Due to the coronavirus pandemic, colleagues would be work-from-home. Working remotely can introduce a few new security concerns.
Here are security tips and a checklist on how you can work from home more securely.
|1. Ensure Privacy in the Working Environment||
|2. Ensure Security of Work Devices||
|3. Ensure Wi-Fi Connection is Secured Only||
|4. Establish VPN connection to access CUHK resources|
|5. Keep your data secure||
|6. Video Meeting Securely||
1. Ensure Privacy in the Working Environment
Pick a space that’s private. Select a place where people can’t “shoulder surf”; look over your shoulder at what’s on your screen. If you can’t find a private place to work, consider getting a privacy screen filter. This is a shield, of sorts, that attaches to your screen and makes it difficult to read what’s on your screen unless you’re right in front of it.
2. Ensure Security of Work Devices
Use a secure computer. Install anti-malware software and perform a comprehensive security scan. Perform regular system updates and install patches.
Never share your account and password with your family members. Many people would share the use of work devices at home with their family members, especially computers. But when using these devices to perform office work, you should create a new account and password in order to ensure your files cannot be accessed by your family members. This will not only improve the system security, but also prevent important files from being arbitrarily read or accidentally deleted by others. Remember to sign out upon the completion of the work.
3. Ensure Wi-Fi Connection is Secured
Only use secure encrypted Wi-Fi. Change the default login name and password of the home router. Upgrade the firmware to the latest version. Set up a security key (password) for your network. Use the latest security protocol WPA3. If the router does not support it, the more common WPA2 can be used.
Avoid free, public Wi-Fi. If required to work away from home, try to avoid connecting to public Wi-Fi, and use the hotspot sharing function of the mobile phone for Internet access instead.
4. Establish VPN connection to access CUHK resources
Use a VPN (Virtual Private Network) to connect to your office network. A VPN creates an encrypted tunnel for your network traffic to flow through and makes it harder for others to intercept or eavesdrop your traffic.
Enable 2FA (Two-factor Authentication). Your VPN account can be much enhanced and protected by using 2FA.
5. Keep your data secure
Properly protect your data by following best practices in keeping your data out of hackers reach.
Avoid to download sensitive data. If the data have to be stored in your personal computers, you should ensure those sensitive data are encrypted and backed up to prevent information leakages.
Use cloud storage provided by CUHK such as CUHK O365 OneDrive or SharePoint. Resist the temptation to use unapproved tools or store data outside of CUHK resources. Please follow best practices on using cloud storage services.
Beware of phishing emails or online scams, NEVER open files/URLs from suspicious or untrusted source.
6. Video Meeting Securely
Keep Video meeting software up-to-date.
Beware of eavesdropping. If you’re having conference calls or video meetings, be aware of whether other people might be able to eavesdrop, even inadvertently. Even if (sometimes especially if) you’re wearing headphones. Other people may still be able to hear your voice when you speak.
In addition to the above tips, more Information Security Best Practices can be found at ITSC website.
Let’s stay Safe, stay Healthy, and stay SECURE!
Also stay in Touch while you’re working remotely. If any suspicious activity is spotted on the computer, you should disconnect it from the network immediately, report to ITSC and ask for assistance.
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
|cookielawinfo-checkbox-analytics||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".|
|cookielawinfo-checkbox-functional||11 months||The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".|
|cookielawinfo-checkbox-necessary||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".|
|cookielawinfo-checkbox-others||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.|
|cookielawinfo-checkbox-performance||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".|
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.