Archives - Work from Home Tips


Delete sensitive stored recordings from your Alexa device

Unless you remove them, Alexa will store text and audio recordings indefinitely. While this is used to improve the performance of your Echo or other devices, if unauthorized parties gain access, they can use personal information to hijack additional accounts. From the Alexa app, open Settings. Then select “Account Settings” and “History.” Delete the desired […]

How to spot business email compromise and avoid the threat while working from home

In August 2020, the United States Department of Justice announced that a citizen from Ghana had been extradited to the U.S. in connection with a coordinated fraud scheme responsible for hundreds of thousands of dollars in losses. At the center of the allegations was a business email compromise (BEC) attack targeting a Memphis real estate […]

Obscure your background on Google Meet

Google Meet is a convenient videoconferencing solution. Now, users can protect their privacy and limit the potential exposure of personal information that might be visible on camera by using a virtual background. Before you enter a meeting, you’ll be directed to a preview page. Click the figure in the bottom right corner of the video […]

Adopt a zero-trust security model

It’s far, far better to be too suspicious than too lax when it comes to your security, especially when using company devices on personal networks while working remotely. A combination of a zero-trust approach (which flags anything not explicitly known not to be a threat) with a robust IT support system (to swiftly give and […]

Avoid Zoom links in emails

While the simplest way to get people to log into a Zoom meeting is to send them a link, these links are being spoofed in emails. Instead, send a direct request to members of the team with a code to enter the Zoom meeting from Zoom’s homepage. This will prevent Zoom hacking and your computer […]

Fast-track security reports

If you’re working from home but still need to troubleshoot with an employer IT administrator, don’t jumble help-desk requests in a single feed. Use a VIP channel for IT issues or security concerns so that they are directed straight to an IT professional who can address them. A phishing scam is a good example of […]