Six Tips to Work from Home More Securely
| May 20, 2020
As many businesses have recently been forced to “work-from-home” environments, many companies are also having to consider extending these remote work accommodations for their employees for the foreseeable future.
With the increase in remote work and likelihood of its prominence moving forward, companies need to consider various ways to avoid cybersecurity risks and therefore avoid additional interruptions to business.
- Start with the Cybersecurity Basics
- Secure Your Home Network
Start with your router. Turn on encryption (WPA2 or WPA3). Encryption scrambles information sent over your network so outsiders can’t read it. WPA2 and WPA3 are the most up-to-date encryption standards to protect information sent over a wireless network. No WPA3 or WPA2 options on your router? Try updating your router software, then check again to see if WPA2 or WPA3 are available. If not, consider replacing your router.
- Keep an Eye on Your Laptop
If you’re using a laptop, make sure it is password-protected, locked and secure. Never leave it unattended – like in a vehicle or at a public charging station.
- Use Secure Conference Lines and Video Meetings
If you’re having conference calls or video meetings, beware of getting “zoombombed”. Make sure your meetings are secure, locked, and use randomly generated meeting URLs. Unsure if the service you’re using can do this? Check out our Video Conferencing & Webinar tools and ask how you can get these services free until 2021.
- Use VPN Access Only to Connect to Company Network
If your employees need to access resources, such as servers, from their home – ensure they are using a VPN (Virtual Private Network) to connect to your office network. A VPN creates an encrypted tunnel for your network traffic to flow through and makes it harder for others to intercept your traffic. NEVER allow your employees to use unsecured connection methods like “GoToMyPC” to log into your office networks.
- Be Alert for Phishing Emails and Scams
Criminals try to take advantage of fear and uncertainty by sending emails that appearto be from authorities, or company officers, in an attempt to lure you into clicking on malicious links, or providing your private information. Review our checklist of email red flags to look out for.
President/CEO, DE Web Works