Security: Threats, Mitigation & Technician Best Practices
Written by: Michael ForbesAugust 7, 2025
Security is not optional — it’s embedded in nearly every CompTIA A+ objective. Technicians are often the first line of defense: they secure endpoints, educate users, and respond to incidents. This post outlines common threats, practical mitigations, and behavior-oriented best practices.
Common threats include malware (viruses, ransomware, trojans), social engineering attacks (phishing, vishing), and physical theft. Detecting a ransomware incident typically involves identifying encrypted files, ransom messages, or blocked access to backups. For malware suspicion, isolate the machine from the network to prevent lateral movement, document the incident, and perform offline scans or imaging for forensic review when needed.
Authentication and access controls reduce risk. Enforce strong passwords, enable multi-factor authentication (MFA) wherever possible, and disable or rename default admin accounts on network devices. Use principle of least privilege: provide users only the rights they need, and log administrative actions.
Endpoint protection should include reputable AV/EDR solutions with regular signature and heuristic updates. Configure scheduled scans, automatic updates, and review quarantine logs. Regular patching — OS and third-party apps — reduces exposure to exploit kits.
Network security basics are part of A+ knowledge: secure Wi-Fi with WPA2/WPA3, avoid default SSIDs and default admin credentials, segment guest networks, and use VPNs for remote access. For small networks, change default router credentials and firmware and enable automatic security updates where supported.
Data protection requires encryption at rest and in transit. Tools like BitLocker or FileVault protect local drives; TLS protects web traffic. Encourage users to back up critical data and periodically test restores to ensure backup integrity.
Operational security steps (incident response) should follow identify-contain-eradicate-recover-document. Keep a recovery plan that includes backup validation, communication templates, and escalation paths to legal or management teams when sensitive data is involved.
User education is critical: simulate phishing campaigns (with consent), produce short “how to” sheets, and encourage reporting suspicious emails. Behavior change reduces a disproportionate number of incidents.