Archives - Work from Home Tips


Divvy up your online presence by compartmentalizing accounts

Don’t use the same email address to sign up for multiple accounts. If that email is compromised, so are all the accounts connected to it. Assign a different email address with a unique password to every type of action you take on the internet (i.e. social media, work, e-commerce, etc.)

Place a DNS filter on your home router to block menacing websites

The domain name system (DNS) can be used to protect your network from malware, spyware and other malicious threats. A DNS filter can actively block out websites that may contain a threat, spam or harmful content, like child pornography. Rather than returning an IP address as normal, the filter will deny the request and block […]

Be cautious with workplace chat services

With the large increase in the hybrid workplace, many chat Apps like Slack have become are hugely popular in today’s workplaces. However, they can log your conversations and may allow supervisors to view information without your knowledge. It’s best to use discretion or resort to other communications channels for non-work-related private matters.

Use email encryption if you send sensitive data

Most people think email is comparatively safe, but it’s an old set of protocols with many weaknesses. Think about using encrypted email for full protection – messages sent through these services are utterly unreadable by anyone without your key, although using it may take some getting used to.

Use your laptop’s screen lock feature when you leave your workstation

Whether you’re working in public or in the office, it’s important to secure your laptop when you leave it unattended. Many newer laptops contain a very practical screen lock tool. Much the same way a computer would automatically lock after a few minutes, this allows you to manually initiate the feature. While your device continues […]

Set user-specific restrictions on your business network

Not every employee needs access to every file. You can keep sensitive information safe by setting specific access permissions so that only authorized users can read certain documents. This reduces the risk that private information will be leaked, whether it be by someone on the inside or outside of the organization.