Secure Your Home Office and Remote Work

Working remotely has its benefits but doing so comes with the added responsibility of taking the appropriate steps to protect your organizations data. Read below to learn more!

Woman working from home.

As more employees work from home, simple security measures need to be taken to protect businesses from cyber criminals. Even if you are using a computer provided by your employer, there are still measures you need to take. Learn tips on how you can work from home safely and securely.

  1. Update Your Software

    Before you connect to your corporate network, be sure all internet connected devices including PCs, smartphones, and tablets are running the most current versions of software. This will help improve the performance and security of your devices. Keeping your electronics updated ensures they run smoothly and lets you use programs that require the latest software.
  2. Use A VPN

    A Virtual Private Network (VPN) automatically encrypts incoming and outgoing data, protecting you from a cybercriminal. Businesses should create a company-wide VPN that employees must be connected to at all times. It will also disguise your location so you cannot easily become a target for scams.
  3. Use Secure Wi-Fi

    Connect to a secure network and use a company-issued VPN to access any work accounts. Home routers should be updated to the most current software and secured with a lengthy and unique password. Make sure you are not connecting to public Wi-Fi to access work accounts unless you are using a VPN. Also, make sure to separate your network so your company devices are on their own Wi-Fi network, and your personal devices are on their own.
  4. Secure your device

    Always keep your device with you or stored in a secure location when you’re not using it. When you get up from your desk, always remember to lock it so nobody else can get on it and see private matters. Set up auto log-out if you walk away from your computer and forget to log out. Make sure to limit access on the device you use for work. Never let a family member or friend use your work computer, only the approved user should use the device.
  5. Avoid Oversharing Your Screen

    During online meetings, be cautious when sharing your screen. You might accidentally share content that is not meant to be viewed by others. Remember to not leave any windows open you do not want to share. Before meetings, take a few minutes to prepare and only have tabs open that others are okay to view. In addition, hiding message previews can help ensure that while sharing your screen, your private conversations are not on display.
  6. Be Aware of Phishing Scams

    Phishing scams aimed to steal personal details and login credentials are often sent to work emails. If you receive an email with suspicious links or attachments, do not click on them. The signs of a phishing scam might not be noticeable at first, but once you recognize a phishing attempt, you can avoid falling for it. Before clicking on any links or attachments take a few seconds to ensure the email is trustworthy. Here are some quick tips on how to spot a phishing email:

    ○    Does it contain information that is too good to be true?
    ○    Does it include language that is alarming or threatening?
    ○    Does it include misspellings or poor grammar?
    ○    Does it include requests to send personal information?
    ○    Is it a strange or abrupt business request?
    ○    Does the sender's email match the company it is coming from?

By following cybersecurity remote work best practices, individuals and organizations can avoid risks and ensure safety.

The information provided in these articles is intended for informational purposes only. It is not to be construed as the opinion of Central Bancompany, Inc., and/or its subsidiaries and does not imply endorsement or support of any of the mentioned information, products, services, or providers. All information presented is without any representation, guaranty, or warranty regarding the accuracy, relevance, or completeness of the information.