Archives - Work from home


Use encryption on BYODs

Working at home on personal devices (Bring Your Own Devices) and self-managed Wi-Fi networks present a massive security risk to you and your employer. To protect potentially sensitive information, enable Windows and macOS native encryption functionality and save encryption passwords.

Lockdown your router

When you connect a computer to the internet, it’s also connected to millions of other computers—a connection that could allow attackers access to your computer. Although cable modems, digital subscriber lines (DSLs), and internet service providers (ISPs) have some level of security monitoring, it’s crucial to secure your router—the first securable device that receives information […]

Use role-based access

Remote work and the IoT mean users and devices are everywhere and may not have the best security at all times. By assigning roles to users and devices (family members, roommates, individual devices, etc.), and limiting access based on these roles, you can minimize the number of SSIDs in use and differentiate between approved and […]

Maximize your window or app when screen sharing

If you’re sharing your laptop’s screen on a Zoom, Webex or Google Meet call, consider maximizing the window or app so that other participants can’t see what’s on your desktop. Also make sure to close out any unnecessary tabs that could be glimpsed during the session.

Watch out for phishing emails related to Microsoft Teams

As part of Office 365, Teams is a widely used collaboration tool. Its popularity has made it a common vector for phishing attacks. Look out for strange emails saying you’ve missed a message in Teams and containing embedded links for replying within Teams. If you’re unsure about whether you have important messages to read, open […]

Check recent activity on your Outlook.com account

Worried that someone might have accessed your Outlook.com email account? It’s easy to see where and when you (or anyone else) signed into it. Simply use the official Activity page to view all recent successful logins, plus any security challenges (such as asking for another authentication factor) for your account.