Please ensure Javascript is enabled for purposes of website accessibility skip to main content

Please complete all required fields. Sending

Thank you for your interest in ProValue.  Our team will review your request and contact you with more information.

There was a problem sending your information. Please try again later or contact us by phone.

Disclaimer: Insurance coverage cannot be bound or changed via submission of any online form/application provided on this site or otherwise. No binder, insurance policy, change, addition, and/or deletion to insurance coverage goes into effect unless and until confirmed directly by a licensed agent.

Contact Us
home|News

Security Hints & Tips

How to Keep Your Organization Safe in and Out of the Office

Whether you work from home or work in an office, the security of your organization must be one of your top priorities. While these two locations can feel quite different, you can use the same precautions no matter whether you’re working from the office or at home. Let’s look at some important cybersecurity rules and how they can be used both in the office and when you are working at home.

Only Use Secure Devices

  • Remember that your device is only as secure as the apps that are running on it. Never install an application or plugin without first checking with your IT department.
  • Only use your work devices for work. If you are using your personal computer for work, we recommend that you create a separate user account with a unique username and password.
  • In the office, the network security is managed by your IT department. To help keep your home internet connection secure, use a complex password on your router. Try to use Virtual Private Network (VPN) whenever possible.

Protect Your Physical Workspace

  • In the office, make sure you don’t have passwords written on sticky notes around your desk. If a password is written down, make sure it is in a locked cabinet or better yet, use a password manager like 1Password.
  • At home, find a private and comfortable workspace, where no one can view your screen while you work. You must keep all sensitive information out of sight for any unauthorized persons, including your partners, children, and friends.
  • Always lock your computer when you step away from your desk. If you leave your computer unlocked, anyone can use it to access sensitive data, steal your login credentials, or even install malware.
  • Make sure you don’t leave any Personal Identifiable Information (PII) out for wandering eyes to find. When you are done with any document containing PII, shred it.

Think Before You Click

  • Never click a link or download an attachment from an email that you weren’t expecting. Even if the sender appears to be part of a legitimate organization, the email address could be spoofed.
  • When an email asks you to log in to an account or online service, navigate to that service through your browser.
  • Never click the link in the email. Navigating to the site directly ensures that you’re logging in to the real website and not a look-alike site.
  • When in doubt, call the sender of the email to be sure the request, link, or attachment is legitimate. Do not call the phone number provided within the email as it may be a fake number.
  • Never email the sender asking if the email is legitimate. If the account has been compromised, the bad actor could be replying to emails as the user and telling you the email is legitimate.

This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. View Privacy Policy.

X