Guide: How to securely work from home

As we adjust to working from home, there are some simple ways to ensure our data and devices remain secure. Attackers won’t miss an opportunity to take advantage of circumstances that allow for easier access to home networks and personal computers, and it’s important to keep sensitive information safe, no matter where we’re working.

Here are five simple steps that will help you and your household keep a more cybersafe home.

  1. Remain vigilant to phishing. This remains the primary way attackers attempt to cause a breach, quite simply because it’s easier than finding a vulnerability in our technology. Be cautious of emails and phone calls that have a strong sense of urgency, or that use fear and intimidation. Carefully read the entire message before taking any action.
  2. Take time to secure your home network. Almost every home network starts with Wi-Fi, which allows all our devices to connect to the internet. The router or Wi-Fi access point allows connections to and from the internet to occur, which means it’s a key part of protecting your home.
  • Change the default administrator password. Protect the account that grants access to the network settings.
  • Allow only people you trust. Enable a strong password for anyone connecting to the network, and ensure network traffic is encrypted.

Your Internet Service Provider (ISP) can help verify these settings. Check their website, the documentation for your wireless access point, or refer to the vendor’s website.

  1. Keep devices updated. Make sure every computer, mobile device, and all apps are running the latest versions of software. Software vendors continuously release patches that contain security updates, and attackers exploit the older, vulnerable versions. By ensuring computers and devices are up to date, you make it harder for attackers to break in. To stay current, enable automatic updates whenever possible. This rule also applies to devices you may not think about—internet-connected TVs, baby monitors, security cameras/doorbells, gaming consoles, appliances, thermostats, and more.
  2. Family and guests. Something we usually don’t have to worry about on campus is guests and other family members using a Drake-owned computer, or accessing a personal/shared computer while we’re in the middle of a task. Make sure any family and friends at home understand that they cannot use your Drake-owned computer or other devices that you’re using to work, as they can accidentally erase or modify information, or infect the device by unintentionally visiting a malicious website.
  3. Keep track of data. If you’re accessing and copying information to personal devices, or even downloading reports to your Drake-owned computer that you would normally view online, write down locations or visual cues to help track their location so you can delete or move it to its correct location when complete. This will help ensure that sensitive information does not remain on a personal device and cause future breaches of confidentiality.

If you have questions about any of these steps or would like to learn more about securely working from home, please email informationsecurity@drake.edu.

—Peter Lundstedt, ITS