Archives - Work from Home Tips


Monitor user account activity

Vigilant user account activity oversight facilitates identifying and mitigating potential security threats. This is particularly important for accounts with elevated privileges with sensitive information access. Consider implementing user and entity behavior analytics (UEBA) tools that continuously monitor and analyze user actions and system behavior more generally. These tools work to detect anomalies indicative of security […]

Establish a clear incident response plan

Prepare your organization for potential security incidents by creating a clear, comprehensive incident response plan. This plan should outline clear roles and responsibilities, escalation procedures, communication strategies and detailed steps to follow in the event of a breach. Consider conducting regular drills and tabletop exercises to ensure that your team is well-prepared to react swiftly […]

Never lose access to your email lifeline

Imagine not being able to check your email, access important documents, or communicate with friends and family. This could happen if you lose access to your email account. To prevent this scenario, setting up a recovery email address or phone number is essential. Why a recovery email or phone number matters Your email account serves […]

Protect your IoT devices

Internet of Things (IoT) devices require meticulous hardening to mitigate potential security risks. Begin by changing default passwords to strong, unique ones — reducing susceptibility to brute-force attacks. Regularly update device firmware to patch vulnerabilities and address security weaknesses. Additionally, consider segmenting IoT devices onto a separate network, isolating them from your primary network. This […]

Disable remote desktop access on your devices unless necessary for remote work

Given the increasing prevalence of remote work, balancing remote desktop convenience with security ensures its ongoing efficiency and risk mitigation. Prioritize strong authentication, encrypted connection and limiting access to trusted sources only. Furthermore, regularly update software, monitor logs and implement access controls to enhance the security of your remote desktop access.

Invest in a webcam cover, or ensure your webcam is disabled when it’s not in use

Webcams are a common target for those who seek to invade your privacy. To best safeguard yourself, webcam covers are an affordable, easily implementable safety measure that prevents cybercriminals from gaining unauthorized vision. Alternatively, disabling your webcam while it’s not in use serves a similar purpose, ensuring that no one can access your camera without […]