Back to Blog

Computer Security Day 2025: Simple Habits That Build Strong Protection

Computer Security Day 2025: Simple Habits That Build Strong Protection

Why Is This Day Significant?

At SPAN Technology Services, we recognize that security is more than a technical requirement. It’s a shared responsibility and a core part of our culture. As we observe 30th November, Computer Security Day, we take this opportunity to strengthen awareness around everyday security practices that protect our people, our clients, and our digital ecosystem.

Computer Security Day serves as a reminder for all of us to stay vigilant, follow secure practices, and ensure that security is integrated into everything we do.

This month, SPAN highlights key areas where employees can significantly strengthen security through simple, consistent actions. Together, we can maintain a safer, more resilient workplace for everyone.

🔒 1. Not Locking the Computer (Clean Desk Policy)

Locking your computer when stepping away is one of the simplest yet most impactful security practices. An unlocked system can expose emails, internal dashboards, source code, documents, and tools to anyone passing by.

🟢 Do’s

  • Lock your device every time you leave your desk.
  • Enable auto-lock timers (5–10 minutes idle).
  • Turn off or close sensitive screens when not needed.

🔴 Don’ts

  • Don’t leave your device unlocked “just for a minute.”
  • Don’t allow others to use your unlocked workstation.

🔑 2. Password Security

Sharing passwords in open communities (Teams groups, WhatsApp, Slack, SMS, and email) exposes credentials far beyond the intended audience. Even sharing credentials informally between employees, whether for quick access, convenience, or temporary use, creates traceability issues, weakens accountability, and increases the risk of unauthorized actions. So, Modern password and identity management tools like Passbolt and JumpCloud are designed to replace these unsafe practices.

🟢 Do’s

  • Use password vaults or encrypted tools for sharing credentials.
  • Maintain unique passwords for all accounts.
  • Change shared or exposed passwords immediately.

🔴 Don’ts

  • Don’t share credentials on messaging apps or email threads.

Don’t store passwords in unprotected documents or notepads.

🆔 3.  Proper Use of Organizational / Official IDs

Sharing your Organizational IDs with Public Portals or allowing someone else to use it undermines system reliability. It leads to phishing and compromises data integrity. 

🟢 Do’s

  • Use your ID exclusively for your access.
  • Inform IT/security if you detect suspicious login attempts.

🔴 Don’ts

  • Don’t use your IDs in Non-Organizational Portals
  • Don’t share your user credentials with colleagues.
  • Don’t log in on someone else’s behalf.

🔄 4. Regular Patch Update

Many security tools, such as FortiClient, antivirus agents, and patch management systems, rely heavily on system restarts to apply updates. When a computer runs continuously without rebooting, security patches remain pending, configuration updates fail to apply.

🟢 Do’s

  • Restart your device daily or as recommended.
  • Install system updates before shutting down.
  • Ensure VPN/security clients are updated frequently.

🔴 Don’ts

  • Don’t keep systems running for weeks without rebooting.
  • Don’t ignore update prompts or restart notifications.

📁 5. Secure File Handling – Preventing Unauthorized Sharing & Data Exposure

In modern workplaces, employees frequently exchange documents through collaboration platforms such as Teams, Slack, email, cloud drives, and project tools. They allow users to download attachments, take screenshots, copy content, or store files locally, which increases the risk of unintended data exposure. 

🟢 Do’s

  • Use only approved cloud storage platforms for saving and sharing documents.
  • Apply proper file classification (Public, Internal, Confidential, Restricted) before sharing.
  • Store sensitive documents in encrypted locations or folders.
  • Review and verify recipient lists before sharing any file.

🔴 Don’ts

  • Don’t download sensitive documents to personal devices or unapproved storage.
  • Don’t take screenshots of confidential data from Teams, Slack, or internal dashboards.
  • Don’t forward internal files to personal email, WhatsApp, Telegram, or external apps.
  • Don’t share confidential documents over open channels or public groups.

Conclusion:

SPAN Technology Services encourages everyone to stay proactive, aware, and committed to secure practices. Small, consistent habits make a powerful impact in protecting our systems, data, and people. By following these guidelines, each of us contributes to a stronger security culture. Together, we ensure a safer and more resilient digital workplace for all.

 

 

map