800-843-0170
BackJoin CNCOpen PositionsLife at CNC
BackAbout UsMeet the TeamNews & MediaOur CompaniesProject CNC
BackEducationAdjuster BlogClassesAdjuster ResourcesPolicyholder ResourcesThe New Adjuster PodcastWeather Report
BackSolutionsCase Studies
SolutionsEducationAboutJoin CNCContact
Technology
Tips + Tricks

8 Habits to Stay Cyber-Safe

January 9, 2023

January 9, 2023

As we grow more dependent upon technology, practicing better online security defense is imperative. These eight habits will help you recognize and counter threats to your digital safety and make you less vulnerable to cyber attacks.

Think twice before clicking on links or opening attachments

Even if an email looks like it is from someone you know, take care with attachments.

Verify requests for private information

When asked to provide private information, verify the identity of the requester even if it appears to be somebody you know.

Protect your passwords

Never share your passwords to anyone. Make them long, strong, and unique, and use multi-factor authentication.

- Use a password manager

- Use different passwords for different accounts

- Use different passwords for work and personal

- Do not let apps or websites remember your password

Protect your computer

Keep a close eye on your personal belongings when you're in public places. When you're at work, secure your area and lock your computer before leaving your desk.

Keep your devices, browsers, and applications updated

At home, automate software updates and restart your personal devices once a week to ensure updates are fully installed. Note: ITOps manages updates for CNC provided devices.

Back up critical files

Store backups in a physically separate location from the originals and test them. For critical work files, use storage options provided by CNC's ITOps. For personal devices, save a backup on a separate drive (e.g., cloud or encrypted USB).

Delete sensitive information when it’s no longer needed

CNC employees should follow the approved retention policy that defines the period that records should be retained and when they should be destroyed.

If it’s suspicious, report it

Learn how to recognize suspected scams and other suspicious activities. At work, suspicious email should be reported through the “Report Phishing” button in Outlook. Report other cybersecurity concerns to the Service Desk.

Contact Us

Let us know how we can help you join our roster, sign up for a class, or learn more about CNC.

Fill out this form and we’ll get back to you.