COVID NOTIFICATION: We are still providing full-scale remote and onsite support for our clients. Our team, the equipment, and the HDCav Help Van are all operating in accordance by the strictest health protection guidelines. Help Desk Cavalry is committed to the safety of your team as well as ours.

These days, all companies of all sizes are targeted and those who don’t proactively protect themselves are more often in the crosshairs. Creating strong cybersecurity policies for your company and best practice instructions for your staff are the key ways to prevent your business from becoming a victim of cybercrime. To make sure you’re not one of them, make sure your policies and instructions cover the basics at the very least. 


  1. List specific rules regarding password setting  
  2. Review password best practices  
  3. Explain the implications of password sharing  
  4. Be specific about the punitive actions that will be taken if the password policy is not followed  


  1. List the rules for using personal devices at work or for work purposes. Be specific about scenarios and answer questions like which employees can use them, how often and for which purposes. You should also specifically list the minimum security measures that the user must take when accessing work systems through their personal device. And don’t forget to spell out the minimum hardware requirements around both the OS and security tools. 
  2. Review best practices and educate your employees on the risks related to connecting to open internet connections (Free Wi-Fi), such as the ones offered at malls or airports.  


  1. Document your cybersecurity measures and make sure that all details, including specifics around access, are listed. This should include your digital measures, such as deployed software like anti-virus tools, firewalls, etc. Also include the physical measures you employ such as CCTV systems, biometric access controls, etc. 
  2. An often-overlooked detail is to be clear about how you handle employee turnover. When someone quits your organization or changes positions, how is their previous access addressed? Spell out the rules and regulations regarding the removal of a user from the network, changing passwords, limiting access, etc. 


Most small businesses didn’t start their companies in hopes of also becoming IT experts. To make sure you have the most elements covered in your policies, contact a reputable and experienced IT partner. They speak, think, eat, and breathe IT every day. If you’d like us to take a look at yours, just contact us. We love helping small businesses stay as safe as possible. After all, we’re one ourselves.