• Managed IT Services
    • Fully Managed IT Services & Managed IT Support
    • Co-Managed IT Support
    • Virtual IT Help Desk Support
  • Managed Security
  • Industries
    • Maritime, Transportation, and logistics Managed IT Services
    • Healthcare Managed IT Support – Healthcare Managed IT Services
    • Construction and Manufacturing Managed IT Services
    • Government Contractor Managed IT Services
    • Non-Profit Managed IT Support
    • Small and Medium Size Business Managed IT Services – Managed IT Services for Small Businesses
    • Financial Services Managed IT Support
  • Services & Consulting
    • Office 365 Support
    • Network Security
    • Risk Assessments
    • Office Moves and Network Configuration
    • Disaster Recovery and Business Continuity Planning
    • Internet and Cloud Phone Services (VoIP)
    • Cloud Services Evaluation & Integration
    • Website Services
  • Blogs
    • Weekly IT Security Tip
    • Tech Tips for Business Owners
    • Read The Cyber Security Reports
      • IT Buyers Guide
      • 21 Critical Questions Your IT Consultant Should Be Able to Say ‘Yes’ To
      • Protecting & Preserving Your IT Network Security
      • Top 10 Ways Hackers Get Around Your Firewall & Anti-Virus
      • The Dangers of Cybercrime to Your Company & You
  • About Us
    • Business Principles
    • Leadership Team
    • Testimonials
  • Contact
    • Career Opportunities
  • Support Portal
  • Call Us: (410) 280-3000

(410) 280-3000

Find Us
Support Portal
ICSIICSI
  • Managed IT Services
    • Fully Managed IT Services & Managed IT Support
    • Co-Managed IT Support
    • Virtual IT Help Desk Support
  • Managed Security
  • Industries
    • Maritime, Transportation, and logistics Managed IT Services
    • Healthcare Managed IT Support – Healthcare Managed IT Services
    • Construction and Manufacturing Managed IT Services
    • Government Contractor Managed IT Services
    • Non-Profit Managed IT Support
    • Small and Medium Size Business Managed IT Services – Managed IT Services for Small Businesses
    • Financial Services Managed IT Support
  • Services & Consulting
    • Office 365 Support
    • Network Security
    • Risk Assessments
    • Office Moves and Network Configuration
    • Disaster Recovery and Business Continuity Planning
    • Internet and Cloud Phone Services (VoIP)
    • Cloud Services Evaluation & Integration
    • Website Services
  • Blogs
    • Weekly IT Security Tip
    • Tech Tips for Business Owners
    • Read The Cyber Security Reports
      • IT Buyers Guide
      • 21 Critical Questions Your IT Consultant Should Be Able to Say ‘Yes’ To
      • Protecting & Preserving Your IT Network Security
      • Top 10 Ways Hackers Get Around Your Firewall & Anti-Virus
      • The Dangers of Cybercrime to Your Company & You
  • About Us
    • Business Principles
    • Leadership Team
    • Testimonials
  • Contact
    • Career Opportunities
  • Support Portal
  • Call Us: (410) 280-3000

Basic cybersecurity training…

June 25, 2024 Weekly IT Security Tip

Think Fast: What to Do When You Encounter a Cybersecurity Threat

Think fast: What’s the first thing you do after realizing you just replied to the e-mail from the Nigerian prince wanting to give you a sum of $34 million? Okay, you most likely didn’t reply to that…but the concept still remains. Do you know what to do immediately upon discovering a virus, e-mail threat, or other cybersecurity issue?

Step-by-Step Instructions for Employees:

  1. Disconnect Immediately: Physically disconnect the machine from the network or power off the device to prevent further damage or data loss.
  2. Notify IT Support: Contact your IT department or cybersecurity team immediately. Provide details about the suspicious activity or e-mail.
  3. Report Suspicious E-mails: Forward any suspicious e-mails to your IT team for analysis. Do not click on any links or download attachments.
  4. Monitor for Unusual Activity: Keep an eye out for any unusual behavior on your device or network. Report anything out of the ordinary.
  5. Secure Mobile Devices: If you lose your mobile device, report it immediately. Ensure your device has remote wipe capabilities to protect sensitive information.

Why Training is Crucial:

Training needs to happen NOW – not when the problem is happening. A simple training program can be very effective. It ensures employees know exactly what to do in the event of a cyber-incident, minimizing potential damage and speeding up recovery.

Get Professional Help:

Give us a call at 410-280-3000 (ask for Max), or go online for a Free Network Security and Backup Audit. and we will help you develop your plan.

______________________________________________________________________________

Click here to request a Free IT Assessment and we will work with you to put together an action plan for you to implement Managed Network Services.

Share
1

You also might be interested in

Why ICSI Is the Go-To IT Company in Maryland for Cutting-Edge IT Services and Cybersecurity

Aug 13, 2025

In today’s fast-paced digital landscape, businesses across Maryland are seeking[...]

How can Managed IT Services Enhance Construction Projects?

Apr 25, 2025

  In the construction industry, technology plays a crucial role[...]

Network Backup Solutions – All Systems Go?

Dec 30, 2023

  The subject of network backup solutions has always been[...]

Contact Us

    This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

    Schedule your FREE IT Assessment today! Contact Us
    Managed IT Services Baltimore MD

    We Manage your IT.
    You manage your business.

    Home of Annapolis GEEKS

    AnnapolisGEEKS.com

    Contact Us

    • ICSI (Headquarters)
      1612 McGuckian St
      Suite 200
      Annapolis, MD 21401
    • 410-280-3000
    • ICSI (Florida Office)
      4830 West Kennedy Blvd
      Suite 600
      Tampa, FL 33609
    • 813-217-9171
    • Email Us

    Our Partners

    • Ubiquiti Networks
    • Sonicwall
    • veeam
    • Microsoft
    • Dell
    • vmware
    • DUO

    Follow us on Facebook for Tips & News

    © 2025 • ICSI • All Rights Reserved

    • Managed IT Services
    • Industries
    • IT Services & Consulting
    • Read The Cyber Security Reports
    • About Us
    • Contact
    • Privacy Policy
    • Sitemap