Security Tips for Remote Work

To maintain a safe and secure remote working environment, here are some security tips: 

Suggestions  Tips 
1. Working Environment  
  • Select a private space.
  • Select a place where people can’t “shoulder surf”.
  • Look over your shoulder at what’s on your screen. 
  • Get a privacy screen filter to avoid prying eyes, if a private workplace is not available. 
2. Work Devices 
  • Use a secure computer for workAll public computers should be considered as insecure since they might have been infected by virus or malware.  DO NOT access CUHK IT systems or enter passwords and any personal data on an insecure computer to avoid any leakage of your password or University data.  If it is inevitable to connect CUHK IT systems via a public computer, you should change your password immediately with a secure computer in a secure network.
  • Install anti-malware software and perform regular scan.  
  • Perform regular system updates and install patches. 
  • Never share your account and passwordfor a shared device with family members, always have a separate login account with password protection to avoid accessing/deleting work files unintentionally by others.  Sign out completely upon completion of your work.
3. Wi-Fi Connection 
  • Use secure encrypted Wi-Fichange the default login name and password of the home router. Upgrade the firmware to the latest version. Set up a security key (password) for your network. Use the latest security protocol WPA3.  If the router does not support it, the more common WPA2 can be used.
  • Avoid free, public Wi-Fiuse the hotspot sharing function of the mobile phone for Internet access instead.
4. VPN Connection 
  • Use a CUHK VPN (Virtual Private Network) to connect to CUHK network. A VPN creates an encrypted tunnel for your network traffic to protect from intercepting or eavesdropping. 
5. Data Security 
  • Avoid downloading sensitive data on your personal devicesif unavoidable, encryption and data backup are recommended.  
  • Beware of phishing emails or online scams, NEVER open files/URLs from suspicious or untrusted source.
  • Make sure you are accessing from your own computing devices to a secure webpage.  A secure webpage should have an address started with ‘https‘.
6. Video Meeting 
  • Keep Video meeting software up-to-date.
  • Beware of eavesdropping – during a conference call or video meeting, even if you are on headphones, someone may still be able to hear your voice.

Additional tips are available at “User Trainings: Information Security Best Practices

Also stay in Touch while you’re working remotely. If any suspicious activity is spotted on the computer, you should disconnect it from the network immediately, report to ITSC and ask for assistance. 

References: