LBTech Talk
IT Tips: Think Before You Click
IT Safety Tips
As technology becomes more integrated into our work and personal lives, the need for vigilance grows. It’s essential for everyone to play an active role in securing our networks. By staying informed, using strong passwords and being cautious with emails or links, we can help protect our systems and data. Follow the IT safety tips below to help keep yourself and all of LBT safe.

Top Five Security Fundamentals
February 2025
1. Strong Passwords Are Vital to Security
It’s important that online accounts, especially those that contain confidential information, are never compromised. One way to ensure they are safe is to protect your account with a strong password that is long, unique, and adheres to LBT’s organizational requirements.
2. Social Engineers Hack People, Not Technology
Social engineering is the use of deception to con people into making costly mistakes. Social engineers create fake – yet, believable – scenarios designed to steal money or information. You can avoid falling for their scams by thinking critically and never making assumptions.
3. Phishing Attacks Remain the Top Threat
Phishing scams attempt to lure people into doing something they shouldn’t, such as opening a malicious link or attachment. These attacks are the top cause of malware (malicious software) infections, data theft, and other harmful consequences. Avoid them by slowing down and thinking before clicking.
4. Physical Security Is as Important as Cybersecurity
IT security efforts tend to focus on digital threats, such as phishing emails and malware. However, physical security deserves just as much attention. This includes locking devices when not in use and properly storing anything confidential.
5. Following Policy Helps Protect Everyone
Policies help maintain the security of everyone associated within LBT. They’re the guidelines that exist to minimize mistakes and mitigate threats targeting systems, data, and people. Following our policies and guidelines to keep safe is one of the easiest actions any individual can take.
Be On the Lookout for Phishing
1. Mysterious Messages
Phishing emails often appear to come from someone you know or trust. But they can also come from unknown senders. Always check the sender’s email address and make sure it matches the trusted source’s email address.
2. Urgent Demands
Phishing messages often direct you to take action immediately, implying that something negative will happen if you don’t. These messages are meant to get you to react before you think. Always stop and think before taking an action: does the request make sense?
3. Sneaky Links
One of the most common signs of phishing is the request to open an unexpected link or attachment. Malicious links or attachments can be used to steal your login information or other data. Never open links or attachments from unknown or suspicious senders. If you need to sign in to a website, go directly to the known, legitimate address.
4. Before taking an action: Stop, look, and think!
Does it seem suspicious, out of place, or just strange? Then report the message and delete it immediately!
General IT Safety Tips
1. Timely reporting is a crucial part of security
If you notice anything suspicious, report it immediately. The longer an incident goes unreported, the more damage it can cause.
2. Social engineers hack people, not devices
Social engineers attempt to manipulate human emotions and convince people to make poor decisions. Remain skeptical, and never assume someone is who they claim to be.
3. Password hygiene is vital to securing accounts
A weak or reused password provides an opportunity for attackers to easily gain unauthorized access. Protect every account with a long, unique password.
4. Working from home comes with great responsibility
If you’re allowed to work from home, it’s your responsibility to make your home network secure. Ensure that your work and personal accounts remain separate.
Need assistance? IT is here to help!
Learn about the Information Technology Team and how to get help by visiting teamlbt.com/it.