Working from Home Cybersecurity Checklist

Comments are off
1
Avatar
Working from Home Cybersecurity Checklist

Due to the recent pandemic, most of us are now working from home, many of us for the first time. By now, you’re likely adjusted to the best ways to work from home, but what about security? One question many companies are asking now, is:

 

Is it secure to work from home?

Working from home is very different from working from the office, you have different safety protocols, different firewalls and WiFi, and in some cases, shared internet. That’s why we here at Calibre One put together a Work From Home Cybersecurity Checklist!

 

If you’re using company laptops

There are different risks in using your company-provided laptop when you’re at home vs when you’re in the office.

When using a company provided computer while at home follow the next security practices:

  • Never trust an unknown USB: do not plug untrusted USB into the computer as it may contain malware and spread across company services.
  • Antivirus: corporate computers have antivirus which are automatically updated once connected to internet.
  • Make sure your device is locked if you walk away.
  • Never leave your device close to an unlocked window
  • Do not write your password anywhere. If it is difficult to remember, use a sentence or phrase.
  • If you leave home, lock the device away at all times.

 

If you’re using your own device to work from home

Of course, there are also risks if you’re using your own device to work from home. These are a little different, so make sure to pay attention.

If you have to use your own device to connect to the corporate network, please follow the next security practices:

  • Ensure you have an antivirus installed and fully updated
  • Check that your operating system (i.e. Microsoft Windows) has all security updates installed
  • If you are connected to the company, make sure your screen is locked down when walking away.
  • Do not copy files into your computer from the company network, as they may be intercepted or compromised before saving them back to the network.

Regardless of the device you use, always remember:

  • Check email headers to see if the sender’s display name and their email match
  • Be cautious about clicking links, opening attachments or putting information into pop-up dialog boxes.
  • Report suspicious emails, this helps your email server provider know who to block so future suspicious emails can’t get to your inbox.
  • Always practice good Cyber Hygiene.

 

Need Additional Cybersecurity Help?

Now it’s more important than ever to invest in your cybersecurity. Hackers will take any opportunity at security vulnerabilities, and having your employees all displaced on separate networks can be a big vulnerability.

That’s why we recommend Security Awareness Training. During this training, we will work with your staff to provide security seminars that are tailored to your businesses.

 

Learn more about security awareness training here, and give your staff and company a fighting chance.