Archives - Work from Home Tips


Use Jami for videoconferences

With rising privacy concerns regarding popular videoconferencing applications, you should seek platforms with privacy policies that are clear and concise, like Jami. Jami is an end-to-end encrypted videoconferencing alternative, and its privacy policy states that the company only collects data that is imperative to compiling website visit statistics.

Randomize your Windows 10 hardware address

The Windows 10 device hardware address can be used for tracking you as you move between Wi-Fi networks. To prevent this surveillance, toggle on the hardware randomization option in Windows 10’s Wi-Fi settings.

Establish a guest login for your home wireless network

Most people know not to share their passwords with others, especially if they’ve been recycled. However, some people choose to disregard this advice when it comes to trusted guests who ask for access to their home network. Check with your internet service provider or update your router settings to establish a guest network instead.

Turn off file sharing in Windows

To limit the chance that unauthorized individuals on your home network could access files from your computer, you may want to inhibit file sharing. This is especially true for individuals who work with sensitive information and have gone from a secure office network to their home wireless setup. Open Settings and select “Network and Internet.” […]

Delete sensitive stored recordings from your Alexa device

Unless you remove them, Alexa will store text and audio recordings indefinitely. While this is used to improve the performance of your Echo or other devices, if unauthorized parties gain access, they can use personal information to hijack additional accounts. From the Alexa app, open Settings. Then select “Account Settings” and “History.” Delete the desired […]

How to spot business email compromise and avoid the threat while working from home

In August 2020, the United States Department of Justice announced that a citizen from Ghana had been extradited to the U.S. in connection with a coordinated fraud scheme responsible for hundreds of thousands of dollars in losses. At the center of the allegations was a business email compromise (BEC) attack targeting a Memphis real estate […]