X


Patch, Patch, PATCH!


Set up your computer for automatic software and operating system updates. An unpatched machine is more likely to have software vulnerabilities that can be exploited.

X


Install protective software


Avast is available as a free download for Windows, Macintosh, and Linux from IS&T's software page. When installed, the software should be set to scan your files and update your virus definitions on a regular basis.

X


Choose strong passwords


Choose strong passwords with letters, numbers, and special characters to create a mental image or an acronym that is easy for you to remember.

X


Different Password


Create a different password for each important account, and change passwords regularly.

X


Backup, Backup, BACKUP!


Backing up your machine regularly can protect you from the unexpected. Keep a few months' worth of backups and make sure the files can be retrieved if needed.

X


Control access to your machine


Don't leave your computer in an unsecured area, or unattended and logged on, especially in public places - including Athena clusters and Quickstations. The physical security of your machine is just as important as its technical security.

X


Use Email and the Internet Safely


Ignore unsolicited emails, and be wary of attachments, links and forms in emails that come from people you don't know, or which seem "phishy." Avoid untrustworthy (often free) downloads from freeware or shareware sites.

X


Use secure connections


When connected to the Internet, your data can be vulnerable while in transit. Use remote connectivity and secure file transfer options when off campus.

X


Protect sensitive data


Reduce the risk of identity theft. Securely remove sensitive data files from your hard drive, which is also recommended when recycling or repurposing your computer. Use the encryption tools built into your operating system to protect sensitive files you need to retain.

X


Protect sensitive data


Reduce the risk of identity theft. Securely remove sensitive data files from your hard drive, which is also recommended when recycling or repurposing your computer. Use the encryption tools built into your operating system to protect sensitive files you need to retain.

Services

The Information Technology department at Alzewayed group offers a wide range of services for the company we mention some of them bellow:

  • Remote Technical HelpTech support services exist to help businesses and individuals use technology to keep their operations running smoothly. We support Wi-Fi connections, servers, PCs, tablets, printers and many more devices crucial to a business’ daily operations. We use online tech-support services to remotely access computers and other equipment, or to provide support via email, online chats or phone calls.
  • On-Site Technical HelpOur TS team is highly trained and always ready to help you. If you will have any problems at your work and can't be solve online our team will make sure to give you the right instructions on how to request a technical team to come to your location and help you solving your problem.
  • Warning Letters and Notification E-mailsPeople are often referred to as the weakest link in an information security program. Through either intentional or accidental misuse of access, people often leave networks and organizations exposed. "All it takes is just one weak link in the chain for an attacker to gain a foothold into your network". This is why our technical team takes on his shoulder to educate the end-users and notify them by sending periodic warning letters for the latest security breaches or expected attacks that they may face while they are at work or at home.
  • Training As part of our duties host training sessions for the company employees so they can use the latest technology offered in the market to improve they day to day duties.
  • E-mail ServicesWe provide all our employee with e-mail address each on his company domain.