Main Slide Show
Workplace Safety & Health Company IH consultants are trained to inventory and assess confined spaces of various types and sizes.
Industrial Hygienists may wear Hazmat or other chemical protective clothing when evaluating highly hazardous atmospheres or environments.
An IH consultant uses sound level meters to assess noise levels in industrial environments.
Industrial Hygienists place noise dosimeters on factory employees to monitor employee exposure to noise levels.
Lockout/tagout involves assessing a machine’s operation and identifying all energy sources.
Tagout of electrical switches in a control room warns employees not to start equipment.
An Industrial Hygienist uses an X-Ray Fluorescence (XRF) analyzer to determine lead-based paint concentrations on a facility’s exterior.
We do air sampling for airborne contaminants using sorbent tubes.
Industrial Hygienists use a filter cassette equipped with a cyclone to collect respirable dust samples.
In last month’s blog, we covered steps employers can take to help stop cyber security breaches, including using secure access points and installing updates across all devices and systems on a regular basis. But when it comes to cybersecurity and mobile phones, we must all take an active stance to protect our mobile devices and your company’s data.
In today’s world, our smartphones have so many advanced capabilities – just like our computers, and we check our emails and bank accounts, search the internet pretty much whenever we want, and our phones allow us to continuing working in many cases when we are not sitting at our office or business. The security, though, is usually not set up as strongly as it is on our work computers.
There are some steps you can do to protect your mobile phone:
• Consider the safety features when choosing your mobile phone – such things as file encryption, finding and wiping the data remotely, ability to delete known malicious apps remotely and authentication features such as device access passwords
• Configure the device to be more secure, including enabling the password feature that locks the device until the PIN or password is entered – or even a thumbprint or face scan! There may even be a feature that after 10 failed attempts to login, the phone is wiped clean
• Do not click on links sent in suspicious emails or text messages
• Use caution before posting your mobile phone number anywhere
• Be careful what information you want stored on your phone
• Do your research before selecting and installing apps, including “repackaged apps” that may seem like updates to your current apps – and keep in mind, your social networking apps may reveal more personal information than you know, including location, birthday, etc.
• Disable interfaces that are not currently in use, such as Bluetooth and WiFi – and while you are at it, set Bluetooth-enabled devices to non-discoverable, so it is not visible to other devices
• Avoid joining unknown WiFi networks and using public Wi-Fi hotspots as attackers have been known to create fake hotspots
If your mobile phone is stolen or lost, notify your mobile service provider. If it’s a company phone or you do business on your personal mobile phone, contact your company ASAP. They can usually revoke all credentials that were stored to keep your company’s information safe. And if need be, have the mobile phone company remotely delete all data on the phone.
Mobile phone cyber threats are definitely on the rise. A little bit of time and effort on your end keeping these steps in mind can help lessen the opportunity of attackers targeting you.