Archives - Work from Home Tips


Use email encryption if you send sensitive data

Most people think email is comparatively safe, but it’s an old set of protocols with many weaknesses. Think about using encrypted email for full protection – messages sent through these services are utterly unreadable by anyone without your key, although using it may take some getting used to.

Use your laptop’s screen lock feature when you leave your workstation

Whether you’re working in public or in the office, it’s important to secure your laptop when you leave it unattended. Many newer laptops contain a very practical screen lock tool. Much the same way a computer would automatically lock after a few minutes, this allows you to manually initiate the feature. While your device continues […]

Set user-specific restrictions on your business network

Not every employee needs access to every file. You can keep sensitive information safe by setting specific access permissions so that only authorized users can read certain documents. This reduces the risk that private information will be leaked, whether it be by someone on the inside or outside of the organization.

Disable unused/dormant IoT devices

With so many devices at your disposal, some might go unused for weeks, if not months, at a time. Unused IoT devices, sensors and modulators still pose a threat to your cybersecurity. As long as they remain connected to your network, hackers may still be able to use them in accessing your information. Keep an […]

Connect no more than 50 devices to a single home router

Consumer routers should hold no more than 50 connections. The more devices, the greater the security risk. If one device is compromised, all other devices on the network could be, too. A good rule of thumb is to connect your most used devices — those with the most personal data — to a second home […]

Don’t buy IoT devices from unproven vendors

The IoT (Internet of Things) is always increasing. Smart devices can range from your home refrigerator to your doorbell. For every device, however, there is an entry point into your home and your network. Check the reviews of IoT products before you buy and be on the lookout for any security complaints. The more confident […]