Keeping your devices and accounts secure is your responsibility. The good news is that you don't need to be a tech expert to get it done. The items below represent industry best practices that go a long way in protecting your data and the clients you serve. You're welcome to implement these on your own or work with a trusted PC technician or managed IT service provider to get them set up properly.
These are recommendations, not steps Gardiant provides support for. If you're unsure where to start, we encourage you to reach out to a local IT professional or managed service provider who can help you implement these in a way that's right for your setup.
1. Drive Encryption
Encrypting your hard drive ensures that if your device is ever lost or stolen, the data on it cannot be accessed by unauthorized individuals. Windows computers have a built-in tool called BitLocker, and Mac computers use FileVault.
Important: If you enable BitLocker, you will be given a recovery key. It is your responsibility to store that key somewhere safe β such as a printed copy in a secure location or saved to a personal Microsoft account. If that key is lost and you're ever locked out of your device, the data cannot be recovered. If you're not comfortable managing this on your own, a PC service provider can help you set it up and store the key appropriately.
2. Multi-Factor Authentication (MFA)
MFA requires a second form of verification β typically a code sent to your phone or generated by an authenticator app β when logging into an account. This means that even if your password is compromised, your account remains protected.
MFA should be enabled on any platform that supports it, including your email, Gardiant (Two-Factor Authentication Enrollment), and any other tools that house sensitive information. Most platforms have built-in options to enable this under account security settings.
3. VPN (Virtual Private Network)
A VPN encrypts your internet connection, which is especially important when working outside of your home or office network. Public Wi-Fi at coffee shops, hotels, and airports can expose your traffic to others on the same network.
Using a reputable VPN service when working remotely is a simple habit that significantly reduces your exposure. There are many trusted VPN providers available (NordVPN, ExpressVPN, ProtonVPN, and Cisco AnyConnect), and a PC service provider can help you identify and configure the right one for your needs.
4. Software and Operating System Updates
Outdated software is one of the most common entry points for security threats. Developers regularly release updates that patch known vulnerabilities β leaving those updates uninstalled means your device may be exposed to risks that have already been identified and fixed.
Enable automatic updates where possible for your operating system, browser, and applications. When prompted to restart for an update, it's best not to delay.
5. Strong Passwords and a Password Manager
Reusing passwords across multiple accounts is a significant risk. If one account is compromised, any other account sharing that password becomes vulnerable as well.
A password manager allows you to use strong, unique passwords for every account without having to memorize them. Well-regarded options include Bitwarden, 1Password, and others. Your browser also has a built-in password manager, though a dedicated tool generally offers stronger security.