Zenzero
Zenzero

10 Cyber Security Tips for Employees to Stay Safe at Work

13th September 2021

Why Cyber Security Awareness Matters for Employees

In today’s digital workplace, employees are one of the most common targets for cyber criminals. Attackers often exploit human behaviour through phishing emails, credential theft, social engineering, and unsafe browsing.

According to the 2025 Verizon Data Breach Investigations Report, the human element was involved in around 60% of breaches, highlighting how important employee awareness is to cyber security.

This means cyber security is not just the responsibility of the IT department. Every employee plays a role in protecting business systems, customer data, and company operations.

By following a few safe computing practices, employees can significantly reduce cyber security risks and help their organisation stay protected.

1. Understand Your Role in Cyber Security

Employees are often the first line of defence against cyber attacks. While IT teams implement security tools and policies, attackers frequently target individuals through phishing, social engineering, or compromised credentials.

Understanding your organisation’s cyber security policies and recognising suspicious activity can help prevent security incidents before they escalate.

Best practices

  • Follow company policies related to data protection and security.

  • Report suspicious emails, login alerts, or unusual system behaviour.

  • Support a positive cyber security culture within your organisation.

  • Treat cyber security as part of your everyday responsibilities.

2. Avoid Shadow IT in the Workplace

Shadow IT refers to software, tools, or systems used within a company without approval from the IT department.

Examples include:

  • Uploading company files to personal cloud storage accounts

  • Signing up for SaaS tools without IT approval

  • Using personal devices for work tasks

  • Communicating with colleagues through unofficial messaging apps

These tools may not be malicious, but they can create security gaps because they are outside the visibility and control of corporate security systems.

Best practices

  • Only use company-approved tools and platforms.

  • Encourage colleagues to adopt approved technologies.

  • If a new tool would improve productivity, suggest it for official review by IT.

3. Watch Out for Phishing and Social Engineering

Phishing remains one of the most common cyber attack methods used by criminals to steal credentials, access systems, or deliver malware.

The Cybersecurity and Infrastructure Security Agency (CISA) warns that phishing attacks often impersonate trusted organisations or colleagues to trick users into revealing sensitive information.

Common warning signs include:

  • Urgent requests for login details or financial information

  • Suspicious links or attachments

  • Messages requesting confidential data unexpectedly

  • Emails that pressure you to act quickly

Best practices

  • Never click suspicious links or download unexpected attachments.

  • Verify unusual requests using another communication channel.

  • Report suspected phishing emails to your IT team immediately.

4. Use Strong Passwords and Multi-Factor Authentication

Weak passwords remain a major cause of data breaches. Using strong, unique passwords for every account significantly reduces the risk of credential theft.

The National Cyber Security Centre (NCSC) recommends using three random words to create strong yet memorable passwords.

Multi-factor authentication (MFA) adds an additional layer of protection by requiring another form of verification.

Best practices

  • Use unique passwords for each account.

  • Enable MFA wherever available.

  • Use a password manager if your company provides one.

  • Never share your login credentials with colleagues.

5. Separate Work and Personal Use

Using work devices for personal browsing or personal email can introduce security risks.

Personal websites and email services often lack the same protections as corporate systems, making them a common entry point for malware and phishing attacks.

Best practices

  • Use personal devices for personal activities whenever possible.

  • Avoid downloading files or software on work devices.

  • Follow your organisation’s acceptable use policy.

6. Lock Devices When Unattended

Physical access to devices can allow attackers or unauthorised individuals to access sensitive company information.

Even a few minutes away from your desk can present a risk if your device is unlocked.

Best practices

  • Lock your workstation whenever you step away.

  • Do not leave laptops or phones unattended in public spaces.

  • Keep access badges and keycards secure.

Guidance on protecting physical devices:
https://www.cisa.gov/resources-tools/training/protect-physical-security-your-digital-devices

7. Never Plug Unknown USB Devices into Work Computers

USB devices can be used to deliver malware or gain unauthorised access to corporate networks.

Attackers sometimes distribute malicious USB drives at conferences or leave them in public areas hoping someone will plug them into a company computer.

CISA highlights removable media as a potential attack vector:
https://www.cisa.gov/eviction-strategies-tool/info-countermeasures/CM0115

Best practices:

  • Only use company-approved USB devices.

  • Never connect unknown USB drives to work computers.

  • Do not store sensitive data on portable storage devices unless authorised.

8. Follow Company Security Policies

Security policies are designed to protect company systems, employees, and customer data.

These policies may include:

  • Acceptable use policies

  • Remote working policies

  • Data protection guidelines

  • Access control procedures

Best practices

  • Review security policies regularly.

  • Ask your IT team for clarification if needed.

  • Help colleagues follow the correct procedures.

9. Be Careful What You Share on Social Media

Oversharing information online can help attackers gather intelligence about your organisation.

The NCSC advises limiting the amount of personal and professional information shared publicly to reduce the risk of social engineering attacks.

Best practices

  • Avoid sharing confidential work information online.

  • Review privacy settings on social media accounts.

  • Be cautious about sharing job roles, company projects, or travel plans.

10. Avoid Public Wi-Fi for Work Tasks

Public Wi-Fi networks in airports, hotels, and coffee shops can expose users to risks such as man-in-the-middle attacks or fake hotspots.

Where possible, use secure alternatives when working remotely.

Best practices

  • Use a personal mobile hotspot instead of public Wi-Fi.

  • Connect through a company VPN if public Wi-Fi is unavoidable.

  • Avoid accessing sensitive systems on unsecured networks.

 

Final Thoughts

Cyber security is everyone’s responsibility. While organisations invest heavily in security technology, employee awareness remains one of the most effective defences against cyber threats.

By following these 10 safe computing tips, employees can help prevent phishing attacks, protect sensitive data, and reduce the risk of cyber incidents across their organisation.

Small daily actions – such as reporting suspicious emails, using strong passwords, and following company policies – can make a significant difference in keeping businesses secure.

Need Help Strengthening Your Organisation’s Cyber Security?

At Zenzero, we help organisations improve their cyber resilience through services including:

  • Cyber security risk assessments

  • Vulnerability management

  • Penetration testing

  • Security monitoring and threat detection

  • Cyber Essentials certification

Speak to one of our specialists today to discuss how we can help protect your organisation.

Discover more from Zenzero

Subscribe now to keep reading and get access to the full archive.

Continue reading