UC Goering Center news
10 IT tips to work from home — securely
By David Owens
Overnight, in response to the COVID-19 pandemic, many of us were transferred from our traditional work environments to working from home.
While we adjust to new challenges, like the dog barking when on a business call, we must remain diligent of the threats of cyber security as the criminal element seeks to take advantage of this disruption in our daily life.
With the proper multi-level IT security solutions in place, combined with a savvy workforce adept at identifying social engineering threats designed to bypass our security levels, we can all ensure the security of our data, while best serving our customers remotely.
Below are ten IT security tips for working from home:
1. Phishing scams are rife. Be aware of phishing scams targeting remote workers with sensational or emotional messages. Without your colleagues around, you need to be extra vigilant of both email and phone scams. Report any suspicious messages to your IT Security team.
2. Be extra careful of fake news and malicious websites taking advantage of newsworthy events, such as the COVID-19 pandemic.
3. Your passwords are the key to the kingdom. Without the company network to protect you, the power now lies squarely in your hands, or your passwords. Make sure your password for each critical site is strong and unique. Check the policy on password managers and use one if allowed.
4. Use Multi-Factor Authentication wherever possible. This is combining your username and password with something that you own, such as a One Time Password app on your phone.
5. Don’t fall for “credential phishing” attacks, where scammers trick you to hand over your username and passwords. Best is to not ever click on links asking you to update details. Rather, bookmark the sites you frequently visit.
6. Apply all basic security features. Keep your operating system, plug-ins and anti-virus software up to date and apply security patches when necessary.
7. Secure your home WiFi Network. There are two basic must-dos to set this up securely. Change your default router password. If you’re still using “admin/admin,” “admin/password” or something similar to log into your router itself, change that. Next, when setting up a password for your WiFi network, make sure you choose WPA2. And whatever you do, do not run a WiFi network without a password.
8. Keep your work environment private. Keep your home environment safe and ensure nobody is allowed to access your work computer, including your family and kids. Others could unintentionally download malicious software or access files they shouldn’t see. Ensure that your work conversations remain private and check your policy on smart home devices like Alexa or Google Home. Avoid printing at home, and if you must, make sure you lock sensitive documents away and shred them before discarding them.
9. Use a VPN. Using a virtual private network (or VPN) provides a secure tunnel for all your internet traffic, preventing criminals from intercepting your data... Ask your security team to set one up for you.
10. Read your policies. They are there to keep you, the company and our data safe. In turn, this allows you to work in the comfort of your PJ’s and slippers. You are our strongest line of defense, so remember to remain super vigilant.
David Owens is the Vice President of Sale and Marketing with Full Service Networking, a Modern Office Methods Company, providing Managed IT Services. Reach David at david.owens@fullservice.net or by calling 513-699-1202.
About the Goering Center for Family & Private Business
Established in 1989, the Goering Center serves more than 400 member companies, making it North America’s largest university-based educational non-profit center for family and private businesses. The Center’s mission is to nurture and educate family and private businesses to drive a vibrant economy. Affiliation with the Carl H. Lindner College of Business at the University of Cincinnati provides access to a vast resource of business programing and expertise. Goering Center members receive real-world insights that enlighten, strengthen and prolong family and private business success. For more information on the Center, participation and membership visit goering.uc.edu.
Related Stories
Is your personal data protected?
December 13, 2023
From phishing attacks, malware and account hijacking to removable media, denials of service and intellectual property theft, cybersecurity incidents are constantly evolving and the impacts are becoming more severe.
Wrongful collection of data: Reduce the risk
December 13, 2023
The law tends to lag a bit behind the rapid evolutionary pace of the technology and software that we use in our businesses.
Managing third-party cyber risk that increases your...
November 8, 2023
As organizations increasingly turn to independent contractors for products and services, third-party breaches have become a top cyber threat.