Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

IT security tips for home workers

WorkLight : 15 May, 2008  (Technical Article)
On National Work at Home day, Worklight is offering advice to all workers who are operating away from the office on how to remain secure
Today is National Work from Home Day which could see an estimated five million people not coming into work but instead working from the comfort of their home. However, even though employees will be sitting comfortably, the IT mangers will no doubt be uncomfortable at the thought of the security issues that exist around working from home.

To ease this discomfort, here are some top tips from WorkLight, an Enterprise 2.0 company, on how to be safe and secure while working from home along with an animation on the benefits of bringing the home into the office:

Top Tips for Working Securely from Home:.

* Use an approved computer for working at home. This way, the company has verified that the necessary protections are in place (up to date virus protection, approved VPN tools, etc.). This will protect you from introducing malware into your company's environment inadvertently and it will protect you from your company's ire if "something goes wrong."

* Make sure everything is updated. Before you start working on your computer or laptop make sure you turn on your automatic updates for your applications as well as installing the latest anti-virus and anti-spyware software to make sure you and your personal information is also protected.

* Never enter your username and password on a page you arrived at by clicking on a link in an email, IM message, third party web site or social networking site. These are the tools hackers use most often to steal passwords.

* When entering your username and password on any site, always verify first that the URL in the browser's address bar matches the URL of the site you (think) you are accessing. This is the best way to ensure your password won't be intercepted by some evil-doer.

* Set limits about what you are willing to expose about yourself when working online and remember the context of the interaction (business or personal). Be wary, since embarrassing or inappropriate information about yourself may appear in contexts that you did not expect. It is very difficult to "clean up" your profile later on.

* Social networking sites and blogs are business tools, make sure you are using a safe environment for professional networking. Treat the network as a resource of valuable information, and tap into your colleagues' expertise with the collaborative tools available on the network.

* Secret is not secured. Some social networks, like Facebook, allow users to engage in private or secret groups. Although these forums take place away from the public eye, apt hackers can still crack open the discussion boards and access conversations, unless appropriate enterprise-grade safeguards have been put in place.

* When adding RSS feeds to a feed reader, always prefer to use a link you got from the content provider's web site rather than from any third party (an email, an IM, a link on a social networking site etc) This improves the likelihood that the information you are seeing is what the content provider intended.

* When accessing corporate applications from a web browser, use a separate browser instance, not just a new tab or a new window opened from the browser you are using to access public sites. This makes it more difficult for hackers to launch request forgery attacks that target your corporate systems.

* When using public sites for work related tasks, be aware of the information you expose. Keep In mind, the search queries you run, the sites you visit, your web-based bookmarks and tags, the RSS feeds you've subscribed to and your social network connections are all potential sources for data leakage.

* When using Web based collaboration tools, avoid exposing proprietary information. Even when communicating with colleagues, the information you provide can easily become accessible to unauthorised parties.

* Familiarise yourself with your employer's acceptable use policy for employee blogs and social networks. Adhering to such policies will help avoid any unpleasant situations. If your employer hasn't published such policies, demand them.

* Keep personal and business "digital assets" separate. As personal lives and business lives merge, it becomes increasing compelling to do personal tasks on work time. Be careful not to merge these two lives on your computer. Some tips - use business time for business and do not store personal files on your business computer (and vice versa).

Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo