During the days, many companies ask employees to work remotely. Working remotely can introduce some new security issues, especially for users who are not working in the office.
Here are some tips to help you run more reliably on home computers (WFH).
Choose a Good Work Area
There are plenty of tips here on how to choose a space that is comfortable for you and what you can minimize, but there are other safety guidelines as well.
- Choose a personal space. If you work from home, this may be easier than if you work in a cafe or library. Pick a place where people can't draw "cure". See your opinion on what's on the screen.
- If you're having trouble finding a personal place to work, you may be able to get a privacy filter. This is a protective panel that attaches to the screen and makes it difficult to read the contents of the screen unless you are directly in front of it.
- If you have conference calls or video meetings, keep in mind if other people can eavesdrop even if they weren't available to other people. Even if you are wearing headphones (especially in some cases). Other people can still hear voice communication when dictation. Make sure you are using meeting software with advanced security features.
- Do not allow family members to use your work devices. If you want to switch from your device to the kitchen or bathroom, lock your device so other users can't see what you're working on. Press Windows Logo key + L on a Windows device or Control + Command + Q on a Mac to quickly lock the screen. After you return, you will have to quickly enter it and everything should be right where you left it.
- Use only encrypted business Wi-Fi networks. Wi-Fi encrypted with WPA-2 is more secure than Wi-Fi access. If you work from home, make sure you are using your home Wi-Fi network and all home routers support encryption.
- If you need to access resources, such as servers, that are on your organization's network, use a VPN (virtual private network) connection to connect to your Office account. VPN creates an encrypted tunnel for network traffic and makes it even more difficult to intercept traffic. If you are unsure if your company supports a virtual private network (VPN) or how to connect to it, contact your IT support staff.
Data Protection
If your device is available or borrowed, what can you do to reduce the amount of data they can receive.
- Use strong authentication to access the device, such as Windows Hello. PIN, fingerprint or face, if supported by the device.
- Now you can think about what passwords you are using. If you are using simple passwords such as "funny" or "password1", now is the time to upgrade to a more secure password. "Length" is more important than complexity, although both have roles. The password must be at least 12 characters long and not in English, as well as in the dog's name. You can use a phrase such as your favorite Lyric song, movie sentence, or poetry to create a long, complex password, but easy to remember.
- Make sure local drive encryption is enabled, such as BitLocker. Thus, if your device is lost or stolen, it becomes difficult to access local data.
- Make sure that your device has security updates and that you have anti-malware software, such as Total Security Software, running.
- Use a modern browser and make sure you are using the latest version.
- Store your files in a secure cloud location, not on a local drive or removable media. Secure cloud storage like Google Drive or OneDrive for work or school means that even if a physical device is lost or stolen, your data is still available to you and your company.
- Wherever possible, use the web version of your applications, such as Word, Outlook, or Excel. In addition, you can store your files in a secure cloud location, since when using the web version of the applications, your data remains on the server and is not downloaded to your local device.
- Stay connected with the company while you work with remote contacts. Your IT department may have special requests or create new tools. If you suspect that your device or your data has been compromised in any way, notify them immediately so that they can investigate the situation and take steps to prevent unnecessary damage.
- Now, wherever you are, Temptation can use unapproved funds or store data outside of company resources. If you don't want your job done, ask the IT department, or Supplement your own control route. It is possible that you find systems that are not performing well if you are not in the office. Now is the perfect time to make sure you can work on these issues together.
- Phishing messages and phone calls alert. Criminals try to take advantage and uncertainty by sending an email that appears to you from authorities or company executives to Lure to try to open malicious links or provide personal information.
- Never click an attachment you didn't expect, even if it sounds familiar. Before opening an attachment, you can always check it to make sure you like it.
No comments:
Post a Comment