Archives - Work from Home Tips


Monitor for Shadow IT

When faced with a task, a problem or a deadline, you may be tempted to innovate to resolve the issue and continue moving forward. Innovation is good, but can prove perilous if it leaves holes in your security when you try to bypass perceived limitations of solutions provided by a centralized IT department. Set new […]

Secure home routers

When using a home router, ensure you have changed the username and password from the common factory set of admin/admin. Disable WPS, which is both insecure and susceptible to brute force attacks. If possible, use a secure router for work use only, and monitor traffic to ensure your child isn’t using it for Minecraft access.

Use encryption on BYODs

Working at home on personal devices (Bring Your Own Devices) and self-managed Wi-Fi networks present a massive security risk to you and your employer. To protect potentially sensitive information, enable Windows and macOS native encryption functionality and save encryption passwords.

Lockdown your router

When you connect a computer to the internet, it’s also connected to millions of other computers—a connection that could allow attackers access to your computer. Although cable modems, digital subscriber lines (DSLs), and internet service providers (ISPs) have some level of security monitoring, it’s crucial to secure your router—the first securable device that receives information […]

Use role-based access

Remote work and the IoT mean users and devices are everywhere and may not have the best security at all times. By assigning roles to users and devices (family members, roommates, individual devices, etc.), and limiting access based on these roles, you can minimize the number of SSIDs in use and differentiate between approved and […]

Maximize your window or app when screen sharing

If you’re sharing your laptop’s screen on a Zoom, Webex or Google Meet call, consider maximizing the window or app so that other participants can’t see what’s on your desktop. Also make sure to close out any unnecessary tabs that could be glimpsed during the session.