{"id":192,"date":"2018-05-08T04:05:09","date_gmt":"2018-05-08T04:05:09","guid":{"rendered":"https:\/\/iicstechnologies.com\/i\/?p=192"},"modified":"2018-10-10T03:53:33","modified_gmt":"2018-10-10T03:53:33","slug":"tips-to-make-your-workforce-a-security-front-line","status":"publish","type":"post","link":"https:\/\/iicstechnologies.com\/i\/tips-to-make-your-workforce-a-security-front-line\/","title":{"rendered":"Tips to make your workforce a security front line"},"content":{"rendered":"<figure style=\"width: 1159px\" class=\"wp-caption alignright download\"><a href=\"#\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i.pinimg.com\/originals\/b7\/1f\/de\/b71fdef91a0d51a85553704d2b278427.jpg\" alt=\"Download E-book\" width=\"1159\" height=\"1500\" \/><\/a><figcaption class=\"wp-caption-text\">Download E-book<\/figcaption><\/figure>\n<p>Cyber security is something that is constantly on our mind here at Unit. This is because, according to Bloomberg, cyber security related issues costs companies around $400 Billion a year on average.<\/p>\n<p>One of the easiest ways to curb these losses in your business is to train your employees to create a more secure email environment. Staff plays a crucial part in the security of your company, and employees who are unaware of the onslaught of cyber threats are a liability to the safety of your company\u2019s data.<\/p>\n<p>It is therefore of utmost importance that they are always up-to-date on the best procedures to keep the company safe.<\/p>\n<p>In an effort to save you and your company from the horrors of a cyber-attack, here is a list of tips that help safeguard your business.<\/p>\n<ul>\n<li>Never open links or attachments from unknown persons.<\/li>\n<li>Don\u2019t respond to emails that request a password change and require you to divulge personal information \u2014 no matter how official the source appears.<\/li>\n<li>Ensure antivirus and anti-spy software is updated on your computer.<\/li>\n<li>Encrypt any emails containing sensitive data before sending.<\/li>\n<li>Don\u2019t use your company email address to send and receive personal emails.<\/li>\n<li>Don\u2019t automatically forward company emails to a third-party email system.<\/li>\n<li>Create strict standards for company-related Mobile Device usage<\/li>\n<\/ul>\n<p>Mobile Devices have become an important tool of the workforce, and with them comes another wave of cyber threats. Making sure your employees have password-protected devices, encrypt emails, and download approved security applications to help keep the mobile data safe is very important.<\/p>\n<p>Unit offers Mobile Device Management that will help with many of these safety features, including the ability to remotely wipe mobile devices. Contact us for all your security or Office 365 needs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber security is something that is constantly on our mind here at Unit. This is because, according to Bloomberg, cyber security related issues costs companies around $400 Billion a year on average. One of the easiest ways to curb these losses in your business is to train your employees to create a more secure email [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":143,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[8],"tags":[18,19],"class_list":["post-192","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-events","tag-benefits","tag-managed-services"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tips to make your workforce a security front line &#187; Integrated Intelligent Computer Systems Technologies (IICS), Uganda<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/iicstechnologies.com\/i\/tips-to-make-your-workforce-a-security-front-line\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tips to make your workforce a security front line &#187; Integrated Intelligent Computer Systems Technologies (IICS), Uganda\" \/>\n<meta property=\"og:description\" content=\"Cyber security is something that is constantly on our mind here at Unit. This is because, according to Bloomberg, cyber security related issues costs companies around $400 Billion a year on average. One of the easiest ways to curb these losses in your business is to train your employees to create a more secure email [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/iicstechnologies.com\/i\/tips-to-make-your-workforce-a-security-front-line\/\" \/>\n<meta property=\"og:site_name\" content=\"Integrated Intelligent Computer Systems Technologies (IICS), Uganda\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iicstechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-08T04:05:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-10-10T03:53:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/iicstechnologies.com\/i\/wp-content\/uploads\/2018\/05\/rawpixel-com-567026-unsplash1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1680\" \/>\n\t<meta property=\"og:image:height\" content=\"1121\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@IICSTechUG\" \/>\n<meta name=\"twitter:site\" content=\"@IICSTechUG\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/tips-to-make-your-workforce-a-security-front-line\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/tips-to-make-your-workforce-a-security-front-line\\\/\"},\"author\":{\"name\":\"Admin\",\"@id\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/#\\\/schema\\\/person\\\/3995c2fad698a20848abd9c84fb43b66\"},\"headline\":\"Tips to make your workforce a security front line\",\"datePublished\":\"2018-05-08T04:05:09+00:00\",\"dateModified\":\"2018-10-10T03:53:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/tips-to-make-your-workforce-a-security-front-line\\\/\"},\"wordCount\":309,\"publisher\":{\"@id\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/tips-to-make-your-workforce-a-security-front-line\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/rawpixel-com-567026-unsplash1.jpg\",\"keywords\":[\"Benefits\",\"Managed Services\"],\"articleSection\":[\"News &amp; Events\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/tips-to-make-your-workforce-a-security-front-line\\\/\",\"url\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/tips-to-make-your-workforce-a-security-front-line\\\/\",\"name\":\"Tips to make your workforce a security front line &#187; Integrated Intelligent Computer Systems Technologies (IICS), Uganda\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/tips-to-make-your-workforce-a-security-front-line\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/tips-to-make-your-workforce-a-security-front-line\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/rawpixel-com-567026-unsplash1.jpg\",\"datePublished\":\"2018-05-08T04:05:09+00:00\",\"dateModified\":\"2018-10-10T03:53:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/tips-to-make-your-workforce-a-security-front-line\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/tips-to-make-your-workforce-a-security-front-line\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/tips-to-make-your-workforce-a-security-front-line\\\/#primaryimage\",\"url\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/rawpixel-com-567026-unsplash1.jpg\",\"contentUrl\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/rawpixel-com-567026-unsplash1.jpg\",\"width\":1680,\"height\":1121},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/tips-to-make-your-workforce-a-security-front-line\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tips to make your workforce a security front line\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/#website\",\"url\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/\",\"name\":\"Integrated Intelligent Computer Systems Technologies (IICS), Uganda\",\"description\":\"Transformational Digital Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/#organization\"},\"alternateName\":\"IICS Technologies Limited\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/#organization\",\"name\":\"Integrated Intelligent Computer Systems Technologies (IICS), Uganda\",\"alternateName\":\"IICS Technologies Limited\",\"url\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/logo-big.webp\",\"contentUrl\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/logo-big.webp\",\"width\":419,\"height\":80,\"caption\":\"Integrated Intelligent Computer Systems Technologies (IICS), Uganda\"},\"image\":{\"@id\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iicstechnologies\",\"https:\\\/\\\/x.com\\\/IICSTechUG\",\"https:\\\/\\\/www.instagram.com\\\/iicstechug\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/#\\\/schema\\\/person\\\/3995c2fad698a20848abd9c84fb43b66\",\"name\":\"Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/50ad78a47be6aa248343b2efbbabd5b4dfdc01aef17c0b701b72988dead2c3a0?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/50ad78a47be6aa248343b2efbbabd5b4dfdc01aef17c0b701b72988dead2c3a0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/50ad78a47be6aa248343b2efbbabd5b4dfdc01aef17c0b701b72988dead2c3a0?s=96&d=mm&r=g\",\"caption\":\"Admin\"},\"sameAs\":[\"https:\\\/\\\/iicstechnologies.com\\\/i\"],\"url\":\"https:\\\/\\\/iicstechnologies.com\\\/i\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tips to make your workforce a security front line &#187; Integrated Intelligent Computer Systems Technologies (IICS), Uganda","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/iicstechnologies.com\/i\/tips-to-make-your-workforce-a-security-front-line\/","og_locale":"en_US","og_type":"article","og_title":"Tips to make your workforce a security front line &#187; Integrated Intelligent Computer Systems Technologies (IICS), Uganda","og_description":"Cyber security is something that is constantly on our mind here at Unit. This is because, according to Bloomberg, cyber security related issues costs companies around $400 Billion a year on average. One of the easiest ways to curb these losses in your business is to train your employees to create a more secure email [&hellip;]","og_url":"https:\/\/iicstechnologies.com\/i\/tips-to-make-your-workforce-a-security-front-line\/","og_site_name":"Integrated Intelligent Computer Systems Technologies (IICS), Uganda","article_publisher":"https:\/\/www.facebook.com\/iicstechnologies","article_published_time":"2018-05-08T04:05:09+00:00","article_modified_time":"2018-10-10T03:53:33+00:00","og_image":[{"width":1680,"height":1121,"url":"https:\/\/iicstechnologies.com\/i\/wp-content\/uploads\/2018\/05\/rawpixel-com-567026-unsplash1.jpg","type":"image\/jpeg"}],"author":"Admin","twitter_card":"summary_large_image","twitter_creator":"@IICSTechUG","twitter_site":"@IICSTechUG","twitter_misc":{"Written by":"Admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/iicstechnologies.com\/i\/tips-to-make-your-workforce-a-security-front-line\/#article","isPartOf":{"@id":"https:\/\/iicstechnologies.com\/i\/tips-to-make-your-workforce-a-security-front-line\/"},"author":{"name":"Admin","@id":"https:\/\/iicstechnologies.com\/i\/#\/schema\/person\/3995c2fad698a20848abd9c84fb43b66"},"headline":"Tips to make your workforce a security front line","datePublished":"2018-05-08T04:05:09+00:00","dateModified":"2018-10-10T03:53:33+00:00","mainEntityOfPage":{"@id":"https:\/\/iicstechnologies.com\/i\/tips-to-make-your-workforce-a-security-front-line\/"},"wordCount":309,"publisher":{"@id":"https:\/\/iicstechnologies.com\/i\/#organization"},"image":{"@id":"https:\/\/iicstechnologies.com\/i\/tips-to-make-your-workforce-a-security-front-line\/#primaryimage"},"thumbnailUrl":"https:\/\/iicstechnologies.com\/i\/wp-content\/uploads\/2018\/05\/rawpixel-com-567026-unsplash1.jpg","keywords":["Benefits","Managed Services"],"articleSection":["News &amp; Events"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/iicstechnologies.com\/i\/tips-to-make-your-workforce-a-security-front-line\/","url":"https:\/\/iicstechnologies.com\/i\/tips-to-make-your-workforce-a-security-front-line\/","name":"Tips to make your workforce a security front line &#187; Integrated Intelligent Computer Systems Technologies (IICS), Uganda","isPartOf":{"@id":"https:\/\/iicstechnologies.com\/i\/#website"},"primaryImageOfPage":{"@id":"https:\/\/iicstechnologies.com\/i\/tips-to-make-your-workforce-a-security-front-line\/#primaryimage"},"image":{"@id":"https:\/\/iicstechnologies.com\/i\/tips-to-make-your-workforce-a-security-front-line\/#primaryimage"},"thumbnailUrl":"https:\/\/iicstechnologies.com\/i\/wp-content\/uploads\/2018\/05\/rawpixel-com-567026-unsplash1.jpg","datePublished":"2018-05-08T04:05:09+00:00","dateModified":"2018-10-10T03:53:33+00:00","breadcrumb":{"@id":"https:\/\/iicstechnologies.com\/i\/tips-to-make-your-workforce-a-security-front-line\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/iicstechnologies.com\/i\/tips-to-make-your-workforce-a-security-front-line\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/iicstechnologies.com\/i\/tips-to-make-your-workforce-a-security-front-line\/#primaryimage","url":"https:\/\/iicstechnologies.com\/i\/wp-content\/uploads\/2018\/05\/rawpixel-com-567026-unsplash1.jpg","contentUrl":"https:\/\/iicstechnologies.com\/i\/wp-content\/uploads\/2018\/05\/rawpixel-com-567026-unsplash1.jpg","width":1680,"height":1121},{"@type":"BreadcrumbList","@id":"https:\/\/iicstechnologies.com\/i\/tips-to-make-your-workforce-a-security-front-line\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/iicstechnologies.com\/i\/"},{"@type":"ListItem","position":2,"name":"Tips to make your workforce a security front line"}]},{"@type":"WebSite","@id":"https:\/\/iicstechnologies.com\/i\/#website","url":"https:\/\/iicstechnologies.com\/i\/","name":"Integrated Intelligent Computer Systems Technologies (IICS), Uganda","description":"Transformational Digital Solutions","publisher":{"@id":"https:\/\/iicstechnologies.com\/i\/#organization"},"alternateName":"IICS Technologies Limited","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/iicstechnologies.com\/i\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/iicstechnologies.com\/i\/#organization","name":"Integrated Intelligent Computer Systems Technologies (IICS), Uganda","alternateName":"IICS Technologies Limited","url":"https:\/\/iicstechnologies.com\/i\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/iicstechnologies.com\/i\/#\/schema\/logo\/image\/","url":"https:\/\/iicstechnologies.com\/i\/wp-content\/uploads\/2023\/12\/logo-big.webp","contentUrl":"https:\/\/iicstechnologies.com\/i\/wp-content\/uploads\/2023\/12\/logo-big.webp","width":419,"height":80,"caption":"Integrated Intelligent Computer Systems Technologies (IICS), Uganda"},"image":{"@id":"https:\/\/iicstechnologies.com\/i\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iicstechnologies","https:\/\/x.com\/IICSTechUG","https:\/\/www.instagram.com\/iicstechug"]},{"@type":"Person","@id":"https:\/\/iicstechnologies.com\/i\/#\/schema\/person\/3995c2fad698a20848abd9c84fb43b66","name":"Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/50ad78a47be6aa248343b2efbbabd5b4dfdc01aef17c0b701b72988dead2c3a0?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/50ad78a47be6aa248343b2efbbabd5b4dfdc01aef17c0b701b72988dead2c3a0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/50ad78a47be6aa248343b2efbbabd5b4dfdc01aef17c0b701b72988dead2c3a0?s=96&d=mm&r=g","caption":"Admin"},"sameAs":["https:\/\/iicstechnologies.com\/i"],"url":"https:\/\/iicstechnologies.com\/i\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/iicstechnologies.com\/i\/wp-json\/wp\/v2\/posts\/192","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iicstechnologies.com\/i\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iicstechnologies.com\/i\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iicstechnologies.com\/i\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/iicstechnologies.com\/i\/wp-json\/wp\/v2\/comments?post=192"}],"version-history":[{"count":0,"href":"https:\/\/iicstechnologies.com\/i\/wp-json\/wp\/v2\/posts\/192\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/iicstechnologies.com\/i\/wp-json\/wp\/v2\/media\/143"}],"wp:attachment":[{"href":"https:\/\/iicstechnologies.com\/i\/wp-json\/wp\/v2\/media?parent=192"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iicstechnologies.com\/i\/wp-json\/wp\/v2\/categories?post=192"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iicstechnologies.com\/i\/wp-json\/wp\/v2\/tags?post=192"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}