centristic
  • Solutions
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Data Protection & Privacy
    • Cyber & Information Security
    • Attack Simulation
    • Office 365 & Azure Security
  • Services
    • Attack Simulation
    • Cyber & Information Security
    • Data Protection & Privacy
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Office 365 & Azure Security
  • Support
    • Contact Us
    • Customer Portal
  • Company
+1 (954) 488-2643
  • Solutions
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Data Protection & Privacy
    • Cyber & Information Security
    • Attack Simulation
    • Office 365 & Azure Security
  • Services
    • Attack Simulation
    • Cyber & Information Security
    • Data Protection & Privacy
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Office 365 & Azure Security
  • Support
    • Contact Us
    • Customer Portal
  • Company
centristic
  • Solutions
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Data Protection & Privacy
    • Cyber & Information Security
    • Attack Simulation
    • Office 365 & Azure Security
  • Services
    • Attack Simulation
    • Cyber & Information Security
    • Data Protection & Privacy
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Office 365 & Azure Security
  • Support
    • Contact Us
    • Customer Portal
  • Company
Blog
Home NEWS Avoid Looking Like an Idiot When Working From Home
NEWSTips and Tricks

Avoid Looking Like an Idiot When Working From Home

Mary Kemper Mary Kemper May 25, 2020 0 Comments
Businesswoman covers her eyes

Working from home can be challenging.
Here are 9 tips that will help you avoid looking like an idiot while working from home.

1. Make sure your work devices are physically secure.

Obviously, you wouldn’t think of leaving your company equipment in your car overnight but what about protecting it from being damaged by dropping it off your desk or spilling coffee on it. Look now to make sure your devices are physically secure, and your work area is free from spills and accidents that will ruin your day.

2. When you leave your computer or work phone for any amount of time, lock your screen!

secure

Have you heard about the cat that sent a message to the boss of the cat owner? Kids and cats can get you in trouble and possibly even cause your boss to question how responsible you are with the company’s data and devices.

3. Think twice about every e-mail request and how you may respond.

Only a fool would fall for the one from the Syrian prince that asks for help with a simple wire transfer. But what about a request from your boss for Apple gift cards or an emergency wire transfer request from the CEO, especially when it appears to come from their e-mail with their own e-mail signature. If it involves money, then call them about it – and use the phone number you have in your own address book and not the one in their e-mail signature. 😉

4. When joining online meetings be mindful of your surroundings.

Check what’s in your background, everyone else in the meeting is. Let everyone at home know it is meeting time and they need to steer clear and be quiet. Shut the door and even put up a sign is certainly not a bad idea.

5. Make sure your computer and work phone are password protected.

Use a very strong password. Avoid being the coworker whose personal e-mail gets hacked and then their bank accounts, work accounts, and so on. It is your responsibility to use cryptic passwords for all banks, email, and work accounts. Ask your IT department for help with how to best use good passwords.

6. No IT department, no problem.

bad employee

Use a password manager like LastPass to keep track of your passwords. This type of trusted software will help you maintain complex passwords for all the online services you use. Most password managers cost less than a dollar a month and can save you thousands if ever someone was able to get access to one of your accounts

7. If you are working from your personal computer, make a separate profile just for work.

Do not use your personal profile on your computer for work. This protects you and your company’s data. And certainly, never let anyone in your family use the same profile as the one you use for work. Remember the cat?

8. Do not use work devices for personal activities.

Even the most basic security solutions that companies use to monitor activities on company computers and mobile devices. Unless you want your boss to know every detail of your personal computing life, do you?

9. Apply updates and patches to all your devices.

Most patches are for security-related issues. Many of them very seriously. Ask your IT department for guidance on taking care of this on both your work and home computers and devices. But, don’t apply patches or upgrade the software to company devices without permission from your employer.

coronavirus covid-19 ransomware security work from home
74
895 Views
Mary Kemper
AboutMary Kemper
In Socials:
Ryuk Ransomware in the Age of COVID-19 CoronavirusPrevRyuk Ransomware in the Age of COVID-19 CoronavirusMay 13, 2020
Spot Fake Email Messages Like a ProMay 26, 2020Spot Fake Email Messages Like a ProNext

Related Posts

NEWSRansomwareTips and Tricks

Forget Me Not!

Remember your MySpace account? Or when your significant other wanted you to create a...

Roland Rodriguez Roland Rodriguez August 13, 2020
Email ScamsNEWSPhishing

BEC Scams are Back

A Business Email Compromise scam occurs when a fraudulent email is sent to a company...

Roland Rodriguez Roland Rodriguez September 2, 2020

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts
  • Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability
  • Cybersecurity Threat Advisory: BlackMatter Ransomware
  • CISA Launches Campaign to Reduce the Risk of Ransomware – Centristic Launches Campaign to Eliminate the Risk
  • 9 Cybersecurity Tips to Keep Your Device and Data Safe
  • Home Office Security – Never Too Late to Evaluate
Subscribe to our blog
We have lots of stuff for you to read.
Categories
  • Data Breach
  • tipsEmail Scams
  • HIPAA
  • newsNEWS
  • tipsPhishing
  • phishRansomware
  • Security
  • Tips and Tricks
  • Uncategorized
Most Viewed Posts
Search our Site

Centristic delivers the industry’s most complete IT security and secured solutions to small cap business. Whatever your IT security needs and goals, and wherever you’re starting,

Quick Links
  • Solutions
  • Services
  • Support
  • Company
  • Blog
Get In Touch

Adress:
5645 Coral Ridge Dr #230 Coral Springs, FL 33076-3124
Phone:
+1 (954) 488-2643
Business Hours:
Monday – Friday: 9am to 6pm
Saturday – Sunday: Closed

Copyright © 2020 Centristic. All Rights Reserved

Close