Teleworking during the Coronavirus outbreak? While working from home can help slow the spread of the virus, it brings new challenges: juggling work while kids are home from school; learning new software and conferencing programs; and managing paper files at home. As you’re getting your work-at-home systems set up, here are some tips for protecting your devices and personal information.
- Start with cybersecurity basics. Keep your security software up to date. Use passwords on all your devices and apps. Make sure the passwords are long, strong and unique: at least 12 characters that are a mix of numbers, symbols and capital and lowercase letters.
- Secure your home network. Start with your router. Turn on encryption (WPA2 or WPA3). Encryption scrambles information sent over your network so outsiders can’t read it. WPA2 and WPA3 are the most up-to-date encryption standards to protect information sent over a wireless network. No WPA3 or WPA2 options on your router? Try updating your router software, then check again to see if WPA2 or WPA3 are available. If not, consider replacing your router. For more guidance, read Securing Your Wireless Network and Secure Remote Access.
- Keep an eye on your laptop. If you’re using a laptop, make sure it is password-protected, locked and secure. Never leave it unattended – like in a vehicle or at a public charging station.
- Securely store sensitive files. When there’s a legitimate business need to transfer confidential information from office to home, keep it out of sight and under lock and key. If you don’t have a file cabinet at home, use a locked room. For more tips, read about physical security.
- Dispose of sensitive data securely. Don’t just throw it in the trash or recycling bin. Shred it. Paperwork you no longer need can be treasure to identity thieves if it includes personal information about customers or employees.
- Follow your employer’s security practices. Your home is now an extension of your office. So, follow the protocols that your employer has implemented.
Want to learn more? Read our small business cybersecurity materials and online security articles. If you’re able to work from home, thanks for helping slow the spread of the Coronavirus.
The purpose of this blog and its comments section is to inform readers about Federal Trade Commission activity, and share information to help them avoid, report, and recover from fraud, scams, and bad business practices. Your thoughts, ideas, and concerns are welcome, and we encourage comments. But keep in mind, this is a moderated blog. We review all comments before they are posted, and we won’t post comments that don’t comply with our commenting policy. We expect commenters to treat each other and the blog writers with respect.
We don't edit comments to remove objectionable content, so please ensure that your comment contains none of the above. The comments posted on this blog become part of the public domain. To protect your privacy and the privacy of other people, please do not include personal information. Opinions in comments that appear in this blog belong to the individuals who expressed them. They do not belong to or represent views of the Federal Trade Commission.
In reply to I completed all those checks. by FAEAWW
In reply to I am registered for Do Not by Florida Lulu
The Do Not Call registry does not block calls from ringing through to your telephone.
The Registry is a list of telephone numbers. Telemarketers use the Registry to learn the numbers they should not call. Learn more about the Do Not Call registry.