Archives - Work from Home Tips


Store sensitive files in the OneDrive personal vault

Do you have sensitive files sitting on your desktop or in an unsecured folder stored on your hard drive? If you have OneDrive, you can easily move those documents — like tax records or recovery codes — into a more secure Personal Vault. OneDrive users can open the Personal Vault from their file manager. Then […]

Deactivate member accounts when users leave Slack

When a user leaves Slack, it’s time to deactivate their account to ensure that it’s not compromised after it goes dormant and that the user does not receive access to sensitive information they’re no longer allowed to view. Click the workspace name, then open “Settings & administration” and select “Manage members.” Find the appropriate member […]

Use a surge protector to prevent data loss

Overloading electrical sockets can lead to surges that result in damage to personal computers and even data loss. It’s important to regularly back up important data. To prevent damage to local machines, use a surge protector for any desktop configuration that requires power for multiple devices.

Before connecting a new computer to the Internet install antivirus software

Installing an antivirus software program and keeping it up-to-date is a critical step in protecting your computer. Many types of antivirus software can detect the presence of malware by searching for patterns in your computer’s files or memory. Antivirus software uses signatures provided by software vendors to identify malware. Vendors frequently create new signatures to […]

Coil your cables properly

Not everything can be wireless, and for every device that has to be connected, there’s a cable that needs to be properly coiled for storage. Otherwise, you risk damaging these cords and suffering possible data loss. To coil cables the right way, feel for where the cord naturally bends at uniform intervals, and spool it […]

Best practices for Office 365 security

As businesses shifted to accommodate the needs of their newly remote workforces following the COVID-19 pandemic, scammers took note. In order to exploit the uncertainty surrounding the rapid deployment of new software and security solutions, they engaged in deceptive phishing attacks. Targeting Office 365 credentials TechRadar reported on one such attack that encouraged recipients to […]