You survived finals, aced the interviews, and landed the job. Now comes the part no one covered in orientation: keeping yourself — and your employer — safe online.
Every year, security breaches cost companies millions — and a significant share of them trace back to a single employee clicking the wrong link, reusing a password, or leaving a laptop unlocked. As a new hire, you're a target precisely because attackers assume you're eager to please, unfamiliar with internal protocols, and less likely to question a suspicious request from someone who claims to be your manager.
Good cyber hygiene isn't about paranoia. It's about building small, consistent habits that become second nature — the same way you lock your car without thinking about it.
Protect your credentials
- Use a password manager. Never reuse passwords. Enable multi-factor authentication (MFA) on every work account.
- Never share your password. Not even with IT. Legitimate teams will never ask for it. If someone does, report it.
Lock down your devices
- Lock down your device Set your screen to auto-lock after five minutes.
- Keep software updated. Most attacks exploit known vulnerabilities in unpatched systems. Enable automatic updates where policy allows.
- Don’t mix work and personal devices. Using a personal laptop for work bypasses security controls your employer relies on. Only use your employer provided device to do work.
Spot phishing before it spots you
- Slow down when something feels urgent. Phishing emails manufacture panic. Legitimate systems give you time.
- Hover before you click. Check where a link actually leads. Spoofed domains like “microsoft-support.net” are designed to look real.
- Verify unusual requests by phone. If your “manager” emails asking for a bank transfer or login credentials, call them directly first.
- Report suspicious messages — don’t just delete them. Your security team needs to know what’s circulating.
Handle data carefully
- Keep sensitive data off personal apps. No customer files in personal Gmail, Dropbox, or WhatsApp — ever.
- Use approved storage only. Shadow IT is a risk your employer can’t protect against.
- Shred confidential documents. Paper is still a leak vector.
Stay safe off-network
- Connect via VPN when working remotely. Always, before accessing internal systems.
- Avoid public Wi-Fi for sensitive work. Use your phone as a hotspot instead.
When in doubt, report it.
Security teams would far rather investigate a false alarm than respond to a real breach. No one has ever been fired for being too careful.
Applicable Policies
Access to User-Related Electronic Information at Dartmouth
Confidentiality of Business Information
Acceptable Use Policy
*list reflects a selection of applicable policies and does not represent a complete list