{"id":460,"date":"2022-02-03T20:42:30","date_gmt":"2022-02-03T20:42:30","guid":{"rendered":"http:\/\/he-cyberdegrees-org-sonic.lndo.site\/?p=460"},"modified":"2023-04-06T22:29:01","modified_gmt":"2023-04-06T22:29:01","slug":"internet-safety-tips-while-working-from-home","status":"publish","type":"post","link":"https:\/\/www.cyberdegrees.org\/resources\/internet-safety-tips-wfh\/","title":{"rendered":"Internet Safety Tips While Working From Home"},"content":{"rendered":"<p>In 2017, just&nbsp;<a href=\"https:\/\/qz.com\/work\/1392302\/more-than-5-of-americans-now-work-from-home-new-statistics-show\/\" target=\"_blank\" rel=\"noreferrer noopener\">8 million Americans<\/a>, or about 5.2% of the workforce, worked from home. However, American executives seemed intrigued by the idea of building a secure, satisfied, and low-cost team of kitchen-table workers, so remote workforces increased as time went on.<\/p>\r\n\r\n\r\n\r\n<p>When the COVID-19 pandemic struck in early 2020, corporations all over the world immediately implemented work-from-home programs, many of which had seemed impossible just weeks earlier.<\/p>\r\n\r\n\r\n\r\nBy June 2020, 42% of Americans were working from home full time, according to <a href=\"https:\/\/news.stanford.edu\/2020\/06\/29\/snapshot-new-working-home-economy\/\" target=\"_blank\" rel=\"noreferrer noopener\">research from Stanford University<\/a>.\r\n\r\n\r\n\r\n<p>In the scramble to shift from office to home, many IT departments hastily propped up internet security measures and relaxed cardinal policies about cybersafety.<\/p>\r\n\r\n\r\n\r\n<p>Carla Sweeney, director of governance and risk compliance at Red Ventures, explained how even companies already operating with remote workforces were largely unprepared for those changes.<\/p>\r\n\r\n\r\n\r\n<div class=\"pullquote inline-block text-xl font-bold \npullquote--border-top\npullquote--placement pullquote--placement-center\">\n    <p>\u201cMany were forced to accelerate an unplanned shift to remote working before they were ready, without the luxury of time to plan and test network changes that make that change possible,\" Sweeney said.<\/p>\n<\/div>\n\n\r\n\r\n\r\n\r\n<p>Makeshift security measures may have created new vulnerabilities, such as unsecured home WiFi networks, use of personal devices for sensitive information, and lax physical security of hardware. Because of these potential vulnerabilities, remote employees should do their best to follow general best practices for <a href=\"https:\/\/www.cyberdegrees.org\/resources\/internet-safety-for-college-students\/\">internet safety<\/a>, including:<\/p>\r\n\r\n\r\n\r\n  <section class=\"checklist-v2\">\n    \n        <ul class=\"space-y-6\">\n    \n    \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1222B6\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1222B6\">\r\n<span class=\"text-base\"><strong>Pause and assess the situation before you click a link or attachment in an email.<\/strong><\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1222B6\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1222B6\">\r\n<span class=\"text-base\"><strong>If you must connect to a public network, use a virtual private network (VPN).<\/strong><\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1222B6\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1222B6\">\r\n<span class=\"text-base\"><strong>Create long and unique passwords for each account.<\/strong><\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1222B6\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1222B6\">\r\n<span class=\"text-base\"><strong>Avoid the temptation to let your family use your work laptop.<\/strong><\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1222B6\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1222B6\">\r\n<span class=\"text-base\"><strong>If possible, keep personal use to personal devices and work use to work devices.<\/strong><\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1222B6\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1222B6\">\r\n<span class=\"text-base\"><strong>Follow your company's policy regarding the storage and transmission of company information.<\/strong><\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1222B6\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1222B6\">\r\n<span class=\"text-base\"><strong>When you set up a video conference, use a unique password.<\/strong><\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1222B6\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1222B6\">\r\n<span class=\"text-base\"><strong>Change your home network name and make it invisible to others.<\/strong><\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1222B6\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1222B6\">\r\n<span class=\"text-base\"><strong>Change the default router administrator password to a strong passphrase.<\/strong><\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1222B6\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1222B6\">\r\n<span class=\"text-base\"><strong>Use multi-factor authentication wherever possible.<\/strong><\/span><\/section><\/div>\n  <\/li>\n          \n        <\/ul>\n      <\/section>\n\n\n\r\n\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/internet-safety-tips-wfh\/#best-practices\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Read About These And More Internet Safety Tips Below<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n\r\n  <section\n    class=\"relative py-3 md:py-16 my-10\"\n    data-preamp=\"editorial-listings\"\n    data-options=\n    data-tracking=\n    data-cy=\"editorial-listings-grid\"\n    \n  >\n    <div class=\"bg-full-width absolute border-t border-b border-gray-100 top-0 right-1\/2 left-1\/2 block h-full w-screen -mr-1\/2vw -ml-1\/2vw bg-quaternary-700 \"><\/div>\n\n    \n        <h2 class=\"text-center mb-8\">Top Online Programs<\/h2>\n    \n        <p class=\"text-center mb-8\">Explore programs of your interests with the high-quality standards and flexibility you need to take your career to the next level.<\/p>\n    \n    <sonic-editorial-listings\n      \n      \n      \n      limit=\"4\"\n      layout=\"grid\"\n    ><\/sonic-editorial-listings>\n\n  <\/section>\n\n\r\n\r\n\r\n\r\n<h2>Cybersecurity Threats for WFH<\/h2>\r\n\r\n\r\n\r\n<p>Working from home can expose companies and individual employees to cybercrime by creating new vulnerabilities in the safety structure.<\/p>\r\n\r\n\r\n\r\n<p>\"Employees are connecting to home or public networks of unknown security, in some cases with a personal laptop or mobile device to do their work,\" Sweeney said.<\/p>\r\n\r\n\r\n\r\n<p>Hackers may exploit virtual private networks already infected with malware. Malicious apps promising the lowdown on the COVID crisis can tempt kitchen-table workers. And young family members completing virtual learning may think it's okay to open up a private chat on mom or dad's work laptop.<\/p>\r\n\r\n\r\n\r\n<p>Consequently, cyberattacks have mushroomed since March, when much of the U.S. workforce shifted to remote work due to the COVID-19 pandemic. The&nbsp;<a href=\"https:\/\/www.who.int\/news-room\/detail\/23-04-2020-who-reports-fivefold-increase-in-cyber-attacks-urges-vigilance#:~:text=Since%20the%20start%20of%20the,targeting%20the%20public%20at%20large.&amp;text=The%20number%20of%20cyber%20attacks%20is%20now%20more%20than%20five,the%20same%20period%20last%20year.\" target=\"_blank\" rel=\"noreferrer noopener\">World Health Organization<\/a>&nbsp;alone experienced a 500% increase in cyberattacks early on during the pandemic, and other health-related agencies also saw a spike in cybercrime.&nbsp;<a href=\"https:\/\/www.scmagazine.com\/home\/security-news\/covid-19-accounts-for-most-2020-cyberattacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">Some reports say<\/a>&nbsp;cyberattacks in general jumped by 34% between March and April, and phishing attacks in particular soared from 5,000 in February to 200,000 in late April.<\/p>\r\n\r\n\r\n\r\n<div class=\"pullquote inline-block text-xl font-bold \npullquote--border-top\npullquote--placement pullquote--placement-center\">\n    <p>\u201cAttackers take advantage of heightened emotions and rely on the fact that people are anxious to learn more about breaking news, stimulus payment information, tax refunds, and even company announcements,\" Sweeney explained.<\/p>\n<\/div>\n\n\r\n\r\n\r\n\r\n<p>Emails parading as announcements from government agencies, misleading subject lines about COVID's impact on hard-hit industries, and malicious attachments claiming to provide tactics for avoiding the virus have all gotten employees to click.<\/p>\r\n\r\n\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/most-common-cyber-attacks\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">What Are the Most Common Cyberattacks?<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n\r\n\r\n<h2 id=\"best-practices\">Work from Home Internet Safety Best Practices<\/h2>\r\n\r\n\r\n\r\n<p>Just as any medical article will tell you to defer to your doctor's advice, when dealing with technology, always listen to your IT team. Whether a third party or an in-house department, your team features a&nbsp;<a href=\"\/jobs\/\">variety of professionals<\/a>, such as a chief information security officer, security manager, penetration tester, and information security analyst.<\/p>\r\n\r\n\r\n\r\n<p>These specialists can help with network, access, email, videoconferencing, and password safety. For employees working from home, we also compiled a list of the top internet safety tips in each of these areas and shared it below.<\/p>\r\n\r\n\r\n\r\n<div class=\"statbox bg-primary-50 text-primary-800 h-full\">\n    <div class=\"statbox__content h-full mx-auto text-center px-4 sm:px-6 shadow-lg\">\n                <h3 class=\"statbox__title font-extrabold leading-9 sm:leading-10\"><\/h3>\n                    <div class=\"statbox__text mt-4 leading-6\">\n                <p>\r\nStaying safe online means maximizing your personal security while minimizing risks to you and your employer's private information. Cybersecurity involves keeping people and property safe from cybercrime, which can include acts as diverse as unauthorized data access, cyber blackmail, or unwelcome sexual solicitation.\r\n<\/p>\n            <\/div>\n                    <\/div>\n<\/div>\n\n\r\n\r\n<br>\r\n\r\n<div style=\"background: #EEECF9; padding: 20px; border-radius: 5px; margin: 10px;\">\r\n<h3>Network Safety Tips<\/h3>\r\n\r\n<p>When we say \"network security\/safety,\" what do we mean? What network security issues do employees need to understand when working from home?<\/p>\r\n\r\n<p>Network security, a broad term, refers to the safety and protection of companies' computer networks and data. It includes the policies, procedures, processes, hardware, and software that keep computer networks and their information confidential, accessible, and clean.<\/p>\r\n\r\n<div class=\"pullquote inline-block text-xl font-bold \npullquote--border-top\npullquote--placement pullquote--placement-center\">\n    <p>When working from home, employees should make sure to avoid unsecured networks, protect their home networks with strong passwords, and follow any network security rules their employer provides.<\/p>\n<\/div>\n\n\r\n\r\n\r\n<p>According to Sweeney, best practices for network security include:<\/p>\r\n\r\n\r\n  <ul>\r\n    \r\n<li>\r\n<strong>Use Your VPN If You Must Connect to a Public Network. <\/strong>You can download a VPN from a source you trust. Paying for a VPN typically yields better results than downloading a free app, which may monetize its services in an undesirable way.<\/li>\r\n<li>\r\n<strong>Connect to Your Home Network Using a Long, Strong Password<\/strong>. To create an uncrackable password, shoot for something longer than 12 characters, and never use a word that appears in a dictionary.<\/li>\r\n<li>\r\n<strong>Hide Your Home Network<\/strong>. Give your home network a new name and make it invisible to your neighbors and others who may be cyber-snooping.<\/li>\r\n<li>\r\n<strong>Protect Your Router.<\/strong> Use your password-creation skills to change the default router administrator password to a strong passphrase.<\/li>\r\n<li>\r\n<strong>Keep Your Devices Current<\/strong>. Make sure any devices connected to your home network are current so they feature the most up-to-date cybersecurity hardware and software.<\/li>\r\n\r\n  <\/ul>\r\n\r\n \r\n<\/div>\r\n\r\n<br>\r\n<div style=\"background: #EEECF9; padding: 20px; border-radius: 5px; margin: 10px;\">\r\n<h3>Password Safety Tips<\/h3>\r\n\r\n    \r\n<p>Working like a simple lock-and-key system, passwords seem like such a basic cybersecurity building block that they hardly merit attention. But often, the simplest tactics provide the strongest security. When does password security matter? Which security issues should work-from-home employees look out for?<\/p>\r\n\r\n<p>A strong, unique password can protect your device, bank account, emails, and\/or data drive from common hackers. A password-cracking device can use brute force or dictionary hacking to guess nearly any password, but most ordinary hackers move on to easier prey when passwords prove too complex to quickly crack.<\/p>\r\n\r\n<p>Unfortunately, many users still don't practice good password protocols, despite regular reminders to use long passwords, avoid words found in the dictionary, create new passwords for each account, and never use personal phrases such as street names. According to the <a href=\"http:\/\/services.google.com\/fh\/files\/blogs\/google_security_infographic.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">February 2019 Online Security Survey<\/a> by Google and Harris Poll, 52% of respondents use the same password for at least two accounts, and 13% use one password for all accounts.<\/p>\r\n\r\n<p>Try the following practices to help keep your passwords in good working order:<\/p>\r\n\r\n\r\n<ul>\r\n<li>\r\n<strong>Keep Your Passwords Secret. <\/strong>No matter how clever your key is, resist the urge to let anyone else know about it.<\/li>\r\n<li>\r\n<strong>Use a Longer Password. <\/strong>A password of 16-plus characters trumps a shorter one.<\/li>\r\n<li>\r\n<strong>Use Multi-Factor Authentication. <\/strong>This additional layer of protection lets you confirm that it's you logging in.<\/li>\r\n<li>\r\n<strong>Don't Repeat Passwords. <\/strong>Create a new password for each account if possible, and never mix and mingle work and home passwords. If your company offers a password manager, use it.<strong><\/strong>\r\n<\/li>\r\n<\/ul>\r\n\r\n \r\n<\/div>\r\n<br>\r\n\r\n<div style=\"background: #EEECF9; padding: 20px; border-radius: 5px; margin: 10px;\">\r\n<h3>Email Safety Tips<\/h3>\r\n    \r\n<p>The oldest form of internet communication, email remains one of the most common ways computer users exchange messages. <a href=\"https:\/\/www.mckinsey.com\/industries\/technology-media-and-telecommunications\/our-insights\/the-social-economy\" target=\"_blank\" rel=\"noopener noreferrer\">A McKinsey study<\/a> found that reading and answering emails consumes 28% of an average workday. Clearly, people spend lots of time using email, making it one of the easiest points of entry for computer hackers.<\/p>\r\n\r\n<p>What email security issues plague work-from-home employees? And what are the possible consequences of a lapse in email security practices? Email attacks can appear as legitimate appeals for money or information, or they can spread malware or ransomware through infected attachments. In 2020, for instance, coronavirus-related email subject lines have enticed employees to click malicious links or attachments, even if they didn't know the senders.<\/p>\r\n\r\n<p>An email security breach can expose sensitive data, embroil employees in phishing scams, lock down systems through malware, and even introduce viruses that crash entire systems.<\/p>\r\n\r\n<p>Consider the following internet safety tips for email use when working from home:<\/p>\r\n  \r\n<section class=\"checklist check \">\n  \n<\/section>\n\n\r\n  <ul>\r\n    \r\n<li>\r\n<strong>Pause and Assess the Email<\/strong>. Before you click a link or an attachment, ask yourself: \"Did this message come from someone I know? If so, did I expect to receive it?\"<\/li>\r\n<li>\r\n<strong>Be Aware That Phishing Messages Look Real. <\/strong>Attackers put you at ease by appearing to be someone familiar -- maybe even a colleague -- and creating a sense of urgency to act. Sweeney said there has been an increase in phishing scams since the COVID pandemic hit.<\/li>\r\n<li>\r\n<strong>Verify With the Sender<\/strong>. Ask in a phone call or instant message if a suspicious email is really from the sender whose name is attached.<\/li>\r\n\r\n  <\/ul>\r\n\r\n \r\n<\/div>\r\n<br>\r\n\r\n\r\n<div style=\"background: #EEECF9; padding: 20px; border-radius: 5px; margin: 10px;\">\r\n<h3>Videoconferencing Safety Tips<\/h3>\r\n<p>Video conferencing has boomed as people social distance during the pandemic. One videoconference software platform, <a href=\"https:\/\/venturebeat.com\/2020\/04\/02\/zooms-daily-active-users-jumped-from-10-million-to-over-200-million-in-3-months\/\" target=\"_blank\" rel=\"noopener noreferrer\">Zoom, grew from 10 million users<\/a> in December 2019 to 200 million in spring 2020.<\/p>\r\n\r\n<p>Because video conferencing relies on internet communication, it provides an access point for nefarious actors who want to break into companies' networks. What potential issues surround videoconferencing security?<\/p>\r\n\r\n<p>Remote workers aren't always careful. It's easy to jump on a video conference without taking precautions.<\/p>\r\n\r\n<p>\"These are strange times,\" Sweeney said, \"and employees working from home likely have a different mindset than they do at the office, whether that means they're preoccupied, have increased job demands, or are distracted and letting their guard down.\"<\/p>\r\n\r\n<p>The results can prove catastrophic. According to the <a href=\"https:\/\/www.washingtonpost.com\/technology\/2020\/04\/03\/thousands-zoom-video-calls-left-exposed-open-web\/\" target=\"_blank\" rel=\"noopener noreferrer\">Washington Post<\/a>, hackers have accessed thousands of recordings of private Zoom meetings and made them available to anyone on the internet. Hackers can also break into meetings, share offensive content, and disrupt the sessions.<\/p>\r\n\r\n<p>What solutions can remote workers implement to maximize security when using videoconferencing platforms?<\/p>\r\n\r\n  \r\n \r\n  <ul>\r\n    \r\n<li>\r\n<strong>Create Unique Passwords for Each Meeting. <\/strong>Don't just rely on the meeting ID for security. If you are not the host, ask whoever is hosting the meeting to take this extra step.<\/li>\r\n<li><strong>Don't Open an Unexpected Meeting Invitation or Accept an Unknown Caller.<\/strong><\/li>\r\n<li>\r\n<strong>Lock the Call After All the Members Have Joined.<\/strong> This practice can help keep out unwanted intruders.<\/li>\r\n<li>\r\n<strong>Limit File-Sharing During Calls. <\/strong>Don't let attendees receive or open documents on the platform, since these can contain malware.<\/li>\r\n\r\n  <\/ul>\r\n\r\n \r\n<\/div>\r\n<br>\r\n\r\n<div style=\"background: #EEECF9; padding: 20px; border-radius: 5px; margin: 10px;\">\r\n<h3>Tips for Accessing Websites and Sharing Information<\/h3>\r\n<p>It's hard to come by reliable data on the personal internet use of work-from-home staff, but <a href=\"https:\/\/www.wsj.com\/articles\/the-key-to-getting-workers-to-stop-wasting-time-online-1457921545\" target=\"_blank\" rel=\"noopener noreferrer\">research shows<\/a> that nearly all employees spend at least some time surfing the web at work. Called \"cyberloafing,\" this practice offers several benefits, namely operating as a stress-relief valve for knowledge workers. Nevertheless, clicking on unsafe websites or sharing personal information on a work computer can put a company's network technology at risk.<\/p>\r\n\r\n<p>Any surfer's web history offers critical data into their life. People use the internet to research health topics that concern them, vacation spots they want to visit, charities they consider giving to, political sites that appeal to them, and other topics of relevance to their life. Legitimate advertisers use this information to help prospective customers find their products or services.<\/p>\r\n\r\n<p>Cyber criminals can also track user data, however, and use it to determine how they'll get a specific user to click on an infected file. Here are some ways Sweeney suggests to minimize your footprint and keep your work computer safe:<\/p>\r\n\r\n  \r\n \r\n  <ul>\r\n    \r\n<li>\r\n<strong>Limit Personal Use. <\/strong>Dedicate your work computer to work, and only use your own computer for personal searches, online shopping, and entertainment.<\/li>\r\n<li>\r\n<strong>Avoid the Temptation to Let Your Family Use Your Work Laptop. <\/strong>Children and even partners can inadvertently expose your employer to hackers through the sites they click on and the search strings they enter.<\/li>\r\n<li>\r\n<strong>Follow Your Company's Policies Around Storing and Transmitting Company Information. <\/strong>These policies often require you to use authorized platforms, which have stronger security protocols in place.<\/li>\r\n\r\n  <\/ul>\r\n \r\n<\/div>\r\n<br>\r\n\r\n<div style=\"background: #EEECF9; padding: 20px; border-radius: 5px; margin: 10px;\">\r\n<h3>Tips for Personal Versus Work Devices<\/h3>\r\n\r\n    \r\n<p>Mixing work life with personal life can get sticky, but work-from-home employees often switch between work use and personal use on their electronic devices, cross-polluting data between the two. What security issues can arise when people mix and mingle work devices with personal ones?<\/p>\r\n\r\n<p>Personal devices containing employer data can get lost, stolen, or damaged, thus putting corporate information at risk. Furthermore, friends, family, and inattentive employees could easily upload personal files to a cloud, breaking data security policies and co-mingling homework assignments with budget drafts, for example. Finally, security breaches on personal devices could result in legal or corporate penalties, or they could affect companies' reputations with clients or customers.<\/p>\r\n\r\n<p>Even so, some remote workers don't have the luxury of separate work and personal devices and must rely on one device for both aspects of their life. To maintain safety, employers who ask staff to use their own devices for work should implement acceptable use policies, company-provided authentication components, and agreements for how to wipe devices when employees depart.<\/p>\r\n\r\n<p>Sweeney provided an additional security tip for switching between devices safely:<\/p>\r\n\r\n  <ul>\r\n<li>\r\n<strong>Don't Copy Corporate Data to Your Personal Device, Email, or Online Storage. <\/strong>Follow your company's policy on storage and transmission of company information and communication.<\/li>\r\n  <\/ul>\r\n\r\n \r\n<\/div>\r\n\r\n\r\n\r\n<h2>The Future of WFH and Cybersecurity<\/h2>\r\n\r\n\r\n\r\n<p>COVID caused a monumental surge in remote work, but will companies make the work-from-home shift permanent even post-COVID? Probably.<\/p>\r\n\r\n\r\n\r\n<div class=\"pullquote inline-block text-xl font-bold \npullquote--border-top\npullquote--placement pullquote--placement-center\">\n    <p>In a&nbsp;<a href=\"https:\/\/public.tableau.com\/profile\/salesforceresearch#!\/vizhome\/SalesforceLeadingThroughChangeDashboard\/LTCHome\" target=\"_blank\" rel=\"noreferrer noopener\">Salesforce\/Tableau survey<\/a>, 69% of respondents said they believed the pandemic would \"permanently change the nature of work.\"<\/p>\n<\/div>\n\n\r\n\r\n\r\n\r\n<p>Sweeney agrees.<\/p>\r\n\r\n\r\n\r\n<p>\"With the pandemic situation constantly evolving, I think companies are having to adjust to the 'new normal' of work-from-home,\" she explained, \"whether that means the full workforce working from home or allowing for more flexibility as we navigate remote schooling, COVID exposure, and quarantining.\"<\/p>\r\n\r\n\r\n\r\n<p>This radical realignment of the digital workforce means companies are relying even more on well-trained cybersecurity professionals to keep their data, hardware, and employees safe.<\/p>\r\n\r\n\r\n\r\n<p>\"InfoSec teams will have to stay agile and align to company strategies as they respond to the pandemic, while monitoring ever-evolving threats that come with it (while dealing with election year threats to boot!),\" Sweeney said.<\/p>\r\n\r\n\r\n\r\n<p>As a result of these recent events, cybersecurity is morphing into an even more exciting field to study. Recent graduates and career-switchers can find an enticing new career helping to fight crime and tackle new technological challenges through cybersecurity.<\/p>\r\n\r\n\r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-2 gap-5 my-8\"> \n  \r\n  \n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/listings\/cyber-security-bootcamps\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Cybersecurity Bootcamps<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n  \n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/listings\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Cybersecurity Degrees<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n  \n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/listings\/top-schools\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Top Cybersecurity Schools<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n  \n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/jobs\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Cybersecurity Jobs<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<\/div>\n\r\n\r\n\r\n<p>Whether you choose to trailblaze a new career field or stick to your current trajectory, you can help keep everyone safe from cyber crime by practicing common-sense tactics, including:<\/p>\r\n\r\n\r\n\r\n\r\n<ul>\r\n<li><strong>Pause and assess the situation before you click a link or attachment in an email.<\/strong><\/li>\r\n<li><strong>If you must connect to a public network, use your VPN.<\/strong><\/li>\r\n<li><strong>Create long and unique passwords for each account.<\/strong><\/li>\r\n<\/ul>\r\n\r\n\r\n<h2>Meet the Expert<\/h2>\r\n\r\n\r\n\r\n<div class=\"biography flex flex-col justify-center md:justify-start md:flex-row items-center rounded-lg shadow-lg p-8 bg-white \">\n        <img decoding=\"async\" class=\"object-cover mb-8 rounded-lg max-h-60 md:mb-0\" src=\"\/wp-content\/uploads\/2020\/11\/Carla_Sweeney_200px-1.jpg\" alt=\"Portrait of Carla Sweeney\" height=\"240\" loading=\"lazy\">\n    <div class=\"md:ml-8\">\n    <h4 class=\"mb-1 font-bold leading-6 biography__title\">Carla Sweeney<\/h4>\n        <div class=\"mt-4 text-lg leading-6 text-gray-700 md:mb-0 md:pb-0\">\n      \r\n<div slot=\"contentRight\">\r\n<p><b>Location:<\/b> Charlotte, NC<\/p>\r\n<p>Director of Governance, Risk Compliance at Red Ventures<\/p>\r\n<\/div>\n    <\/div>\n      <\/div>\n<\/div>\n\n\n\r\n\r\n\r\n\r\n<h4>School Rankings<\/h4>\r\n\r\n\r\n\r\n<ul><li><a href=\"\/listings\/top-schools\/\">Top Schools<\/a><\/li><li><a href=\"\/listings\/best-online-cyber-security-bachelors-degrees\/\">Top 18 Online Cybersecurity Bachelors Degrees<\/a><\/li><li><a href=\"\/listings\/best-online-cyber-security-bachelors-degrees\/\">Top 20 Online Bachelors in IT Degrees<\/a><\/li><li><a href=\"\/listings\/best-online-cyber-security-certificate-programs\/\">Top 30 Online Certificate Programs<\/a><\/li><li><a href=\"\/listings\/best-online-computer-forensics-programs\/\">Top 17 Online Computer Forensics Programs<\/a><\/li><li><a href=\"\/listings\/top-online-masters-in-cyber-security-programs\/\">Top 25 Online Masters Degrees<\/a><\/li><\/ul>\r\n\r\n\r\n\r\n<h4>Useful Resources<\/h4>\r\n\r\n\r\n\r\n<ul><li><a href=\"\/resources\/transitioning-from-general-it\/\">Moving From General IT Jobs Into Cyber<\/a><\/li><li><a href=\"\/resources\/free-online-courses\/\">Free Online Cyber Security Courses (MOOCs)<\/a><\/li><li><a href=\"\/resources\/security-clearances\/\">A Quick Guide to Security Clearances<\/a><\/li><li><a href=\"\/resources\/certifications\/\">A Guide to Cyber Security Certifications<\/a><\/li><li><a href=\"\/resources\/internet-safety-for-college-students\/\">Internet Safety for College Students<\/a><\/li><li><a href=\"\/resources\/the-big-list\/\">The Big List of Cyber Security Resources<\/a><\/li><\/ul>","protected":false},"excerpt":{"rendered":"If you find yourself working from home, you&#8217;ll want to read these internet safety tips to keep your WFH environment safe and protect yourself from online threats.","protected":false},"author":5,"featured_media":6559,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"templates\/template-rankings.php","format":"standard","meta":{"_cloudinary_featured_overwrite":false,"footnotes":""},"categories":[1],"states":[],"resources-overview":[33],"degrees":[],"jobs-overview":[],"rankings":[],"class_list":["post-460","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","resources-overview-all"],"acf":[],"menu_order":0,"_links":{"self":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/comments?post=460"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/460\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media\/6559"}],"wp:attachment":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media?parent=460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/categories?post=460"},{"taxonomy":"states","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/states?post=460"},{"taxonomy":"resources-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/resources-overview?post=460"},{"taxonomy":"degrees","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/degrees?post=460"},{"taxonomy":"jobs-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/jobs-overview?post=460"},{"taxonomy":"rankings","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/rankings?post=460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}