{"id":19633,"date":"2020-03-21T16:14:47","date_gmt":"2020-03-21T20:14:47","guid":{"rendered":"https:\/\/www.kaspersky.co.in\/blog\/remote-work-security\/19633\/"},"modified":"2024-01-05T16:37:21","modified_gmt":"2024-01-05T11:07:21","slug":"remote-work-security","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/remote-work-security\/19633\/","title":{"rendered":"Remote working safety and security"},"content":{"rendered":"<p>In recent months, <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/coronavirus\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">COVID-19<\/a> has taken over the world. Countries are closing borders, production lines are halting, and many employers are instructing employees to work from home. That makes sense: If companies are to continue functioning, and if your job is location-neutral, staying home reduces the likelihood of catching and transmitting the coronavirus while letting you continue doing your job.<\/p>\n<p>However, working in the office and working at home are two different kettles of fish (or indeed phish). And not only because the office has a working atmosphere, whereas at home you just want to lie on the couch and pet the dog.<\/p>\n<p>The real issue \u2014 at least for cybersecurity, if not productivity \u2014 is that in the office, companies thoroughly protect networks and devices. Meanwhile, unless you\u2019re the CEO, sysadmins are probably not going to come around to your apartment or house and set everything up in line with corporate standards. If a confidential document gets leaked from your home computer, the buck stops with you.<\/p>\n<p>Follow these ten simple tips when working remotely to avoid such a mishap.<\/p>\n<h2>1. Protect devices with an antivirus solution<\/h2>\n<p>Companies generally undertake a range of measures to protect computers from malware. They install powerful security solutions, prohibit employees from installing applications, restrict online access from unauthorized devices, and so on. At home, it is trickier to provide that level of protection, but leaving a computer vulnerable when work documents are stored there is also a no-no, because if they get stolen or destroyed, it\u2019ll be your neck on the chopping block.<\/p>\n<p>To prevent anything like that from happening, it is vital that you install a <a href=\"https:\/\/www.kaspersky.co.in\/advert\/security-cloud?icid=in_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____ksc___\" target=\"_blank\" rel=\"noopener\">reliable security solution<\/a> on all devices that handle corporate data. If money\u2019s too tight, install a free antivirus. Even one at no cost will significantly reduce the risk of getting infected \u2014 and landing in big trouble with the boss.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n<h2>2. Update programs and operating systems<\/h2>\n<p>New vulnerabilities are forever being found in applications and operating systems. And cybercriminals can\u2019t resist exploiting them to infiltrate other people\u2019s devices. Often, they rely on people being too lazy to update software, because in the latest versions of programs vulnerabilities are usually patched. So it\u2019s important to regularly update everything installed on any device that you use for work purposes.<\/p>\n<h2>3. Configure Wi-Fi encryption<\/h2>\n<p>Protecting the computer won\u2019t help if an attacker connects to your Wi-Fi or takes up residence inside your router. Anyone who does that can intercept everything you send or enter online, including passwords for remote access to an office-based computer or corporate mail. Therefore, it is imperative to configure your network connection correctly.<\/p>\n<p>First, make sure that the connection is encrypted to keep information safe from prying eyes. If your Wi-Fi asks anyone connecting to it for a password, the connection is encrypted (and Joe Blow will not be able to spy on your work). However, you have several Wi-Fi encryption standards, some of which are already outdated, to choose from. Your best bet is WPA2. You can use the router settings to select or change the type of encryption \u2014 and remember that your Wi-Fi password should be strong. Just in case, here\u2019s a <a href=\"https:\/\/www.kaspersky.com\/blog\/strong-password-day\/25519\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">post about how to create a strong password<\/a>.<\/p>\n<h2>4. Change your router login and password<\/h2>\n<p>If you have never changed the login and password required to enter the router settings, do so now. The default passwords for many models are not only too weak, but also known across the Internet and easily searchable.<\/p>\n<p>Attackers often simply write them into the code of malicious programs \u2014 if they work, the router is captured and <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/bot\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">turns into a bot<\/a>. Plus, the intruders can also spy on you, because everything that you send online passes through the router. Unsurprisingly, the place to change the router username and password is in the router settings.<\/p>\n<h2>5. Use a VPN in caf\u00e9s and coworking spaces<\/h2>\n<p>If you\u2019re unafraid of the coronavirus pandemic, and working in a cozy caf\u00e9 or coworking space near your home, then take extra care. <a href=\"https:\/\/www.kaspersky.com\/blog\/dangerous-public-wi-fi\/10774\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Public Wi-Fi networks<\/a> are often not encrypted at all, and even if they are, anyone can get hold of the password.<\/p>\n<p>To prevent rogue customers at the caf\u00e9 or coworking space from spying on you through the local Wi-Fi, use a virtual private network. When you\u2019re connected through a VPN, all of your data will be encrypted regardless of the network settings, and outsiders will not be able to read it.<\/p>\n<h2>6. Lock your device before walking away<\/h2>\n<p>Someone can catch a glimpse of your work correspondence even when you\u2019re just having a cup of tea or taking a bathroom break. Therefore, it\u2019s important to lock the screen whenever you get up. Consider the small hassle a tiny price to pay for keeping corporate secrets safe.<\/p>\n<p>Even if you\u2019re working at home and outsiders have no access to the room, it\u2019s still worth locking your device. You probably don\u2019t want your child to accidentally send your boss a smiley-laden text. Or your cat to walk across the keyboard and mail an unfinished message to the board of directors. If you\u2019re about to go somewhere else, lock the screen. And it should go without saying that your computer needs password-protection.<\/p>\n<h2>7. Use corporate services for e-mail, messaging, and all other work<\/h2>\n<p>Your company most likely has a set of IT services that employees use, such as Microsoft Office 365, a corporate messenger like Slack or HipChat, and at the very least corporate e-mail. Those tools are configured by your company\u2019s IT service, and IT is responsible for setting them up right.<\/p>\n<p>But IT is not responsible for the access settings of, say, your personal Google Drive. Are you absolutely sure that your colleague \u2014 and no one else \u2014 will see the file that you sent a link to? If the file is accessible to anyone who has the link, then search engines can index it. And if someone googles something on the topic of your document, it might appear in the search results and catch the eye of someone who should not even know of its existence.<\/p>\n<p>Therefore, stick to corporate resources when exchanging documents and other information. Those cloud drives, but configured for business, are generally far more reliable than the free user versions. Corporate mail usually has less spam and none of your personal correspondence, which adds up to less risk of missing an important e-mail or forwarding something to the wrong address \u2014 and colleagues will know for sure that it\u2019s you, not someone pretending to be you.<\/p>\n<h2>8. Stay vigilant<\/h2>\n<p>Alas, sometimes a malicious \u2014 and highly <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-bec-attack\/34135\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">convincing<\/a> \u2014 message can sneak into corporate mail. This is especially relevant to remote workers, because the amount of digital communications increases sharply with telecommuting. Therefore, read messages carefully and don\u2019t rush to respond to them. If someone urgently needs an important document or demands immediate payment of an invoice, double-check the someone is who they claim to be. Don\u2019t be afraid to call the other party for clarification, or confirm the action one more time with your boss.<\/p>\n<p>Be particularly suspicious of <a href=\"https:\/\/www.kaspersky.com\/blog\/fake-voicemail-spam\/28727\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">e-mails with links<\/a>. If a link to a supposed document does not point to a corporate resource, better to ignore it. If everything looks fine, and the link opens a site that resembles, say, OneDrive, do not enter your credentials on it. Better to manually type in the OneDrive address in the browser, log in, and try to open the file again.<\/p>\n<h2>9. Track your progress<\/h2>\n<p>So that management doesn\u2019t think that you\u2019re having a holiday instead of remote working, it is more important than ever to stay \u201ctransparent.\u201d That doesn\u2019t mean that you have to create signs of frenzied activity, simply make sure that your boss can see what tasks you are working on and how they are progressing. So don\u2019t be too lazy to note this in your company\u2019s task tracker, and be ready to report on what you\u2019ve done and how much time it took.<\/p>\n<p>Try to work during normal office hours, so that it\u2019s easier for colleagues to reach you and the working day does not stretch over a 24-hour period. When there is no need to travel to and from the office, it quite often happens that you sit down to work right after breakfast and break away only when night approaches. As a result, you get tired quickly \u2014 so it\u2019s better to limit your day to standard working hours.<\/p>\n<h2>10. Create a comfortable workplace<\/h2>\n<p>Last but not least, don\u2019t neglect your health and well-being. If you work on a laptop, lounging on the couch with it might seem like a great idea. But your back won\u2019t thank you in the long run, so try to find yourself a desk and a comfortable office-type chair.<\/p>\n<p>Make sure the room is well-lit. If the lighting is poor, use a lamp to prevent eye strain. And don\u2019t forget the health basics: periodically stand up, stretch your legs, drink water, get plenty of sleep, and don\u2019t skip meals.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n","protected":false},"excerpt":{"rendered":"<p>The coronavirus outbreak has forced many office employees to remain at home. Here\u2019s what you need to keep in mind so that both you and the company stay protected.<\/p>\n","protected":false},"author":2484,"featured_media":19634,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[2882,2911,97,1898],"class_list":{"0":"post-19633","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-coronavirus","9":"tag-remote-work","10":"tag-security-2","11":"tag-tips"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/remote-work-security\/19633\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/remote-work-security\/16173\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/remote-work-security\/7858\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/remote-work-security\/21210\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/remote-work-security\/19472\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/remote-work-security\/18002\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/remote-work-security\/22229\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/remote-work-security\/21028\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/remote-work-security\/27682\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/remote-work-security\/8013\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/remote-work-security\/34258\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/remote-work-security\/13214\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/remote-work-security\/23467\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/remote-work-security\/27942\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/remote-work-security\/25179\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/remote-work-security\/21891\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/remote-work-security\/27086\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/remote-work-security\/26925\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/remote-work\/","name":"remote work"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/19633","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=19633"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/19633\/revisions"}],"predecessor-version":[{"id":26910,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/19633\/revisions\/26910"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/19634"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=19633"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=19633"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=19633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}