CALL US 647-847-4660

Uzado's Blog

Everything you need to know about cybersecurity tools, news, and standards


Tips for Remote Workers

Happy relaxed young woman sitting in her kitchen with a laptop in front of her stretching her arms above her head and looking out of the window with a smileCovid-19 is forcing more companies to look at work-at-home policies in an attempt to keep office workers safe.  Just as it’s important to keep your health safe, it is also important that company assets are kept secure.  Here are some tips remote office workers can use to help keep their data secure.

Follow company security policies

This sounds like common sense, but sometimes workers don’t always know what the policies are. If you don’t know what the company policies are, make sure you ask. Take advantage of knowledge or training sessions, especially around social engineering and phishing scams. If your company policy does not allow external devices on corporate networks, be sure to follow it.  Not doing so can put your company’s network at risk for viruses and malware. Whether company policy allows user to use their own device or a company provided one, all devices should have business-grade security solutions installed on them and be controlled by the company IT department, if applicable.

Keep systems up to date

Most hardware and software manufactures put out systems updates on a regular basis.  These updates are designed to help make your systems run more securely.  Follow the advice of your IT department and run systems updates and patches when they are available.

Think over passwords and consider two-factor authentication

The National Institute of Standards and Technology (NIST) advises that people use passphrases. Instead of just using a short word, think of a phrase you would easily remember.   Even better than this is combining it with two-factor authentication.  “Two-factor authentication (also known as 2FA) is a type (subset) of multi-factor authentication. It is a method of confirming a user's claimed identity by utilizing a combination of two different factors: 1) something they know, 2) something they have, or 3) something they are.” As hacking tools to crack passwords become more sophisticated, two-factor or multi-factor methods of authentication will start to become the rule.

Want to learn more about Uzado’s managed security services?  Click below to see what Uzado can do for you!

Contact Uzado to learn about our managed services

SHARE THIS STORY | |

Search

Recent Posts

Subscribe to Email Updates