Don’t lull yourself into a false sense of security while working from home. Test your security savvy by seeing how many of these five steps you have in place in your home office.
Do you take time to discern cyberattack attempts over the phone and in email? Listen carefully to calls. Any sense of urgency, offers that are too good to be true, or requests for personal information could all be attempts to gain access to your accounts and data.
Learn how to recognize typical phishing attempts.
- Your Home Network
Your home wireless network could make you and your family vulnerable. Make sure you have a password set to access your home wireless and that you are not using the default administrator password. Check your internet provider’s online documentation on how to set a secure Wi-Fi password. Many home routers have had firmware updates to address security issues. How-to Geek’s site may provide information on updating your router.
- Use Strong Passwords
For any website or service that requires a password, create strong passwords, and don’t reuse the same password. Set up two-factor authentication when available. Your computer should be password-protected with a strong password that is required at start-up and login. Review OIT’s recommendations on creating strong passwords.
- Keep Your Device Software Up-to-Date
Perform the recommended updates to all of your devices, including mobile phones, home routers, security cameras, and of course, the computer you use to access UT resources. Only use supported and current operating systems to conduct UT business. (i.e. Windows 8 and up on PC’s / High Sierra and up on Macs). Don’t save things to your personal machine or on any shared media – use OneDrive instead.
- Children and Partners
Don’t allow your children to use your computer or other work devices. They could inadvertently delete important files. FERPA and HIPPA laws apply to all important data regardless of your location. Limit the downloading of games or other non-essential apps, which are often a source of infection/compromise and can lead to a FERPA or HIPAA violation. Review UT’s computing policies
Source: SANS Security Awareness: Top 5 Steps to Work Securely from Home