{"id":14950,"date":"2020-10-15T12:21:25","date_gmt":"2020-10-15T10:21:25","guid":{"rendered":"https:\/\/www.itaf.eu\/?p=14950"},"modified":"2023-05-26T12:12:11","modified_gmt":"2023-05-26T10:12:11","slug":"device-security","status":"publish","type":"post","link":"https:\/\/www.itaf.eu\/en\/device-security\/","title":{"rendered":"Device Security"},"content":{"rendered":"<p>Today it is common to see people use multiple devices for both work and personal life. While of course a PC and a laptop are easier to work on for many people, smaller mobile devices like phones and tablets proved to be much better for a lot of tasks such as managing tasks, calendar invites, meetings, communication outside the office. However, studies show that quite a number of people do not take their device security seriously.<\/p>\n<h2>Workspace security<\/h2>\n<p>When it comes to the physical workspace security, one of the risks is not locking workstations so that the screen is visible by anyone with physical access to the PC or to a phone if it is left unlocked on the desk.<\/p>\n<p>Another security risk in the work environment is that many people leave passwords of their accounts, emails, or some other critical and important services written down on a piece of paper that is just laying around on their desk. This is a serious risk that can have a huge impact on a company and practices like these should be avoided.<\/p>\n<h2>Data breaches caused by employees<\/h2>\n<p>There are cases where ex-employees or employees that are not satisfied with the company for one or more reasons, take advantage of other people and use them to gain access to the confidential information that they shouldn\u2019t have access to in order to sell it to another company, makes it public or for some other personal gain.<\/p>\n<h2>Recommended device security practices<\/h2>\n<p>Some of the recommended practices that should be applicable for everyone are:<\/p>\n<ol>\n<li>A company is obliged to provide quality <a class=\"jshlink\" href=\"https:\/\/www.itaf.eu\/en\/online-threats-and-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">security awareness training<\/a> to all employees so everyone can be aware of the most common cyber threats.<\/li>\n<li>A company must have properly defined policies regarding who has access to what and to control rights and permissions to confidential information, especially when someone leaves the company.<\/li>\n<li>If you are using your personal phone for work, make sure you are using a locking screen feature with a strong password or lock combination. Also be careful with opening links on it, because if your device gets infected, not only your personal data (photos and music, etc) will be compromised, but your work data too.<\/li>\n<li>Sometimes even if a device\u2019s lock screen is active, there is still a chance that somebody can just steal it if it is left without anyone to watch on it. For devices like laptops, there is a great thing to prevent that, called laptop security lock.<\/li>\n<\/ol>\n<p>To sum it up, taking care of both your personal and work devices is an important thing to do, especially if the personal devices are used also for work. For securing your devices, use strong passwords, while for securing your workspace, make sure you always lock your screen when leaving it even for a cup of coffee, or you can also use laptop security locks.<\/p>\n<h2>How can ITAF help you?<\/h2>\n<p>If you are in doubt what are good security practices that you should adapt in your work environment, you can always <a class=\"jshlink\" href=\"https:\/\/www.itaf.eu\/en\/contact-us\/\" target=\"_blank\" rel=\"noopener noreferrer\">contact us<\/a>, and our security experts can help you out.<br \/>\nAlso, if you need help with securing your data and devices, we can help you with installing and maintaining some of the most effective protection against any security risks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today it is common to see people use multiple devices for both work and personal life. While of course a PC and a laptop are easier to work on for many people, smaller mobile devices like phones and tablets proved to be much better for a lot of tasks such as managing tasks, calendar invites, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":35057,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ngg_post_thumbnail":0,"footnotes":""},"categories":[96],"tags":[],"class_list":["post-14950","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Device Security - ITAF IT Partner<\/title>\n<meta name=\"description\" content=\"Studies show that quite a number of people do not take their device security seriously. These are the best practices, read on to learn it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.itaf.eu\/en\/device-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Device Security - ITAF IT Partner\" \/>\n<meta property=\"og:description\" content=\"Studies show that quite a number of people do not take their device security seriously. These are the best practices, read on to learn it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.itaf.eu\/en\/device-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ITAF IT Partner\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ITAF.eu\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-15T10:21:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-26T10:12:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.itaf.eu\/wp-content\/uploads\/2020\/10\/Cyber-Security-October-3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dejan Janosevic\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ITAF_IT_partner\" \/>\n<meta name=\"twitter:site\" content=\"@ITAF_IT_partner\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dejan Janosevic\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/device-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/device-security\\\/\"},\"author\":{\"name\":\"Dejan Janosevic\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#\\\/schema\\\/person\\\/76d18fd2e3c2d369c9b20b96217208c2\"},\"headline\":\"Device Security\",\"datePublished\":\"2020-10-15T10:21:25+00:00\",\"dateModified\":\"2023-05-26T10:12:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/device-security\\\/\"},\"wordCount\":546,\"publisher\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/device-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Cyber-Security-October-3.jpg\",\"articleSection\":[\"IT Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/device-security\\\/\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/device-security\\\/\",\"name\":\"Device Security - ITAF IT Partner\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/device-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/device-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Cyber-Security-October-3.jpg\",\"datePublished\":\"2020-10-15T10:21:25+00:00\",\"dateModified\":\"2023-05-26T10:12:11+00:00\",\"description\":\"Studies show that quite a number of people do not take their device security seriously. These are the best practices, read on to learn it.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/device-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.itaf.eu\\\/en\\\/device-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/device-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Cyber-Security-October-3.jpg\",\"contentUrl\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Cyber-Security-October-3.jpg\",\"width\":1080,\"height\":600,\"caption\":\"Device Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/device-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Device Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/\",\"name\":\"ITAF IT Partner\",\"description\":\"Reliable IT support\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#organization\",\"name\":\"ITAF is een IT partner voor KMO's, grote bedrijven en overheid: IT support, ICT infrastructuur, Cloud oplossingen, Managed IT services en software ontwikkeling\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/ITAF-Geniki_logo_512px-1.webp\",\"contentUrl\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/ITAF-Geniki_logo_512px-1.webp\",\"width\":512,\"height\":166,\"caption\":\"ITAF is een IT partner voor KMO's, grote bedrijven en overheid: IT support, ICT infrastructuur, Cloud oplossingen, Managed IT services en software ontwikkeling\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ITAF.eu\",\"https:\\\/\\\/x.com\\\/ITAF_IT_partner\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/itaf-eu?trk=tyah&trkInfo=clickedVerticalcompanyidx2-2-7tarId1429703363595tasitaf\",\"https:\\\/\\\/www.youtube.com\\\/@ITAFICTPartner\\\/\",\"https:\\\/\\\/www.instagram.com\\\/itaf.eu\\\/\",\"https:\\\/\\\/www.threads.net\\\/@itaf.eu\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#\\\/schema\\\/person\\\/76d18fd2e3c2d369c9b20b96217208c2\",\"name\":\"Dejan Janosevic\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/author\\\/dejan-janosevic\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Device Security - ITAF IT Partner","description":"Studies show that quite a number of people do not take their device security seriously. These are the best practices, read on to learn it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.itaf.eu\/en\/device-security\/","og_locale":"en_US","og_type":"article","og_title":"Device Security - ITAF IT Partner","og_description":"Studies show that quite a number of people do not take their device security seriously. These are the best practices, read on to learn it.","og_url":"https:\/\/www.itaf.eu\/en\/device-security\/","og_site_name":"ITAF IT Partner","article_publisher":"https:\/\/www.facebook.com\/ITAF.eu","article_published_time":"2020-10-15T10:21:25+00:00","article_modified_time":"2023-05-26T10:12:11+00:00","og_image":[{"width":1080,"height":600,"url":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2020\/10\/Cyber-Security-October-3.jpg","type":"image\/jpeg"}],"author":"Dejan Janosevic","twitter_card":"summary_large_image","twitter_creator":"@ITAF_IT_partner","twitter_site":"@ITAF_IT_partner","twitter_misc":{"Written by":"Dejan Janosevic","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.itaf.eu\/en\/device-security\/#article","isPartOf":{"@id":"https:\/\/www.itaf.eu\/en\/device-security\/"},"author":{"name":"Dejan Janosevic","@id":"https:\/\/www.itaf.eu\/en\/#\/schema\/person\/76d18fd2e3c2d369c9b20b96217208c2"},"headline":"Device Security","datePublished":"2020-10-15T10:21:25+00:00","dateModified":"2023-05-26T10:12:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.itaf.eu\/en\/device-security\/"},"wordCount":546,"publisher":{"@id":"https:\/\/www.itaf.eu\/en\/#organization"},"image":{"@id":"https:\/\/www.itaf.eu\/en\/device-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2020\/10\/Cyber-Security-October-3.jpg","articleSection":["IT Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.itaf.eu\/en\/device-security\/","url":"https:\/\/www.itaf.eu\/en\/device-security\/","name":"Device Security - ITAF IT Partner","isPartOf":{"@id":"https:\/\/www.itaf.eu\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.itaf.eu\/en\/device-security\/#primaryimage"},"image":{"@id":"https:\/\/www.itaf.eu\/en\/device-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2020\/10\/Cyber-Security-October-3.jpg","datePublished":"2020-10-15T10:21:25+00:00","dateModified":"2023-05-26T10:12:11+00:00","description":"Studies show that quite a number of people do not take their device security seriously. These are the best practices, read on to learn it.","breadcrumb":{"@id":"https:\/\/www.itaf.eu\/en\/device-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.itaf.eu\/en\/device-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.itaf.eu\/en\/device-security\/#primaryimage","url":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2020\/10\/Cyber-Security-October-3.jpg","contentUrl":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2020\/10\/Cyber-Security-October-3.jpg","width":1080,"height":600,"caption":"Device Security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.itaf.eu\/en\/device-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.itaf.eu\/en\/"},{"@type":"ListItem","position":2,"name":"Device Security"}]},{"@type":"WebSite","@id":"https:\/\/www.itaf.eu\/en\/#website","url":"https:\/\/www.itaf.eu\/en\/","name":"ITAF IT Partner","description":"Reliable IT support","publisher":{"@id":"https:\/\/www.itaf.eu\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.itaf.eu\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.itaf.eu\/en\/#organization","name":"ITAF is een IT partner voor KMO's, grote bedrijven en overheid: IT support, ICT infrastructuur, Cloud oplossingen, Managed IT services en software ontwikkeling","url":"https:\/\/www.itaf.eu\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.itaf.eu\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2026\/02\/ITAF-Geniki_logo_512px-1.webp","contentUrl":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2026\/02\/ITAF-Geniki_logo_512px-1.webp","width":512,"height":166,"caption":"ITAF is een IT partner voor KMO's, grote bedrijven en overheid: IT support, ICT infrastructuur, Cloud oplossingen, Managed IT services en software ontwikkeling"},"image":{"@id":"https:\/\/www.itaf.eu\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ITAF.eu","https:\/\/x.com\/ITAF_IT_partner","https:\/\/www.linkedin.com\/company\/itaf-eu?trk=tyah&trkInfo=clickedVerticalcompanyidx2-2-7tarId1429703363595tasitaf","https:\/\/www.youtube.com\/@ITAFICTPartner\/","https:\/\/www.instagram.com\/itaf.eu\/","https:\/\/www.threads.net\/@itaf.eu"]},{"@type":"Person","@id":"https:\/\/www.itaf.eu\/en\/#\/schema\/person\/76d18fd2e3c2d369c9b20b96217208c2","name":"Dejan Janosevic","url":"https:\/\/www.itaf.eu\/en\/author\/dejan-janosevic\/"}]}},"_links":{"self":[{"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/posts\/14950","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/comments?post=14950"}],"version-history":[{"count":2,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/posts\/14950\/revisions"}],"predecessor-version":[{"id":41953,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/posts\/14950\/revisions\/41953"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/media\/35057"}],"wp:attachment":[{"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/media?parent=14950"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/categories?post=14950"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/tags?post=14950"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}