Top Tips on Working From Home Securely
The necessity of working from home is becoming a reality for many workforce members that may not have had this access before. While remote working offers many benefits to employees, many more risks appear as cybercriminals prey on the lax security protocols of the remote worker. It is critical that we as employees treat this access as a privilige, making security our top concern.
Your organizations remote access policy will layout the requirements you should be adhering to during remote sessions.
If your organization provides you with a laptop / desktop, smartphone or tablet only use those devices. If you were not issued a device make sure that your organization knows the primary device you will be using and have them make sure you are setup with appropriate security controls.
Watch the full video with all tips below.
Video Blog
Related Posts
Download our White Paper - Cybersecurity Training 101 For Small Businesses
What is social engineering and am I affected? Simply speaking, there is more to cybersecurity than computers and how they work. This statement includes how your network is setup or even how...
Download our White Paper - Cybersecurity Risk Assessments For Small Businesses
What is the goal of a risk assessment? The goal of a security risk assessment is to define the appropriate safeguards that your company will need to implement in order to align...
Download our CMMC White Paper and learn what CMMC means for your small business.
The DoD implemented requirements for safeguarding CUI information and cyber incidents through the release of Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012 in October 2016. The DFARS directed DoD Contractors to self-attest...
Guidelines for OCR enforcement discretion for telehealth remote communications
The use of electronic information and telecommunications technologies to support and promote long-distance clinical health care, patient and professional health-related education, and public health and health administration. Technologies include videoconferencing, the internet,...
31 Cybersecurity Awareness Tips for 2020
And so we believe that by raising awareness of these vulnerabilities and educating the public on how to keep themselves safe, we can take steps towards an internet that is safe from...
Remote Work Guide Do's and Dont's
Do’s Read & Acknowledge your company’s remote work and bring your own device (BYOD) policies and procedures Avoid using your personal device for work and restrict the use of company issued devices...
COVID19 Protect Your Small Business Data
Cybercriminals are aware in the interest in these subjects and are crafting malicious emails designed to infect your computer or steal information.
COVID19 Work From Home Dangers & Scams
As we shift to working from home you’re business has to face new challenges. Verifying the legitimacy of a potential phishing email is not as easy as it once was with new...