Connect with us

Hi, what are you looking for?

Business

Perils of working from home: The cybersecurity dilemma

Be careful of what is in view if you take screen grabs or photos about your “cool” home office and video conference meetings, especially if you plan to post them on social media.

Laptop in a meeting room.
Image: © Tim Sandle
Image: © Tim Sandle

New data on ‘working from home’ cybersecurity indicates that more needs to be done in order to secure the home office.  As an example, 58 percent of U.S. citizens admits to downloading or installing non-company authorized software. While people may feel they are being productive and keeping work top of mind, they unknowingly are putting their employers at risk.

Looking at this trend, Unisys Chief Security and Infrastructure Officer Mat Newfield tells Digital Journal: “With cyberattacks constantly in the headlines, the average consumer is experiencing a level of ‘data breach fatigue.’ However, this puts businesses at risk.”

He adds that “Without proper network defenses, one click from an employee working from home opens up other access points to the network, which typically is made up of more than one cloud environment. This could put your company’s IP, assets and data at risk, which is why leaders need to re-think how and where they focus their attention.”

Newfield presents a set of consumer friendly ways to secure the work from home office, which are made available to readers. These are:

  • Use a separate Wi-Fi hot spot to access work systems when WFH. Separate the network you use to access work systems from the one the rest of your household uses (e.g., for playing games or remote schooling). If multiple people work from home, consider each having their own Wi-Fi hotspot for work.
  • Segregate the Wi-Fi you use to connect your smart devices (e.g., digital assistant, baby or pet monitor, smart TV, video doorbell, or temperature controls). Use the Guest Wi-Fi option on your router for your IoT devices (ask you telco provider how to set it up). This prevents those devices and apps being used to access your computer or connection to your employer’s systems.
  • Always lock your work device when you walk away from it. You might love and trust your family or housemates, but don’t provide the opportunity for them to accidently click on a malicious link or webpage when accessing their social media on your laptop or phone.
  • Be aware of who or what can hear your confidential conversations. Even if you are working on a separate Wi-Fi network, could a nearby smart speaker or digital assistant accidently be activated by your voice? Or can other people in your home hear your conversation? Especially as we tend to speak louder when wearing headphones. Find a quiet room for confidential conversations.
  • Be careful of what is in view if you take screen grabs or photos about your “cool” home office and video conference meetings, especially if you plan to post them on social media.
  • When sharing docs in online meetings, only share the specific doc or app – not your whole desktop, so that you don’t accidently broadcast other confidential material or messages.
  • Hide your Wi-Fi password from prying eyes – don’t stick it on the fridge or tape it to the modem where visitors and neighbours can easily find it.
  • Choose passwords that are hard to guess – and secure them even further by using a password management tool. That way your passwords are encrypted in a secure app so you don’t need to write them on post-it notes. For the passwords use a mix of upper and lower case, numbers and special characters. A good idea is to choose a phrase that you will remember and swap some letters for numbers or special characters. For mobile devices, secure the device and key applications such as online banking or payments, with your fingerprint or face scan.
  • Look out for Phishing and SMiShing scams – when an email or text message pretends to be from someone you trust to trick you to click on a link or provide personal details. If the message is from someone you don’t know, or the language seems out of character or has a suspicious sense of urgency, don’t reply or click on the link. If it is from someone you know contact them via another channel to verify if the message is legitimate – you might be the one to alert them they have been hacked. Common scams pretend to be from the tax office, courier companies or your email provider.
Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

Tech & Science

Middle-earth Enterprises & Friends will manage the intellectual property rights Embracer has for "The Lord of the Rings" and the "Tomb Raider" games -...

World

A Belgian man proved that he has auto-brewery syndrome (ABS), which causes carbohydrates in his stomach to be fermented, increasing ethanol levels in his...

World

Taiwan's eastern Hualien region was also the epicentre of a magnitude-7.4 quake in April 3, which caused landslides around the mountainous region - Copyright...

Business

Honda hopes to sell only zero-emission vehicles by 2040, with a goal of going carbon-neutral in its own operations by 2050 - Copyright AFP...