General Computer Development US

Message from General Computer Development 

Keep your Organization Safe in and out of the Office


Whether you work from home or work in an office, the security of your organization must be one of your top priorities. While these two locations can feel quite different, you can use the same precautions no matter whether you’re working from the office or at home. Let’s look at some important cybersecurity rules and how they can be used both in the office and when you are working at home.

Only Use Secure Devices

  • Remember that your device is only as secure as the apps that are running on it. Never install an application or plugin without first checking with your IT department.

  • Only use your work devices for work. If you are using your personal computer for work, we recommend that you create a separate user account with a unique username and password.

  • In the office, network security is probably managed by your IT department. To help keep your home internet connection secure, use a complex password on your router. If your organization offers access to a Virtual Private Network (VPN), connect to that as well.

Protect Your Physical Workspace

  • In the office, watch out for piggybacking and tailgating. A piggybacker is someone who claims to be part of your organization and follows you into a secure area without the use of a badge or entry code. A tailgater is someone who waits for you to enter or exit a secure area and then sneaks in while the door is still open. Be suspicious of anyone who you do not recognize and don’t be afraid to ask for identification.

  • At home, find a private and comfortable workspace, where no one can view your screen while you work. You must keep all sensitive information out of sight for any unauthorized persons, including your partners, children, and friends.

  • Always lock your computer when you step away from your desk. If you leave your computer unlocked, anyone can use it to access sensitive data, steal your login credentials, or even install malware.

Think Before You Click

  • Never click a link or download an attachment from an email that you weren’t expecting. Even if the sender appears to be part of a legitimate organization, the email address could be spoofed.

  • When an email asks you to log in to an account or online service, navigate to that service through your browser. Never click the link in the email. Navigating to the site directly ensures that you’re logging in to the real website and not a look-alike site.

  • When in doubt, call the sender of the email to be sure the request, link, or attachment is legitimate. Do not call the phone number provided within the email as it may be a fake number.

GCD has security in mind, all the time!


We are in the process of evaluating and improving our partners and customers Microsoft Secure Score.   

Secure Score is a measurement of an organization's security posture. Higher the score, more peace of mind. 

Recommended reads... 

PowerPoint Live Presentation: To get started with Live presentations...

Teams: Work remotely without feeling remote Click here...

SharePoint: Going away? Click here...

Skype:  retired? 

Click here...

Guest Network Security? Is your WiFi secure?  Click here.. 

Don't forget to follow us on social media to get the latest updates happening at GCD!

GCDus - 2023 © Copyright

 "5 Microsoft 365 Tools You Didn't Know About" Article content by Jack Moylan