Work remote, work secure

With more people working remotely, it is important to stay vigilant and follow best practices to keep you and your organization cyber safe.

Working securely from home

Here are some of the best practices for keeping your devices, and networks cyber safe while working from home:

In addition to securing your home network, there are some important cyber hygiene practices you should utilize to work securely from home.

Mobile device security

Mobile devices, such as laptops, smartphones, tablets, portable hard drives and USB keys contain sensitive or personal information. These devices are portable and convenient to use. However, their portability also makes them a security risk.

A phone that is secure and protected

Here are some things you can do to use your mobile devices securely:

Protect your devices from loss or theft

Keep mobile devices secure. Do not leave them unattended in a vehicle.

Don’t store or transport high sensitivity information on mobile devices. If you must store or transport High Sensitivity information, ensure you have approval to do so, and the appropriate devices and security.

Protect your devices from malicious use

Avoid charging your phone on computers or devices that you do not control, such as hotel docking stations. Malicious software could be transferred when your device is connected.

Never connect an unknown storage device to your tablet or laptop. Any storage device that connects to a USB port could contain malware.

Use strong passwords

Protect your devices with strong passwords.

Set your device to lock automatically

A locked smartphone is less immediately useful to someone looking to access information.

Set permissions

Increase your security by limiting what information your smartphone collects and what it can do. Limit features that share your location and be aware of authorizing apps to access contacts, photos and files.

Use multi-factor authentication

Multi-factor authentication (MFA) is an enhanced form of security that requires two or more authentication factors to log into your account. A mobile phone with an authenticator app can be useful as “something you have” for providing a second authentication factor.

Use encryption

Use encryption when emailing or storing any sensitive information.

Get routine updates

Connect your devices to your work network regularly to ensure patches and updates are installed. Update your smartphone operating system and any applications (apps) when prompted.