Remote Access – IT SECURITY

Think before you click

  • Never click on a link in an email that does not come from a trustworthy and known source. 

  • Instead, type the link in your browser’s address bar or use a bookmark you’ve set earlier . 

Watch out for suspicious emails


  • Phishing is a way of stealing usernames, passwords or other personal information.

  • These emails may say something like, “Your account was compromised,” and tell you to change your password.

  • Send suspicious email to

Use only secure Wi-Fi

  • Unsecured Wi-Fi poses a security risk.

  • Your device usually picks up the strongest signal – which can be a rogue WiFi that’s actually an attacker waiting to monitor, intercept or even alter communications from your device.

Bluetooth: Turn it off when you’re not using it

  • Hackers can use Bluetooth to spread viruses, allowing hackers to access HM information that may be on your device.

Don’t download apps that ask to access your device’s data, unless you’re sure it’s a reliable source.

  • Mobile apps can contain a surprising lack of built-in security. When an app asks to access your device’s data, just say no.

  • Free apps present a real issue, especially ones offering in-app purchasing and downloads. A growing amount of malicious software is embedded in these downloads, allowing hackers to access your device’s data.

Do these three things to keep us safe

  • Use HM email, because it has several layers of security.

  • Don’t open attachments from your Gmail, Yahoo mail or other non-HM email when using your work computer.

  • Send suspicious email to


© 2020. Houston Methodist, Houston, TX. All rights reserved.