Data protection tips for work from home professionals

When the global pandemic forced millions to work from home, IT and security teams had to quickly find ways for employees to access the business network and data. While many turned to secure VPN access using company-issued laptops, many workers rely on home computers, smartphones and tablets.

Multiple endpoints put data at risk in any situation. And, long-term remote work makes security an even more significant challenge as it becomes more difficult to identify at-risk data and other security incidents.

Workers easily overlook security best practices during remote work, which increases the risk of data compromise and misuse. With families locked down together, an employee may share a laptop with a child for online classes. While a business-owned device should have security software, and up-to-date apps and operating systems, a personal device may not be as equally secure, leaving any personal data on the device vulnerable.

For example, many consumer-grade Wi-Fi routers sacrifice security for ease-of-use. Wireless routers with Wi-Fi Protected Setup (WPS) ship with an eight-digit pin for simple setup, but these routers with WPS are vulnerable to hacking.

Even VPNs can add risks to the data if the company relies on legacy systems that are complicated to deploy and, in turn, don’t provide a secure connection to business applications. If the VPN is too difficult for a worker to use, they will likely bypass it in exchange for productivity.

Bad Actors Exploit COVID-19

Cybercriminals know that remote work increases security risks, so it is not surprising that a global pandemic is a new attack vector. Phishing scams are on the rise, for example. Although awareness of phishing scams has improved, hackers prey on the fear surrounding the pandemic as click-bait to malicious ransomware or keyloggers. Or they create fake domains to mimic the World Health Organization, Centers for Disease Control and health department sites to take advantage of the high number of web searches for anything COVID-19 related. These websites steal credentials, credit card numbers and other personal information.

Additionally, malicious hackers capitalize through apps that promise details about COVID-19 spread, contact tracing or statistical information. Again, these apps exist to steal personal data.

Bad actors will not let an opportunity go by without exploitation. They know people are searching for information on unsecured devices where standard threat-warning mechanisms are delayed and the human user’s distress may lead to error and negligence.

Five Tips to Mitigate Risk

Because employees may be working from home for an extended period, business leaders need to develop remote work policies that go beyond attendance, social media usage, conduct, dress code and confidentiality to include strict data protection policies.

Below are five tips to help protect personal data and mitigate risk:

  1. Avoid unsecured networks – That means avoiding public Wi-Fi, using an upgraded company-provided VPN for all business tasks (including a tutorial and troubleshooting advice) and ensure home routers have a new, unique password.
  2. Restrict business data to business devices – Don’t backup company data to personal devices or personal clouds. Data proliferation due to multiple copies of the same data increases the risk of a data breach.
  3. Prevent unauthorized access –
    • Use secure authentication methods, including multi-factor authentication and strong password requirements. Do not share passwords or store them where others can see them.
    • Always lock your computer, and other business devices, when they are not in use.
    • Remain aware of your surroundings when working. You don’t want unauthorized family members, friends or the person at the next table at the coffee shop looking at your screen or eavesdropping on a phone conversation. Also, don’t let sensitive documents sit on the printer tray.
    • Don’t leave devices unattended in your vehicle, where they are vulnerable to theft.
  4. Ensure computer operating systems, software and devices are updated –  Make sure security software is installed, and up-to-date, on all devices.
  5. Remain aware of internet scams –  Scammers are increasingly sophisticated. It is essential to remain alert with telephone calls, emails, social networks and online. Do not open suspicious texts, emails, click on pop-up windows or open attachments from unknown senders.

Even as the world reopens, businesses are still developing strategies to bring workers back into the office safely, and many companies and employees may adopt a more permanent remote work setup. As long as there is remote work, there will be an increased risk of data breaches. Remote workers must remain cautious of suspicious requests, fake websites, malicious apps, and follow company policies to avoid unnecessary risks.

Rob Server has more than 20 years of IT development, management, and support experience across the education, communications, healthcare, services, and software industries. Rob joined Spirion in 2013 as a sales engineer, led the solution engineering team and now serves as Product Manager for Spirion’s two products, Sensitive Data Manager and Data Privacy Manager. Server holds a master’s, and bachelor’s, degree in management information systems from the University of South Florida Systems. For more on Spirion. 

You May Also Like

Is a DBA the new MBA? 

In the early 1900s, businesses were growing larger, and more complex, with more employees working in more varied divisions across more geographical boundaries. From this growth, demand for people who had training in managing business operations grew, which led to the creation, and demand, of the master of business administration degree. Today, knowledge is one

Where did the time go?

New Year’s Day … Martin Luther King Jr. Day … Valentine’s Day … Super Bowl … President’s Day … St. Patrick’s Day … Passover … Easter … Kentucky Derby … Mother’s Day … Indy 500 … Memorial Day … Father’s Day (tick, tick, tick …).  If you’re like some of us, you’re wondering where has

What Twitter 2.0’s algorithm release means for your visibility

On March 31, Twitter open-sourced its algorithm. Elon Musk, chief executive officer of Twitter, delivered on his promise of transparency by being the first major social media platform to publish its engagement calculation formula. Whether you are or are not on Team Elon, you cannot deny his impact of changing the technological landscape of this

The etiquette of emotions in the workplace

Humans are a series of emotions, and habits. Our emotions can drive our commitment to well-serving habits and our habits can either quell, or enhance our emotional states in reaction, or response, to people and situations. What happens when emotions are presented at the office, on Zoom/Teams, or with clients, and colleagues in a way

Other Posts

How well do you know your buyer’s journey?

For sellers of professional goods, and services, in today’s competitive business environment, it’s important to understand your buyer’s journey before they make a purchasing decision.   We find that there are four steps that play out, predictably, regardless of industry or location.  Buyers start talking, internally, about what they think they need. They share experiences about

The etiquette of graceful tardiness  

While likely none of us want to be late, it happens. Kids, pets, traffic, distractions and more can keep us all from being on schedule and/or where we would like to be when we would like to be there. What to do? There’s no need to panic, lie or start rationalizing internally, or to others,

ChatGPT…a marketer’s friend or foe?  

We are halfway through the third year since COVID-19 became a reality, and the virus has proved to have a lasting impact on the work environment. Organizations are currently facing historic challenges: an exhausted workforce, a competitive talent landscape and pressure to control costs. Many businesses are being cost-conscious in their marketing and choosing to

The etiquette of 2023 video meetings 

  We have been Zoom-ing and Teams-ing for years and while the frequency of these video meetings may have subsided since the height of the pandemic, the format is here to stay.  People have “Zoom Room” fatigue and Teams Meeting “taxed-outed-ness.” So being intentional can keep the time to a minimum and maximize the technology