{"id":33199,"date":"2022-01-03T15:00:02","date_gmt":"2022-01-03T14:00:02","guid":{"rendered":"https:\/\/qodeinteractive.com\/magazine\/?p=33199"},"modified":"2023-07-11T15:03:57","modified_gmt":"2023-07-11T13:03:57","slug":"work-from-home-security-tips","status":"publish","type":"post","link":"https:\/\/qodeinteractive.com\/magazine\/work-from-home-security-tips\/","title":{"rendered":"14 Work From Home Security Tips"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]If the recent years have taught us anything, it is that <strong>a great multitude of jobs can be done without ever leaving one\u2019s home<\/strong>. And while there are distinct advantages to working from the comfort of your personal space, <strong>working remotely raises an important concern: security.<\/strong>[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][vc_column_text]For many IT professionals, security is something other people in a company are responsible for. Your own setup in your own home is your own affair. However, <strong>if you are working from home, security suddenly becomes more important<\/strong> for you personally \u2013 you are no longer dealing with a private network separate from your job.[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][vc_column_text]In this article, we will discuss some measures you can take to make your data more secure while working from home (or from another remote location). Here\u2019s what we\u2019ll be talking about:<br \/>\n[\/vc_column_text][vc_empty_space height=&#8221;22px&#8221;]<ul class=\"qodef-unordered-list-item qodef-toc\">\n    <li>\n\t        <div class=\"qodef-ul-title-holder\">\n            <span class=\"qodef-ul-title-content\"><a href=\"#do-not-use-personal-devices-for-work\">Do Not Use Personal Devices for Work<\/a><\/span>        <\/div>\n            <\/li>\n<\/ul>[vc_empty_space height=&#8221;5px&#8221;]<ul class=\"qodef-unordered-list-item qodef-toc\">\n    <li>\n\t        <div class=\"qodef-ul-title-holder\">\n            <span class=\"qodef-ul-title-content\"><a href=\"#protect-your-home-wi-fi\">Protect Your Home Wi-Fi<\/a><\/span>        <\/div>\n            <\/li>\n<\/ul>[vc_empty_space height=&#8221;5px&#8221;]<ul class=\"qodef-unordered-list-item qodef-toc\">\n    <li>\n\t        <div class=\"qodef-ul-title-holder\">\n            <span class=\"qodef-ul-title-content\"><a href=\"#keep-your-work-devices-safe-from-family\">Keep Your Work Devices Safe From Family<\/a><\/span>        <\/div>\n            <\/li>\n<\/ul>[vc_empty_space height=&#8221;5px&#8221;]<ul class=\"qodef-unordered-list-item qodef-toc\">\n    <li>\n\t        <div class=\"qodef-ul-title-holder\">\n            <span class=\"qodef-ul-title-content\"><a href=\"#use-strong-passwords\">Use Strong Passwords<\/a><\/span>        <\/div>\n            <\/li>\n<\/ul>[vc_empty_space height=&#8221;5px&#8221;]<ul class=\"qodef-unordered-list-item qodef-toc\">\n    <li>\n\t        <div class=\"qodef-ul-title-holder\">\n            <span class=\"qodef-ul-title-content\"><a href=\"#implement-two-factor-authentication\">Implement Two-Factor Authentication<\/a><\/span>        <\/div>\n            <\/li>\n<\/ul>[vc_empty_space height=&#8221;5px&#8221;]<ul class=\"qodef-unordered-list-item qodef-toc\">\n    <li>\n\t        <div class=\"qodef-ul-title-holder\">\n            <span class=\"qodef-ul-title-content\"><a href=\"#mind-your-webcam\">Mind Your Webcam<\/a><\/span>        <\/div>\n            <\/li>\n<\/ul>[vc_empty_space height=&#8221;5px&#8221;]<ul class=\"qodef-unordered-list-item qodef-toc\">\n    <li>\n\t        <div class=\"qodef-ul-title-holder\">\n            <span class=\"qodef-ul-title-content\"><a href=\"#keep-your-video-conferences-safe\">Keep Your Video Conferences Safe<\/a><\/span>        <\/div>\n            <\/li>\n<\/ul>[vc_empty_space height=&#8221;5px&#8221;]<ul class=\"qodef-unordered-list-item qodef-toc\">\n    <li>\n\t        <div class=\"qodef-ul-title-holder\">\n            <span class=\"qodef-ul-title-content\"><a href=\"#use-a-vpn\">Use a VPN<\/a><\/span>        <\/div>\n            <\/li>\n<\/ul>[vc_empty_space height=&#8221;5px&#8221;]<ul class=\"qodef-unordered-list-item qodef-toc\">\n    <li>\n\t        <div class=\"qodef-ul-title-holder\">\n            <span class=\"qodef-ul-title-content\"><a href=\"#use-secure-browser\">Use a Secure Browser<\/a><\/span>        <\/div>\n            <\/li>\n<\/ul>[vc_empty_space height=&#8221;5px&#8221;]<ul class=\"qodef-unordered-list-item qodef-toc\">\n    <li>\n\t        <div class=\"qodef-ul-title-holder\">\n            <span class=\"qodef-ul-title-content\"><a href=\"#use-antivirus-and-other-security-software\">Use Antivirus And Other Security Software<\/a><\/span>        <\/div>\n            <\/li>\n<\/ul>[vc_empty_space height=&#8221;5px&#8221;]<ul class=\"qodef-unordered-list-item qodef-toc\">\n    <li>\n\t        <div class=\"qodef-ul-title-holder\">\n            <span class=\"qodef-ul-title-content\"><a href=\"#centralize-your-data-storage\">Centralize Your Data Storage<\/a><\/span>        <\/div>\n            <\/li>\n<\/ul>[vc_empty_space height=&#8221;5px&#8221;]<ul class=\"qodef-unordered-list-item qodef-toc\">\n    <li>\n\t        <div class=\"qodef-ul-title-holder\">\n            <span class=\"qodef-ul-title-content\"><a href=\"#safeguard-your-banking-data\">Safeguard Your Banking Data<\/a><\/span>        <\/div>\n            <\/li>\n<\/ul>[vc_empty_space height=&#8221;5px&#8221;]<ul class=\"qodef-unordered-list-item qodef-toc\">\n    <li>\n\t        <div class=\"qodef-ul-title-holder\">\n            <span class=\"qodef-ul-title-content\"><a href=\"#update-everything\">Update Everything<\/a><\/span>        <\/div>\n            <\/li>\n<\/ul>[vc_empty_space height=&#8221;5px&#8221;]<ul class=\"qodef-unordered-list-item qodef-toc\">\n    <li>\n\t        <div class=\"qodef-ul-title-holder\">\n            <span class=\"qodef-ul-title-content\"><a href=\"#have-a-clear-security-policy\">Have a Clear Security Policy<\/a><\/span>        <\/div>\n            <\/li>\n<\/ul>[vc_empty_space height=&#8221;80px&#8221;][vc_widget_sidebar sidebar_id=&#8221;new-top-picks-banner&#8221;][vc_empty_space height=&#8221;80px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2 class=\"qodef-h4\"><a id=\"do-not-use-personal-devices-for-work\"><\/a>Do Not Use Personal Devices for Work<\/h2>\n<p>[\/vc_column_text][vc_column_text]Whenever possible, <strong>use a separate device<\/strong> or have your employer provide you with a dedicated work device set up in compliance with your employer\u2019s security standards. If you have a separate work device, only install software you need for your work on it.[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][vc_column_text]If that is not a possibility, avoid suspicious emails, links, and websites, and take extra care when installing any new software on a device you use for work.<br \/>\n[\/vc_column_text][vc_empty_space height=&#8221;68px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2 class=\"qodef-h4\"><a id=\"protect-your-home-wi-fi\"><\/a>Protect Your Home Wi-Fi<\/h2>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;21px&#8221;]<div class=\"qodef-single-image-holder    \">\n    <div class=\"qodef-si-inner\" >\n                                    <img loading=\"lazy\" decoding=\"async\" width=\"969\" height=\"553\" src=\"https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Protect-Your-Home-Wi-Fi.jpg\" class=\"attachment-full size-full\" alt=\"Protect Your Home Wi-Fi\" srcset=\"https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Protect-Your-Home-Wi-Fi.jpg 969w, https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Protect-Your-Home-Wi-Fi-300x171.jpg 300w, https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Protect-Your-Home-Wi-Fi-768x438.jpg 768w, https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Protect-Your-Home-Wi-Fi-620x354.jpg 620w\" sizes=\"auto, (max-width: 969px) 100vw, 969px\" \/>                        <\/div>\n<\/div>[vc_empty_space height=&#8221;38px&#8221;][vc_column_text]Ease of access is generally a good thing, but you don\u2019t want people and devices you don\u2019t trust accessing your wi-fi network. Fortunately, there are several easy ways to <strong>make your home network more secure.<\/strong>[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][vc_column_text]First, you should <strong>never rely on default SSIDs and passwords<\/strong>. Your SSID is the name of your wireless network. You can call it whatever you like, but you ought to avoid using your personal data (name or address). This way, you make it difficult for an uninvited person to identify it. You should also change your password from the default one.[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][vc_column_text]Both your SSID and your password settings can, most times, be accessed from your home address. Simply enter 192.168.1.1 into your browser and hit enter. If your router doesn\u2019t use that address, find your router\u2019s IP address using your operating system\u2019s settings. It will be under <em>Ethernet <\/em>or <em>Wi-Fi,<\/em> and likely labeled <em>Default Gateway<\/em>. You can also set up encryption for your connection \u2013 use WPA2 if available. Additionally, you may be able to allow only certain devices to connect to your network.[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][vc_column_text]All <strong>wi-fi settings can vary to a degree<\/strong> depending on multiple factors, including hardware and software used. Consult the user manual for your router or your ISP in case you stumble into difficulties.[\/vc_column_text][vc_empty_space height=&#8221;68px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2 class=\"qodef-h4\"><a id=\"keep-your-work-devices-safe-from-family\"><\/a>Keep Your Work Devices Safe From Family<\/h2>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;21px&#8221;]<div class=\"qodef-single-image-holder    \">\n    <div class=\"qodef-si-inner\" >\n                                    <img loading=\"lazy\" decoding=\"async\" width=\"969\" height=\"554\" src=\"https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Keep-Your-Work-Devices-Safe-From-Your-Family.jpg\" class=\"attachment-full size-full\" alt=\"Keep Your Work Devices Safe From Family\" srcset=\"https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Keep-Your-Work-Devices-Safe-From-Your-Family.jpg 969w, https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Keep-Your-Work-Devices-Safe-From-Your-Family-300x172.jpg 300w, https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Keep-Your-Work-Devices-Safe-From-Your-Family-768x439.jpg 768w, https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Keep-Your-Work-Devices-Safe-From-Your-Family-620x354.jpg 620w\" sizes=\"auto, (max-width: 969px) 100vw, 969px\" \/>                        <\/div>\n<\/div>[vc_empty_space height=&#8221;38px&#8221;][vc_column_text]If you are not living alone,<strong> your workplace is also somebody else\u2019s home<\/strong>. And while you and your colleagues know not to interfere with somebody else\u2019s work, your families, especially if you have young children, might not share the same professional frame of mind.[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][vc_column_text]It is therefore important to <strong>keep your work devices,<\/strong> be they desktop computers, laptops, tablets, mobile phones, or indeed any other hardware, <strong>safe from interfering family members or other members of your household<\/strong>. And while it is often not possible to prevent your family members from physically handling your work devices (e. g. keeping them under lock and key), you can \u2013 and most definitely should \u2013 protect them with passwords so as to avoid them accessing your work data.[\/vc_column_text][vc_empty_space height=&#8221;68px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2 class=\"qodef-h4\"><a id=\"use-strong-passwords\"><\/a>Use Strong Passwords<\/h2>\n<p>[\/vc_column_text][vc_column_text]We have mentioned password protection before, and we will again. Take note, though, that simply using a password is only part of the story: what you really need to do is <strong>use a <em>strong<\/em> password<\/strong>. That means avoiding relating it to anything familiar, such as names, addresses, dates, dictionary words, and the like.[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][vc_column_text]Many software solutions, including most <a href=\"https:\/\/qodeinteractive.com\/magazine\/best-password-manager-tools\/\">password managers<\/a>, offer the means of testing the strength of a password, generating strong passwords automatically, and storing passwords securely. Never use a weak password for anything, let alone anything important.[\/vc_column_text][vc_empty_space height=&#8221;68px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2 class=\"qodef-h4\"><a id=\"implement-two-factor-authentication\"><\/a>Implement Two-Factor Authentication<\/h2>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;21px&#8221;]<div class=\"qodef-single-image-holder    \">\n    <div class=\"qodef-si-inner\" >\n                                    <img loading=\"lazy\" decoding=\"async\" width=\"969\" height=\"554\" src=\"https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Implement-Two-Factor-Authentication.jpg\" class=\"attachment-full size-full\" alt=\"Implement Two-Factor Authentication\" srcset=\"https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Implement-Two-Factor-Authentication.jpg 969w, https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Implement-Two-Factor-Authentication-300x172.jpg 300w, https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Implement-Two-Factor-Authentication-768x439.jpg 768w, https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Implement-Two-Factor-Authentication-620x354.jpg 620w\" sizes=\"auto, (max-width: 969px) 100vw, 969px\" \/>                        <\/div>\n<\/div>[vc_empty_space height=&#8221;38px&#8221;][vc_column_text]Two-factor authentication means that, even if your password is compromised, <strong>a malicious hacker will not be able to access your account<\/strong> without providing additional proof of identity. There are plenty of ways to <a href=\"https:\/\/qodeinteractive.com\/magazine\/wordpress-two-factor-authentication\/\">implement two-factor authentication<\/a>, and many of the solutions available are free and easy to use.[\/vc_column_text][vc_empty_space height=&#8221;68px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2 class=\"qodef-h4\"><a id=\"mind-your-webcam\"><\/a>Mind Your Webcam<\/h2>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;21px&#8221;]<div class=\"qodef-single-image-holder    \">\n    <div class=\"qodef-si-inner\" >\n                                    <img loading=\"lazy\" decoding=\"async\" width=\"969\" height=\"554\" src=\"https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Mind-Your-Webcam.jpg\" class=\"attachment-full size-full\" alt=\"Mind Your Webcam\" srcset=\"https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Mind-Your-Webcam.jpg 969w, https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Mind-Your-Webcam-300x172.jpg 300w, https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Mind-Your-Webcam-768x439.jpg 768w, https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Mind-Your-Webcam-620x354.jpg 620w\" sizes=\"auto, (max-width: 969px) 100vw, 969px\" \/>                        <\/div>\n<\/div>[vc_empty_space height=&#8221;38px&#8221;][vc_column_text]Your webcam is a window into your home which can be remotely accessed. An unscrupulous hacker can gain visual access to your workspace, and possibly read important documents or gain other insights into your work data.<br \/>\n[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][vc_column_text]If you are using a plug-in webcam, <strong>unplug it when not on a conference call<\/strong>. If you are using a laptop device, <strong>cover the webcam when you don\u2019t need it<\/strong>. You could buy a sliding cover or have your employer provide you with one, or you could use something as simple as a post-it \u2013 the important thing is to stay protected.[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][vc_column_text]When you do need to use your webcam, note that many video conferencing applications offer functionalities for blurring your background or replacing it with a virtual one. You may be storing sensitive work or personal data on a normally safe shelf in your workspace, only to make it accessible to strangers with access to your webcam.<br \/>\n[\/vc_column_text][vc_empty_space height=&#8221;68px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2 class=\"qodef-h4\"><a id=\"keep-your-video-conferences-safe\"><\/a>Keep Your Video Conferences Safe<\/h2>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;21px&#8221;]<div class=\"qodef-single-image-holder    \">\n    <div class=\"qodef-si-inner\" >\n                                    <img loading=\"lazy\" decoding=\"async\" width=\"969\" height=\"554\" src=\"https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Keep-Your-Video-Conferences-Safe.jpg\" class=\"attachment-full size-full\" alt=\"Keep Your Video Conferences Safe\" srcset=\"https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Keep-Your-Video-Conferences-Safe.jpg 969w, https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Keep-Your-Video-Conferences-Safe-300x172.jpg 300w, https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Keep-Your-Video-Conferences-Safe-768x439.jpg 768w, https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Keep-Your-Video-Conferences-Safe-620x354.jpg 620w\" sizes=\"auto, (max-width: 969px) 100vw, 969px\" \/>                        <\/div>\n<\/div>[vc_empty_space height=&#8221;38px&#8221;][vc_column_text]While we\u2019re at it,<strong> be mindful of the security features your video conferencing tools have<\/strong> available. You may have heard of Zoom bombing, a form of online harassment where an uninvited user accesses a video conference and acts in a rude or intimidating manner towards the participants. While Zoom may have given the phenomenon a name, the behaviour is certainly not platform-dependent.[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][vc_column_text]But Zoom bombing is not just about harassment \u2013 an uninvited user may gain access to sensitive business data or even personal data, just the same as if they were hacking your webcam. To avoid that, make sure your conferences are private: set up a password or a waiting room for each meeting.[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][vc_column_text]Security should also be a concern when shopping for conferencing software. If you are responsible for software acquisition, take a long, hard look at the <strong>security and encryption features.<\/strong>[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][vc_column_text]Finally, whichever software you end up using, use the very latest version. Out of date software is a liability, and newer versions will likely have repaired known vulnerabilities.<br \/>\n[\/vc_column_text][vc_empty_space height=&#8221;68px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2 class=\"qodef-h4\"><a id=\"use-a-vpn\"><\/a>Use a VPN<\/h2>\n<p>[\/vc_column_text][vc_column_text]VPNs, or virtual private networks, add another layer of security to your device. We won\u2019t go into the technical details of how VPNs work, but suffice it to say that they <strong>create an encrypted connection between your device and the server<\/strong> it is accessing, using an intermediary secure server.[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][vc_column_text]Find a <a href=\"https:\/\/qodeinteractive.com\/magazine\/best-vpn-services\/\">VPN which suits your needs<\/a> and keep your work and personal data even more secure, and your connection safe from ISP throttling.[\/vc_column_text][vc_empty_space height=&#8221;68px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2 class=\"qodef-h4\"><a id=\"use-secure-browser\"><\/a>Use a Secure Browser<\/h2>\n<p>[\/vc_column_text][vc_column_text]Most browsers track and log your activities, from search history to cookies, and use your personal data to personalize their services. If you are working with sensitive data, however, you might want to<strong><a href=\"https:\/\/clario.co\/blog\/how-to-stop-my-phone-from-being-tracked\/\" target=\"_blank\" rel=\"noopener\"> avoid any tracking<\/a>,<\/strong> and to <strong>make sure your data is safe from a security breach<\/strong> on part of the browser developer.[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][vc_column_text]To do that, use a browser which disables fingerprinting, tracking, and redirects, and possibly has other security features \u2013 in other words, use <a href=\"https:\/\/qodeinteractive.com\/magazine\/most-secure-browsers\/\">a secure browser<\/a>.[\/vc_column_text][vc_empty_space height=&#8221;68px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2 class=\"qodef-h4\"><a id=\"use-antivirus-and-other-security-software\"><\/a>Use Antivirus And Other Security Software<\/h2>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;21px&#8221;]<div class=\"qodef-single-image-holder    \">\n    <div class=\"qodef-si-inner\" >\n                                    <img loading=\"lazy\" decoding=\"async\" width=\"969\" height=\"554\" src=\"https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Use-Antivirus-And-Other-Security-Software.jpg\" class=\"attachment-full size-full\" alt=\"Use Antivirus And Other Security Software\" srcset=\"https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Use-Antivirus-And-Other-Security-Software.jpg 969w, https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Use-Antivirus-And-Other-Security-Software-300x172.jpg 300w, https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Use-Antivirus-And-Other-Security-Software-768x439.jpg 768w, https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Use-Antivirus-And-Other-Security-Software-620x354.jpg 620w\" sizes=\"auto, (max-width: 969px) 100vw, 969px\" \/>                        <\/div>\n<\/div>[vc_empty_space height=&#8221;38px&#8221;][vc_column_text]There is no such thing as a system entirely impervious to hacking. However, you can <strong>fortify your device\u2019s security using an antivirus<\/strong> and\/or firewall software. Reach out to your employer for advice on security software and the settings you need to use in order not to disturb any remote access you need for your work.[\/vc_column_text][vc_empty_space height=&#8221;68px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2 class=\"qodef-h4\"><a id=\"centralize-your-data-storage\"><\/a>Centralize Your Data Storage<\/h2>\n<p>[\/vc_column_text][vc_column_text]Your employer likely uses cloud storage or a dedicated server protected by the best safeguards available. Avoid storing any sensitive data on your device, and always<strong> use your employer\u2019s centralized storage<\/strong>. This way, even if you lose a part of your locally stored data, you can safely restore it from your company\u2019s servers.[\/vc_column_text][vc_empty_space height=&#8221;68px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2 class=\"qodef-h4\"><a id=\"safeguard-your-banking-data\"><\/a>Safeguard Your Banking Data<\/h2>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;21px&#8221;]<div class=\"qodef-single-image-holder    \">\n    <div class=\"qodef-si-inner\" >\n                                    <img loading=\"lazy\" decoding=\"async\" width=\"969\" height=\"554\" src=\"https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Safeguard-Your-Banking-Data.jpg\" class=\"attachment-full size-full\" alt=\"Safeguard Your Banking Data\" srcset=\"https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Safeguard-Your-Banking-Data.jpg 969w, https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Safeguard-Your-Banking-Data-300x172.jpg 300w, https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Safeguard-Your-Banking-Data-768x439.jpg 768w, https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Safeguard-Your-Banking-Data-620x354.jpg 620w\" sizes=\"auto, (max-width: 969px) 100vw, 969px\" \/>                        <\/div>\n<\/div>[vc_empty_space height=&#8221;38px&#8221;][vc_column_text]If you are in any way responsible for your employer\u2019s business accounts, you probably know this already, but it bears reiterating: <strong>only use the software you know<\/strong>, and only use the latest version thereof.[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][vc_column_text]This includes banking apps, but also <a href=\"https:\/\/qodeinteractive.com\/magazine\/bookkeeping-services-for-online-businesses\/\">bookkeeping software<\/a> and <a href=\"https:\/\/qodeinteractive.com\/magazine\/best-payroll-software-tools\/\">payroll software<\/a>, and be extra careful about divulging any bank details, especially using any unsafe online spaces, such as social media and private messengers.[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][vc_column_text]Note that all manner of scammers can try to mimic your colleagues, clients, or superiors \u2013 better safe than sorry. Always ask for additional proof of identity when you are not sure a person contacting you is who they say they are.[\/vc_column_text][vc_empty_space height=&#8221;68px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2 class=\"qodef-h4\"><a id=\"update-everything\"><\/a>Update Everything<\/h2>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;21px&#8221;]<div class=\"qodef-single-image-holder    \">\n    <div class=\"qodef-si-inner\" >\n                                    <img loading=\"lazy\" decoding=\"async\" width=\"969\" height=\"554\" src=\"https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Update-Everything.jpg\" class=\"attachment-full size-full\" alt=\"Update Everything\" srcset=\"https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Update-Everything.jpg 969w, https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Update-Everything-300x172.jpg 300w, https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Update-Everything-768x439.jpg 768w, https:\/\/qodeinteractive.com\/magazine\/wp-content\/uploads\/2022\/01\/Update-Everything-620x354.jpg 620w\" sizes=\"auto, (max-width: 969px) 100vw, 969px\" \/>                        <\/div>\n<\/div>[vc_empty_space height=&#8221;38px&#8221;][vc_column_text]As we\u2019ve mentioned above, <strong>out of date software is a vulnerability<\/strong>. And that includes your operating system and any other software you may be using for work.[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][vc_column_text]An operating system will likely have an automatic update mode available \u2013 you should make use of that. Operating systems developers, just like any other developers, tend to <strong>fix any known vulnerabilities in their updates<\/strong>. They also have their own security tools. If you don\u2019t have to approve of each update manually, you will get them as soon as they are available.[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][vc_column_text]The same goes for your video conferencing software, and any other messaging software you use for work. The more up to date your software is, the safer your data are.[\/vc_column_text][vc_empty_space height=&#8221;68px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2 class=\"qodef-h4\"><a id=\"have-a-clear-security-policy\"><\/a>Have a Clear Security Policy<\/h2>\n<p>[\/vc_column_text][vc_column_text]If you are responsible for security with your employer, <strong>make sure all your company staff are aware of the risks<\/strong> they are taking when working from home. Formulate and communicate a clear work from home security policy, and make sure the staff stick to it.[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][vc_column_text]A good policy should include most of the steps described above, but <strong>concentrate on communicating it simply and clearly:<\/strong> in a large company, consider job- or department-specific policy documents and checklists. Device security, network security, well-selected up-to-date software, regular backups, and overall avoidance of oversharing may save you precious time, money, and data.[\/vc_column_text][vc_empty_space height=&#8221;68px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2 class=\"qodef-h4\">In Conclusion<\/h2>\n<p>[\/vc_column_text][vc_column_text]Working from home was becoming a trend even before the recent upsets in workplace culture, and internet security has been a thing since there was an internet. Most of the above is commonsense advice, but don\u2019t be fooled into thinking it is not important. Best practices are almost invariably rewarded.<br \/>\n[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Work from home has its good sides, but raises previously nonexistant security concerns. Keep safe with these handy tips.<\/p>\n","protected":false},"author":16990,"featured_media":33209,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[29,34,4],"class_list":["post-33199","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-resources","tag-business","tag-security","tag-tips"],"_links":{"self":[{"href":"https:\/\/qodeinteractive.com\/magazine\/wp-json\/wp\/v2\/posts\/33199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/qodeinteractive.com\/magazine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/qodeinteractive.com\/magazine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/qodeinteractive.com\/magazine\/wp-json\/wp\/v2\/users\/16990"}],"replies":[{"embeddable":true,"href":"https:\/\/qodeinteractive.com\/magazine\/wp-json\/wp\/v2\/comments?post=33199"}],"version-history":[{"count":0,"href":"https:\/\/qodeinteractive.com\/magazine\/wp-json\/wp\/v2\/posts\/33199\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/qodeinteractive.com\/magazine\/wp-json\/wp\/v2\/media\/33209"}],"wp:attachment":[{"href":"https:\/\/qodeinteractive.com\/magazine\/wp-json\/wp\/v2\/media?parent=33199"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/qodeinteractive.com\/magazine\/wp-json\/wp\/v2\/categories?post=33199"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/qodeinteractive.com\/magazine\/wp-json\/wp\/v2\/tags?post=33199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}