Blog

Online security tips for working from home

Teleworking during the Coronavirus outbreak? While working from home can help slow the spread of the virus, it brings new challenges: juggling work while kids are home from school; learning new software and conferencing programs; and managing paper files at home. As you’re getting your work-at-home systems set up, here are some tips for protecting your devices and personal information.

  • Start with cybersecurity basics. Keep your security software up to date. Use passwords on all your devices and apps. Make sure the passwords are long, strong and unique: at least 12 characters that are a mix of numbers, symbols and capital and lowercase letters.
  • Secure your home network. Start with your router. Turn on encryption (WPA2 or WPA3). Encryption scrambles information sent over your network so outsiders can’t read it. WPA2 and WPA3 are the most up-to-date encryption standards to protect information sent over a wireless network. No WPA3 or WPA2 options on your router? Try updating your router software, then check again to see if WPA2 or WPA3 are available. If not, consider replacing your router. For more guidance, read Securing Your Wireless Network and Secure Remote Access.
  • Keep an eye on your laptop. If you’re using a laptop, make sure it is password-protected, locked and secure. Never leave it unattended – like in a vehicle or at a public charging station.
  • Securely store sensitive files. When there’s a legitimate business need to transfer confidential information from office to home, keep it out of sight and under lock and key. If you don’t have a file cabinet at home, use a locked room. For more tips, read about physical security.
  • Dispose of sensitive data securely. Don’t just throw it in the trash or recycling bin. Shred it. Paperwork you no longer need can be treasure to identity thieves if it includes personal information about customers or employees.
  • Follow your employer’s security practices. Your home is now an extension of your office. So, follow the protocols that your employer has implemented.

used with permission from FTC.gov
by Lisa Weintraub Schifferle

Gizer Gedik

Marketing

Recent Posts

Overview of BitLocker

In the digital age, data security is essential. It is imperative to protect sensitive information…

5 days ago

IT and Enhanced Manufacturing

The manufacturing sector continues to rapidly evolve, and staying competitive requires more than just efficient…

5 days ago

The kid who got arrested for making school easier

Principal Everette has finally put a name to the student responsible for… making school easier?…

6 days ago

Small IT on the Moon

“JoJo! Get up! Dad’s shuttle reached lunar orbit yesterday. He’s on the lunar surface now…

6 days ago

Quitters Anonymous

Brewer and Tech have found that they have a huge advantage over other companies with…

6 days ago

Security Headers – The First Line of Defense Against Web Threats

Websites and web applications play an important role in our lives making it increasingly important…

6 days ago