What Security Guidelines should you follow while working remotely? – By Shahid Hamid Gill

Click “Read More” to go through the full article.

Security is perhaps the most significant reason to incorporate a cyber-hygiene routine. Hackers, identity thieves, advanced viruses, and intelligent malware are all part of the hostile threat landscape. And the world is moving towards remotely work these days, therefore, it’s most noteworthy to be cautious of some security hygiene with regards to keeping the information safeguarded. Some flashes of thoughts are released underneath for the distinct reason, loss of data.

1- Sharing usernames and passwords is never a smart practice. Sharing your credentials i.e. username, password or pin with any one is surely unwise. IT experts of company/institute will never ask the employees to share username of password.

image source: eyeofriyadh.com

2- Never open your any documents, maps or links from any unknown sources. It could be a malicious code, virus or a phishing scam that can be stolen by the identity thieves whatever they wish.

image source: searchengineland.com

3- Don’t attempt to fix troubleshooting issue such as malware, ransomware or any other potential infections; instead, do approach to IT experts immediately through proper official channels.

image source: istockphoto.com

4- Don’t apply any unauthorized, removable hard discs or flash drives, etc. Never approach to use unauthorized file sharing platform or services for instance cloud services. All these unauthorized services can cause risk of data confidentiality, level of security, technical problems, Risks associated with the cloud are not limited to security breaches. Cyber criminals can get all-access pass to your private data.

image source: community.spiceworks.com

5- Make sure your computer or other device is locked off when you step away from your work station.

image source: Guiding Teck

6- Don’t let any unauthorized person including your family member, friends, relatives etc. approach to read company’s sensitive information.

image source: vietnamimmigration.com

7- No means, including your personal email etc. should be used to share any kind of company’s data to unconcerned person. As this is company’s confidential possessions.

image source: Big Idea Technology

8- No applications for conferences, other than what company has provided, should be used by the employee. In Case of recording, the employees surely be informed of it. Do close your app once the meeting is over.

image source: TutorialChip

9- All rules must be followed so avoid any complications.

image source: pointofview.net

Leave a Reply

Your email address will not be published. Required fields are marked *