• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

Are Your Users Following These IT Security Best Practices?

Stop. Think. Connect. Those three words are the basis of a global campaign designed to raise cyber security awareness. If end users follow along, it can go a long way towards making IT’s job of providing a safer, more secure technological environment that much easier.

The campaign began in Oct. 2010 and it’s the brainchild of a partnership of various private companies, non-profits and governmental organizations. This list includes the National Cyber Security Alliance (NCSA) and the Anti-Phishing Working Group (APWG), which have worked together to help spearhead efforts since the campaign’s inception.

The campaign urges users to:

Stop: Before users access the Internet, there’s a certain baseline of knowledge they need to have. To start, they must understand their actions online will have consequences and accept that. Plus, they must also be tech-savvy enough so they can spot and avoid potential problems.

Think: Users should consider every move they make online before they make it and exactly how each could potentially impact their safety, the company’s safety, etc. It’s not just enough to know there will be consequences, they must know what those consequences could be and how far they could reach.

Connect: Security is an on-going process so these steps must become a habit. However, once users have taken the necessary precautions, they should feel confident in their ability to browse the Internet safely.

Two keys to better IT security

Two areas which Stop. Think. Connect. has highlighted recently are two-step authentication and mobile security.

Two Steps Ahead

IT pros know passwords don’t always offer much in the way of protection. That can be true even if users aren’t securing their accounts with easy-to-guess or commonplace passwords like “password” or “12345.”

The goal with the campaign’s Two Steps Ahead initiative is to increase familiarity with and use of two-factor authentication techniques. This method builds upon passwords by adding an additional layer of security. Instead of only logging in with a password and a username, users will have to provide an additional form of proof that they are who they say they are, e.g., clicking on a link or replying to a text message sent to their phone.

The campaign’s website is home to a number of resources IT can use to educate end users about the importance of two-step authentication, including videos, downloadable posters and FAQs. In addition, the campaign is currently on a multi-city tour also in support of the issue.

International Mobile Safety Tips

These tips were first released by Stop. Think. Connect. near the tail end of last year’s Cyber Security Awareness Month, however, they bear repeating. This updated set of mobility tips provides users with a set of best practices to follow while they’re utilizing mobile devices.

Highlights that can be passed along to users include:

  • Keep a Clean Machine
  • Most users understand the need to keep their desktops or laptops updated and to watch out for malware while they’re using them. This doesn’t always extend to mobile devices, although it should. Operating systems need to be kept up to date and the Stop. Think. Connect. mindset should apply regardless of device.
  • Restrict Access to the Device Mobile devices have become critical parts of a person’s home and work life and as a result they’ve also become a storehouse of confidential data. Mobile devices need to be secured with a strong passcode and kept in a safe place. Also, when an app requests access to info, users should look into what it wants and why before agreeing.
  • Connect with Care Public Wi-Fi may seem like a helpful perk, but it can be incredibly risky. If it must be used, users should limit it to low-risk activities and adjust their security settings accordingly.
  • Be Web Wise Users should try to stay current with the latest threats and security techniques. IT can only do so much. It helps to empower users and get them concerned about their own safety.

A clear path to increased IT security, mobility

Changing the way users think about security and their habits are both huge victories in the fight to keep the IT environment secure. However, it is also essential to have the infrastructure in place to support that new corporate culture, whether it’s with cutting-edge security solutions or an enterprise mobility suite.

Arraya’s team has decades of experience deploying and supporting these types of solutions and more. We leverage our relationships with industry-leading vendors to find the right solution to meet our Clients’ unique business challenges. From there, our Managed Services team can help deploy and support that solution for the entirety of its lifecycle, ensuring Clients realize the highest possible return on their initial investment.

Want to learn more about how Arraya can help? Visit us online at www.ArrayaSolutions.com to read about the services and solutions we offer, our distinct methodology or to be put in touch with one of our Account Executives. Also, follow us on Twitter, @ArrayaSolutions, to keep up with all of our latest news, updates and special offers.

Arraya Insights
Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}