Cyber Hygiene for Employees

You survived finals, aced the interviews, and landed the job. Now comes the part no one covered in orientation: keeping yourself — and your employer — safe online.

Every year, security breaches cost companies millions — and a significant share of them trace back to a single employee clicking the wrong link, reusing a password, or leaving a laptop unlocked. As a new hire, you're a target precisely because attackers assume you're eager to please, unfamiliar with internal protocols, and less likely to question a suspicious request from someone who claims to be your manager.

Good cyber hygiene isn't about paranoia. It's about building small, consistent habits that become second nature — the same way you lock your car without thinking about it.

Protect your credentials

  • Use a password manager. Never reuse passwords. Enable multi-factor authentication (MFA) on every work account.
  • Never share your password. Not even with IT. Legitimate teams will never ask for it. If someone does, report it.

Lock down your devices

  • Lock down your device Set your screen to auto-lock after five minutes.
  • Keep software updated. Most attacks exploit known vulnerabilities in unpatched systems. Enable automatic updates where policy allows.
  • Don’t mix work and personal devices. Using a personal laptop for work bypasses security controls your employer relies on. Only use your employer provided device to do work.

Spot phishing before it spots you

  • Slow down when something feels urgent. Phishing emails manufacture panic. Legitimate systems give you time.
  • Hover before you click. Check where a link actually leads. Spoofed domains like “microsoft-support.net” are designed to look real.
  • Verify unusual requests by phone. If your “manager” emails asking for a bank transfer or login credentials, call them directly first.
  • Report suspicious messages — don’t just delete them. Your security team needs to know what’s circulating.

Handle data carefully

  • Keep sensitive data off personal apps. No customer files in personal Gmail, Dropbox, or WhatsApp — ever.
  • Use approved storage only. Shadow IT is a risk your employer can’t protect against.
  • Shred confidential documents. Paper is still a leak vector.

Stay safe off-network

  • Connect via VPN when working remotely. Always, before accessing internal systems.
  • Avoid public Wi-Fi for sensitive work. Use your phone as a hotspot instead.

When in doubt, report it.

Security teams would far rather investigate a false alarm than respond to a real breach. No one has ever been fired for being too careful.

Applicable Policies 

Access to User-Related Electronic Information at Dartmouth

Confidentiality of Business Information

Acceptable Use Policy

*list reflects a selection of applicable policies and does not represent a complete list