• Managed IT Services
    • Fully Managed IT Services & Managed IT Support
    • Co-Managed IT Support
    • Virtual IT Help Desk Support
  • Managed Security
  • Industries
    • Maritime, Transportation, and logistics Managed IT Services
    • Healthcare Managed IT Support – Healthcare Managed IT Services
    • Construction and Manufacturing Managed IT Services
    • Government Contractor Managed IT Services
    • Non-Profit Managed IT Support
    • Small and Medium Size Business Managed IT Services – Managed IT Services for Small Businesses
    • Financial Services Managed IT Support
  • Services & Consulting
    • Office 365 Support
    • Network Security
    • Risk Assessments
    • Office Moves and Network Configuration
    • Disaster Recovery and Business Continuity Planning
    • Internet and Cloud Phone Services (VoIP)
    • Cloud Services Evaluation & Integration
    • Website Services
  • Blogs
    • Weekly IT Security Tip
    • Tech Tips for Business Owners
    • Read The Cyber Security Reports
      • IT Buyers Guide
      • 21 Critical Questions Your IT Consultant Should Be Able to Say ‘Yes’ To
      • Protecting & Preserving Your IT Network Security
      • Top 10 Ways Hackers Get Around Your Firewall & Anti-Virus
      • The Dangers of Cybercrime to Your Company & You
  • About Us
    • Business Principles
    • Leadership Team
    • Testimonials
  • Contact
    • Career Opportunities
  • Support Portal
  • Call Us: (410) 280-3000

(410) 280-3000

Find Us
Support Portal
ICSIICSI
  • Managed IT Services
    • Fully Managed IT Services & Managed IT Support
    • Co-Managed IT Support
    • Virtual IT Help Desk Support
  • Managed Security
  • Industries
    • Maritime, Transportation, and logistics Managed IT Services
    • Healthcare Managed IT Support – Healthcare Managed IT Services
    • Construction and Manufacturing Managed IT Services
    • Government Contractor Managed IT Services
    • Non-Profit Managed IT Support
    • Small and Medium Size Business Managed IT Services – Managed IT Services for Small Businesses
    • Financial Services Managed IT Support
  • Services & Consulting
    • Office 365 Support
    • Network Security
    • Risk Assessments
    • Office Moves and Network Configuration
    • Disaster Recovery and Business Continuity Planning
    • Internet and Cloud Phone Services (VoIP)
    • Cloud Services Evaluation & Integration
    • Website Services
  • Blogs
    • Weekly IT Security Tip
    • Tech Tips for Business Owners
    • Read The Cyber Security Reports
      • IT Buyers Guide
      • 21 Critical Questions Your IT Consultant Should Be Able to Say ‘Yes’ To
      • Protecting & Preserving Your IT Network Security
      • Top 10 Ways Hackers Get Around Your Firewall & Anti-Virus
      • The Dangers of Cybercrime to Your Company & You
  • About Us
    • Business Principles
    • Leadership Team
    • Testimonials
  • Contact
    • Career Opportunities
  • Support Portal
  • Call Us: (410) 280-3000

Basic cybersecurity training…

June 25, 2024 Weekly IT Security Tip

Think Fast: What to Do When You Encounter a Cybersecurity Threat

Think fast: What’s the first thing you do after realizing you just replied to the e-mail from the Nigerian prince wanting to give you a sum of $34 million? Okay, you most likely didn’t reply to that…but the concept still remains. Do you know what to do immediately upon discovering a virus, e-mail threat, or other cybersecurity issue?

Step-by-Step Instructions for Employees:

  1. Disconnect Immediately: Physically disconnect the machine from the network or power off the device to prevent further damage or data loss.
  2. Notify IT Support: Contact your IT department or cybersecurity team immediately. Provide details about the suspicious activity or e-mail.
  3. Report Suspicious E-mails: Forward any suspicious e-mails to your IT team for analysis. Do not click on any links or download attachments.
  4. Monitor for Unusual Activity: Keep an eye out for any unusual behavior on your device or network. Report anything out of the ordinary.
  5. Secure Mobile Devices: If you lose your mobile device, report it immediately. Ensure your device has remote wipe capabilities to protect sensitive information.

Why Training is Crucial:

Training needs to happen NOW – not when the problem is happening. A simple training program can be very effective. It ensures employees know exactly what to do in the event of a cyber-incident, minimizing potential damage and speeding up recovery.

Get Professional Help:

Give us a call at 410-280-3000 (ask for Max), or go online for a Free Network Security and Backup Audit. and we will help you develop your plan.

______________________________________________________________________________

Click here to request a Free IT Assessment and we will work with you to put together an action plan for you to implement Managed Network Services.

Share
1

You also might be interested in

Your copier is spying on you…

Mar 10, 2025

The Hidden Risks of Modern Business Equipment: Securing Your Multifunction[...]

Why the Healthcare Industry Must Have Managed IT Services

Oct 24, 2024

Just as it has done for many sectors, technology has[...]

How to spot a phishing e-mail…

Aug 12, 2024

A phishing e-mail is a bogus e-mail that is carefully[...]

Contact Us

    Schedule your FREE IT Assessment today! Contact Us
    Managed IT Services Baltimore MD

    We Manage your IT.
    You manage your business.

    Home of Annapolis GEEKS

    AnnapolisGEEKS.com

    Contact Us

    • ICSI (Headquarters)
      1612 McGuckian St
      Suite 200
      Annapolis, MD 21401
    • 410-280-3000
    • ICSI (Florida Office)
      4830 West Kennedy Blvd
      Suite 600
      Tampa, FL 33609
    • 813-217-9171
    • Email Us

    Our Partners

    • Ubiquiti Networks
    • Sonicwall
    • veeam
    • Microsoft
    • Dell
    • vmware
    • DUO

    Follow us on Facebook for Tips & News

    © 2025 • ICSI • All Rights Reserved

    • Managed IT Services
    • Industries
    • IT Services & Consulting
    • Read The Cyber Security Reports
    • About Us
    • Contact
    • Privacy Policy
    • Sitemap