Archives - Hybrid Workplace


Use a VPN when working remotely

A Virtual Private Network (VPN) encrypts data on your device before sending it to a private server, helping you stay more anonymous online. Your IP address and location will become hidden from anything trying to trawl your data. This is a good habit for several reasons, but especially for logging into a shared professional network […]

Keep your home private during conference calls

If you work from home and need to join conference video calls for work, make sure you keep your private home protected by using background blur or wallpaper features. An iteration of these are included in most video call programs and apps, but if you come across one that doesn’t have an option to obscure […]

Wherever possible, plug in!

Whenever you can, hardwire your internet connection. If you’re using your computer or laptop at home, reduce the risk of wireless infiltration by turning off the Wi-Fi and plugging in directly to your router. While this might limit where you can set up your desk or home office situation, it could provide you with an […]

Give remote workers secure Wi-Fi access

Provide cellular Wi-Fi hotspots or tethering plans so remote workers can use portable Wi-Fi hotspots. These can be used instead of allowing connections through public Wi-Fi networks to help regulate access and increase connection security. Wi-Fi hotspots should be password and login protected so they’re only accessible to employees.

Create fail safes for employee devices

If you have a bring your own device (BYOD) policy at work, make full use of mobile device management (MDM) applications so you can remotely access, track and wipe the data from a device should it be lost or stolen. High end MDM will also allow you to set regular automated data backups to your […]

Use Google Analytics to track visitor locations

Your business website may be a convenient backdoor into your systems which hackers could exploit to gain access to sensitive information, or simply hijack your website and hold it to ransom. As hackers will often bounce through VPNs across the globe, you can use Google Analytics to monitor where traffic is coming from and flag […]