Settings
Language
Color Theme
Remote Working
Everyone enjoys the freedom that comes with having a remote workplace, but there's still the looming question. How can we remain secure while working remotely?
Is the following statement True or False:
Remote working is a type of flexible work arrangement where you do not need to work from an office.
Remote work, also called work from home, work from anywhere, telework, remote job, mobile work, and distance work, is an employment arrangement in which employees do not commute to a central place of work, such as an office building, warehouse, or retail store.
View Options Again
True
False
A secure remote workplace
Working remotely while ensuring you're not at an elevated risk of cyber threats can be a difficult challenge to overcome. To combat this, we recommend the following:
Choose a secure location
Protect your devices
Encrypt your traffic
Select a private, dedicated space in your home or remote workplace that is away from foot traffic and prying eyes. This could be a separate room, a private corner of a room or even just positioning your workstation in such a way that your back is to a wall.
Devices used for remote working need to be protected against both physical and internet-borne threats. Ensure you patch your systems regularly, keep your anti-virus up-to-date and where possible, keep separate devices for work and personal use.
Use a virtual private network (VPN) when connecting to the internet, especially if you're using public Wi-Fi networks or share your internet connection with others.
Which of the following is NOT a way to secure your remote workplace?
Using public Wi-Fi networks can expose our devices to cyber criminals who may try to intercept our traffic. To mitigate this, we can use a VPN to encrypt all network traffic from our device.
View Options Again
Protect your devices.
Encrypt your traffic.
Use public Wi-Fi networks.
Choose a secure location.
Remote Communication Best Practices
Use messaging services that offer end-to-end encryption. When video-conferencing, ensure all participants are authenticated. Use collaboration tools that provide a means to securely transfer files. Use consistent communication methods with colleagues.
Is the following statement True or False:
Wherever possible, we should use a consistent and secure method of communication with colleagues.
When working remotely, maintaining secure and consistent communication is that much more important. We become almost entirely dependent on communicating with colleagues through messaging, phone or video-conferencing services.
View Options Again
True
False
Work Travel Best Practices
Encrypt your internet connection with a VPN. Avoid using public Wi-Fi networks but if you do, avoid entering any sensitive information unless connected to a VPN. Finally, be aware of your surroundings, you may have a shoulder-surfer close-by!
Is the following statement True or False:
Using public Wi-Fi networks is ok, even if I don't encrypt my traffic with a VPN.
Using public Wi-Fi networks should only be a last resort. When we connect to these, we're exposing our devices to whoever else is on the network or controls it. Our traffic can potentially be intercepted, and our device could also be attacked if we don't have it patched. Always use a VPN when on public Wi-Fi networks.
View Options Again
True
False
Data Protection Best Practices
Using the local storage on our devices is tempting, but what if that device is stolen, lost, or otherwise inaccessible? To mitigate this, store work data on a work-approved network or cloud-accessible storage in the event we need to restore from it.
Mobile Device Best Practices
Mobile phones have become a critical part of the modern work environment. If they're hacked, it's often just as bad as your laptop or computer getting compromised! To mitigate this, we should:
Screen Lock
Patching Regularly
Data Backups
Make sure all your mobile devices have the screen lock feature turned on and that they require a strong password or PIN to gain entry. At a minimum, use Face ID or Touch ID to manage the unlocking process.
Our phones need to be patched just as often as our laptops and computers. Regardless of whether you're using Android or iOS, the respective vendors release security patches on a near-monthly basis. Don't forget to update your apps as well! They are often overlooked but may have security vulnerabilities that need fixing.
Phones often hold sensitive information that businesses need to function, however they are also often lost, stolen or damaged. To mitigate against this, wherever possible, backup your contacts and data to secure work-approved network or cloud storage. In your phone becomes inaccessible, you'll be able to recover quickly!
Which of the following is NOT a best practice for securing mobile devices?
Cyber criminals often abuse the app stores offered by Google and Apple to trick users into installing spyware and other forms of malicious software. Always apply critical thinking when downloading an app from the app store, and avoid installing apps from unknown software vendors. Using a screen lock, patching regularly, and setting up data backups
View Options Again
Using a screen lock.
Patching regularly.
Installing unknown software from the app store.
Setting up data backups.
Wrapping up
Remote working has seen a sudden surge in popularity over the past few years. We each need to do our part to ensure we can work remotely while remaining productive and secure. If you suspect something is off, always err on the side of caution!
Back
Next
Color Theme And Background Selector
×
Colorful Theme
Select Theme
Blue Theme
Select Theme
Light Theme
Select Theme
Purple Theme
Select Theme
Green Theme
Select Theme
Dark Theme
Select Theme