity is one of the strongest ways to protect your business assets and data. A good employee training program that focuses on everyday ‘cyber hygiene’ will instil confidence in your staff that they know what to look for and what your company’s cybersecurity protocols and procedures require. Well-trained employees significantly reduce a company’s risk – and routine training reinforcement will reduce that risk even more. Regular training is also good for staff morale and mental health: more knowledge = individual empowerment = a lower likelihood of making mistakes = less stress.

Effective cybersecurity training

Successful cybersecurity training will target your employee’s habits and behaviours, creating a sense of accountability and ensuring they make the right decision when it comes to protecting sensitive corporate information and assets. No longer just your employees, cyber-aware staff members become your company’s first line of defence against cyberattacks. Effective training should include:

 

  • The various types of cybersecurity threats, particularly those that utilise social engineering as a means of bypassing tech-based defences
  • The significance of password security
  • Your company’s internet, email and social media policies
  • Your company’s policies on the protection of business data
  • Methods to not only identify threats but also to report them (the last thing you want is possible cybersecurity threats swept under the metaphorical rug)

Contact the Geelong cybersecurity specialists

Cybercriminals are getting smarter and sneakier every day – we may no longer fall for an email from a dispossessed African prince, but we may fail to look twice at a slightly odd request from the company CFO. Even the strongest security safeguards will fail if users are not cyber-aware, so now is the time to embed cyber-resilience throughout your organisation. 

 

Servicing Geelong, the Bellarine Peninsula, the Surf Coast and surrounding regions, Geelong Technology Group helps small and medium businesses succeed by supporting and managing their IT needs. Armed with the latest cybersecurity information, we can not only assist your business with security awareness, but we can also implement comprehensive cybersecurity solutions, ensuring your important business data is cyber secure.

Give us a call today to find out more on 1300 GET GTG (1300 438 484) or stop by our showroom at 166 Francis St, Belmont.

two monitors

Three productivity benefits of two computer monitors

Three productivity benefits of two computer monitors

Is your business after a low-cost, high-reward tech-infrastructure improvement? Then may we suggest adding a second monitor to your employee workstations! Research has shown that this simple and relatively inexpensive ‘hack’ can increase user productivity by over 40%. As well as in-office solutions, we also recommend this productivity-boosting addition for the vast now-working-from-home workforce. 

But what is it that makes two monitors better than one?

A dual-monitor setup saves time on side-by-side tasks

Referencing data from a website while editing a spreadsheet or document? Working on a remote desktop and still need your email open? Sourcing images from multiple libraries to add to a presentation? Tasks such as these, that require various documents, programs and/or workspaces, are simplified with two (or more) screens. Rather than switching between windows on one screen, having multiple screens allows for a number of full-size applications to be open at once, allowing for a natural flow of concentration.

If you need numbers to back up the narrative, a global survey of 17,000 knowledge workers found that 68% of respondents spent at least 30 minutes a day switching between applications – multiply that by your workforce and you’ve got some serious time to make up!

Multiple monitors increase workspace

Laying your paperwork out on a large desk is much easier than trying to marshal it next to the cereal bowls on the coffee table. So too with screen space – the more you have, the easier it is to get organised and to feel in control. Users can also deliberately divide tasks between the two screens for further efficiency gains – using one screen for research and the other for data entry, for instance. Finally, more workspace means that finding information is easier and faster, with more content open and displayed simultaneously.

A second monitor improves online meetings

Zoom meetings have become de rigueur for many companies. And if you’re in a meeting on one screen, but also need to access your notes, there are few things handier than a second screen! And if you’re sharing your screen for the meeting, having an additional display allows you to keep ‘personal’ items open, such as emails or sensitive statistics, without that information also being shared.

Ready to level up? Contact Geelong’s tech hardware specialists

Serving Geelong, Ocean Grove, the Bellarine, the Surf Coast and beyond, Geelong Technology Group is here to help with all of your technology needs. We stock products from Apple, Acer, Asus, HP and more, so if you’re now in the market for a second screen for yourself or for every employee across your business, we can get you working twice as smart in no time at all. Give us a call, send through an email or stop by the showroom today!

 

📞 1300 GET GTG (1300 438 484)

📧 support@geelongtechnology.com.au

📍 166 Francis St, Belmont

cybersecurity mistake

Five cybersecurity mistakes that leave your business data at risk

It’s hard to imagine what one million dollars looks like – let alone six trillion… But six trillion dollars is the estimated cost to businesses each year worldwide due to cybercrime. If you’d prefer your business didn’t become a part of this staggering statistic, read on…

Mistake 1: Assuming you’re not a target

Whether small or large, businesses in virtually every industry are vulnerable to cyber-attacks and data breaches. Just because you’re a little fish in a big pond doesn’t mean you can’t get hooked. Indeed, smaller organisations are more likely to have gaps in their security protocols. And that’s what cybercriminals are looking for – easy access points to valuable data. As Sophos noted in their 2021 Threat Report: ‘A lack of attention to one or more aspects of basic security hygiene has been found to be at the root cause of many of the most damaging attacks we’ve investigated.’ Again: don’t become a statistic – make security a top priority. 

Mistake 2: Not providing sufficient training

Ah, humans…we’re prone to making mistakes. In fact, more than 90% of cybersecurity breaches are caused by human error. Training is required to develop a company culture of good cybersecurity, and that training should be implemented throughout the year, not just as a one-off event that’s quickly forgotten. A data breach can happen due to a huge range of user actions; from using weak passwords to downloading infected email attachments. The more you provide your staff members with key IT security know-how, the less likely it is that ‘simple’ breaches like these will happen.

Mistake 3: Not employing multi-factor authorisation (MFA) 

Strong passwords are great, but if your password is phished or smished or detected through a ‘password spraying’ attack, your account or business is immediately vulnerable. According to recent research, 99.9% of automated malware attacks against Windows systems can be prevented through MFA implementation. The good news is that multi-factor authentication solutions are relatively inexpensive and often easy to deploy, providing quick and effective protection to individual users and your wider company network.

Mistake 4: Failing to update software

So, you’ve done your research, you’ve paid your money and you’ve equipped your business with a ‘fool-proof’ firewall and some high-end security software. And then you’ve…assumed you’re covered forever. Updates may seem tedious, but they can do a lot towards keeping your devices, software and data secure. As well as removing or fixing bugs and patching holes or security flaws, updates do what they say on the box – they update your software to add new features, replace outdated technology and help keep hackers out.

Mistake 5: Failing to back up regularly

We’ve said it before, and we’ll say it again: catastrophes do happen. Even with understanding, education and an oft-updated web of security solutions, there are still instances of cybercriminal breaches and data loss. Backing up your data regularly (preferably daily!) provides peace of mind; and the ability to quickly fix, restore and restart your business should the worst occur.  

Take cybersecurity seriously – give Geelong’s IT security experts a call

SMBs beware – the leading threats to the cybersecurity of your business are the mistakes you’re liable to make. When did you last review the strength of your defences? Provide training to your staff? Back up your data? If ‘some time ago’ is the answer to any of these questions, now is the time to patch those defence holes! Our team at Geelong Technology Group can walk you through your options and tailor a multifaceted solution that uniquely meets your security needs. Don’t delay – contact our experienced IT professionals today.

 

📞 1300 GET GTG (1300 438 484)

📧 support@geelongtechnology.com.au

📍 166 Francis St, Belmont. 

cybersecurity

Current phishing trends that may impact YOUR cybersecurity

When it comes to phishing in 2022, cybercriminals continue to target people more than tech infrastructure. That is, ‘pirates’, using social engineering, are probing for weaknesses in our defences, rather than in our cybersecurity defences. After all, it’s easier to get someone to open the 6ft gate than to find a way to climb over it or punch through it. Which brings us to our first major 2022 phishing trend:

Help Ukraine, Help the people, Help the children.

As insidious as this is, phishing and cryptocurrency scams are using the Russian invasion of Ukraine to their advantage. Indeed, as 2020 was to Covid phishing scams, 2022 is to the Ukrainian conflict, with new cyber threats popping up daily that pull on heartstrings to collect donations, data and/or cryptocurrency from victims. Look out for email subject lines such as ‘Support Ukrainian Children’ or ‘Ukraine donations desperately needed.’ (And only ever donate to organisations that you have confirmed are 100% legitimate.)

Brand and business impersonation

This form of phishing is increasing not only in scale but also in sophistication. As users become savvier, phishing attackers are using brands or businesses that we know and commonly interact with to create a facade of legitimacy. Users are asked to click on links and provide personal information; including passwords – via emails titled ‘Data breach’, ‘Potential account termination’ or ‘Password reset required’. And these emails are (allegedly) coming from the likes of Microsoft, LinkedIn and Amazon. Always be suspicious of emails that link you to a site requesting for your log-in and other details. Never provide your credentials via such a link. 

Tax season scams

Tax season: time to buy some last-minute office equipment (or some top-tier business tech!), worry about the shoebox of receipts and fend off tax-season scams. The main thing to remember when it comes to tax time is that the ATO will never ask for personal information by email or text. (And they’ll never call you with a doom-laden message threatening arrest or jail time, either.) Any such message – requesting your tax file number or credit card details – can be disregarded as cyber fraud.

And remember: clicking such a link can also lead to disaster; potentially allowing scammers access to your computer system and then holding you or your business to ransom. If in any doubt: DELETE.

The ATO also has a regularly updated list of scams if you need to verify or report a problem.

Contact Geelong’s cybersecurity experts to reduce your risk of being scammed

At Geelong Technology Group, we’re kind of enthralled by scammers. (They’re always doing something new! Smishing attempts keep proliferating! They’re getting tricksier!) And we keep up with the latest cybersecurity threats. But what we really love is helping homes and businesses in Geelong, Ocean Grove, Barwon Heads, Torquay, the Bellarine Peninsula, the Surf Coast, Golden Plains, Colac and Warrnambool with their online security. We’re here to help with our anti-piracy solutions and cyber-attack prevention services, so don’t hesitate to contact us today on 1300 GET GTG (1300 438 484). Or drop by to chat with the team at 166 Francis Street, Belmont.

work computer

What NOT to do on a work computer

Work computer. The name says it all really. This is your computer for work. And yet with more of us working from home and the work-life divide getting ever blurrier, sometimes it’s easy to slip! There are, however, numerous reasons to keep your personal and professional lives separate. One is to avoid cybersecurity breaches – the last thing you want is to inadvertently introduce a virus or malware to your organisation. Another is for your own privacy: employers can install software to monitor what you do on your work-issued device, so act accordingly!

Five things you should never do on your work computer

You know the simple things – don’t search for a new job, click on dodgy websites or download the entire Lars von Trier back catalogue. But what else should you avoid?

1. Don’t save personal passwords

Storing passwords and personal information in a keychain is easy – and tempting for that reason – but this is a definite no-no. Imagine your computer is an open book that can be taken and read by your employer at any time. Or by the tech team tasked with upgrading it. Or by the new hire who is using it temporarily while you’re home sick. Saving your personal passwords is risking the security of your personal data.

2. Don’t store personal documents

Just as saving passwords is not recommended, neither is storing personal documents. Don’t assume that your company’s Google docs and desktop folders are private. It’s important to remember that a work device is not your property – it belongs to the company and can be taken back at any time, along with anything you’ve stored on it.

3. Don’t access free public wi-fi

Public wi-fi networks cause several security risks, including hackers accessing your device or the risk of malware infections. In order to protect both your own and your company’s data, ensure you’re only ever connected to a secure, password-protected internet connection (and never leave your laptop physically unattended). 

If you must use public wi-fi, use a good, preferably employer-provided, VPN.

4. Don’t turn off company-installed applications

Company-installed apps such as anti-virus software and backup utilities have been added to your computer for a reason – generally for cybersecurity, data security and business continuity. If you turn off these applications without prior authorisation you’re putting your workplace at risk – not only of losing information should your device suffer a mishap but of possibly calamitous damage from a targeted cyber attack. 

5. Don’t ‘talk smack’ over slack

Or Campfire. Or Google Hangout. Messaging software is fantastic for team collaboration, but remember that admins have access to private messages, and messages are likely stored indefinitely. Be very intentional about what you say over chat room platforms – if you wouldn’t say it to your boss or your colleagues face-to-face, definitely don’t put it in writing!

Some extra work laptop no-nos

  • Don’t work on your side gig Using company equipment to work on your second (or third) job is unprofessional (and possibly a disciplinary offence), even if it’s not on ‘company time’. The same goes for looking for a new job or updating your resume!
  • Don’t allow friends or family to use it Even if your work laptop is now a permanent kitchen-table fixture, allowing others to use it could breach organisational data-protection regulations.
  • Don’t play games or spend time on social media Enough said?

Contact Geelong’s computer technology specialists

Getting out of the habit of using a work computer for non-work-related tasks can be difficult – but worth it in the long run. Streamlining the use of your work device will not only ensure your workplace cybersecurity but also improve your everyday productivity.

And if decoupling your personal and professional online tasks leaves you high and dry tech-wise? Give us a call or drop by the showroom! At Geelong Technology Group, we stock a range of different desktops and laptops to suit all needs, including Acer, Asus, HP and more.

📞1300 GET GTG (1300 438 484)

📍 166 Francis St, Belmont