Best Practices for Secure Remote Work

Remote and hybrid work models deliver undeniable business benefits, but they have also opened the door to a variety of cyber threats. While it is the company’s responsibility to implement strong defenses, employees working outside the office must also do their part by practicing good security. Here are some suggestions for working safely from home:

business-security-remote-work-cybersecurity-secure-network-Midland-TX

Know company policies. Remote work policies describe processes for safely accessing the network, which company resources you’re allowed to access, and the types of devices that are permitted.

Think before you click. Remote workers are prime targets for phishing, ransomware and social engineering attacks. Do not open emails, text messages, or web links from senders you don't recognize.

Practice good password hygiene. Never share passwords and do not reuse them. Delete old accounts you no longer use, along with the associated login credentials.

Keep work and personal devices separate. Do not use company devices for personal business and do not access company resources from personal devices that are not authorized. 

Protect devices. Password protect phones, laptops and other devices used to access company resources. Enable automatic update options to ensure known vulnerabilities are patched in a timely manner. Updates and patches must be applied regularly to limit vulnerabilities. 

Use Wi-Fi wisely. Update your wireless router’s software, change its default password, and update security settings to WPA2 or WPA3 encryption. Never use unsecured public Wi-Fi networks for company business.

Collaborate cautiously. Team meeting applications have screen-sharing features that allow meeting participants to share presentations or documents. Always close documents or browser windows that others should not see.  

Use a VPN. Virtual private networks create secure, encrypted connections to the company network. 

Work with your IT help desk. Contact NetAscendant to report any unusual or suspicious activity on any device you are using for work.