Monthly IT Educational Newsletters to Staff
ISSUE 006
February 21, 2025
IT Bulletin
General Computer Usage Best Practices
Best Practices
To help you get the most out of your work
tools, we've listed these best practices:
Email Phishing and Spam Protection
Phishing is when users are tricked into
giving their information to the wrong
person. Spam emails are common, and as
we browse the web, make sure the website
you provide sensitive information to is
secured with HTTPS. For example,
https://example.com is secure, while
http://example.com is not. Always reach out
to IT if you come across suspicious emails
from unknown senders for investigation
and possible blacklisting.
Physical Damage Protection
To protect your device from damage in
case of an accident, always keep it in its
protective bag, except when you are using
it. Avoid using your computer to charge
external devices like mobile phones, as this
can affect the computer’s battery. Always
clean your computer with a silk cloth to
prevent dust from entering, which can
cause problems like a damaged processor
fan, faulty keyboard, and more.
Kasperky Endpoint Protection
Endpoint Security is running on your computer to
protect you from Trojans, malware, and other
threats. Make sure to notify the infrastructure team
immediately if you receive any alerts.
Data Retention & Protection
All company information and data must be stored
on SharePoint. This platform allows easy
management, secure file sharing, and real-time
collaboration, giving you and the company greater
control and efficiency over data.
Regular system update
Always restart your system when you get an update
notification. This helps your computer run
smoothly and keeps your operating system up to
date.
Finally, IT team is always on standby. If you have any
questions, suggestions, or feedback, don’t hesitate
to reach out to us on-,
and raise support ticket on.IT Helpdesk Platform,
You can also read the company’s Computer Use
Policy here.
Ventrae Infrastructure 2025