Our privacy policy is located here.
This checklist can help you cover your bases while in the office or working from home.
This checklist can help you cover your bases while in the office or working from home.
Choose passwords that are eight characters long and contain a combination of uppercase and lowercase letters, numbers, punctuation marks, and other special characters.
Avoid using basic combinations (i.e., password1, 123password!@#)
Avoid using the same password for multiple sites
Recommend using a password manager to store and manage passwords for multiple accounts and logins
MFA is an authentication method that requires the user to provide two or more verification factors to access an account.
Use MFA when available and prioritize the use of an application (Google Authenticator or Microsoft Authenticator) before SMS (text message)
Mobile Device
Work login
Email is a common gateway for attackers to launch much larger attacks like ransomware, phishing, access passwords, and more.
Company logo, colors, and overall branding – Is the correct logo on the email? Do the brand colors match?
Company contact information, address, phone number, etc. – Review the email and inspect it for company contact information
Spelling, grammar, and punctuation – Companies typically do not have typos in their emails
Avoid using your work email address for personal use, as this could lead to security issues
Check Sender Address
Beware of Urgency or Threats
Links – Before clicking a link, REVIEW IT!
Do not click on unsolicited emails
Cross-check any information that is suspicious by doing a Google lookup
Developers are constantly looking for bugs and vulnerabilities throughout their software. You should update whenever prompted.
Update your operating system whenever prompted
Set automatic updates whenever possible
Always keep your browser up to date
Avoid sites that use HTTP over HTTPS when inputting information such as login details, personal information, and credit card information or when filling out an online form
Do not install untrusted and unverified browser extensions or plug-ins
Secure your Wi-Fi connection with a strong password
Avoid using public Wi-Fi when working outside of the office or your house
If permitted, use a virtual private network (VPN) to add an additional layer of security when working
Use antivirus software to stop and quarantine attackers
Do not use work devices for personal use
Password or passcode protect your devices
Ask who the IT contact is
Ask for the email address where you should forward phishing emails
Pondurance delivers world-class managed detection and response services to industries facing today’s most pressing and dynamic cybersecurity challenges including ransomware, complex compliance requirements and digital transformation accelerated by a distributed workforce.
By combining our advanced platform with our experienced team of analysts we continuously hunt, investigate, validate and contain threats so your own team can focus on what matters most.
Pondurance experts include seasoned security operations analysts, digital forensics and incident response professionals and compliance and security strategists who provide always-on services to customers seeking broader visibility, faster response and containment and more unified risk management for their organizations.