Blog

Online security tips for working from home

Teleworking during the Coronavirus outbreak? While working from home can help slow the spread of the virus, it brings new challenges: juggling work while kids are home from school; learning new software and conferencing programs; and managing paper files at home. As you’re getting your work-at-home systems set up, here are some tips for protecting your devices and personal information.

  • Start with cybersecurity basics. Keep your security software up to date. Use passwords on all your devices and apps. Make sure the passwords are long, strong and unique: at least 12 characters that are a mix of numbers, symbols and capital and lowercase letters.
  • Secure your home network. Start with your router. Turn on encryption (WPA2 or WPA3). Encryption scrambles information sent over your network so outsiders can’t read it. WPA2 and WPA3 are the most up-to-date encryption standards to protect information sent over a wireless network. No WPA3 or WPA2 options on your router? Try updating your router software, then check again to see if WPA2 or WPA3 are available. If not, consider replacing your router. For more guidance, read Securing Your Wireless Network and Secure Remote Access.
  • Keep an eye on your laptop. If you’re using a laptop, make sure it is password-protected, locked and secure. Never leave it unattended – like in a vehicle or at a public charging station.
  • Securely store sensitive files. When there’s a legitimate business need to transfer confidential information from office to home, keep it out of sight and under lock and key. If you don’t have a file cabinet at home, use a locked room. For more tips, read about physical security.
  • Dispose of sensitive data securely. Don’t just throw it in the trash or recycling bin. Shred it. Paperwork you no longer need can be treasure to identity thieves if it includes personal information about customers or employees.
  • Follow your employer’s security practices. Your home is now an extension of your office. So, follow the protocols that your employer has implemented.

used with permission from FTC.gov
by Lisa Weintraub Schifferle

Gizer Gedik

Marketing

Recent Posts

Introduction to Microsoft Copilot

Microsoft Copilot is a tool, powered by AI, that aims to boost your productivity within…

3 hours ago

Project Management: Why is it important?

Making things happen is the art and science of project management. The process involves managing…

5 days ago

Enhancing Website Performance and User Experience Through Caching Strategies

In today's fast digital life, website performance is important, as it holds visitors and ensures…

5 days ago

Protecting Municipal Data: Security Tips for City Officials

The FBI reported that cyber attacks against government facilities saw an increase of almost 36…

6 days ago

The Advantages of Collaborating with a Managed Services Provider

In today’s fast-paced, technologically advanced world, businesses of all sizes increasingly rely on digital systems…

6 days ago

Technology Buzzwords: Demystifying the Jargon of the Digital Age

You likely hear terms like "blockchain," "machine learning," and "cloud computing" without considering their real…

6 days ago