Work From Home Resources
- Telework Security Basics – Use these tips from NIST to improve your telework security, whether you’re using your organizations’ laptop or smartphone, or your own personal desktop or tablet.
- Protecting Portable Devices: Data Security – In addition to taking precautions to protect your portable devices, it is important to add another layer of security by protecting the data itself.
- Securing a New Computer – It’s important to properly configure your home computer before connecting it to the internet to keep it, and your information, secure.
- FCC Smartphone Security Checker – This quiz is designed to help the many smartphone owners who aren’t protected against mobile security threats secure their device.
- Secure remote access – Put your network’s security first. Make employees and vendors follow strong security standards before they connect to your network. Give them the tools to make security part of their work routine.
- Securing Telework Environments – This guide provides cybersecurity best practices for hardening routers, modems, and other network devices.
- Understanding Firewalls for Home and Small Office Use – When your computer is accessible through an internet connection or Wi-Fi network, it is susceptible to attack. However, you can restrict outside access to your computer—and the information on it—with a firewall.
- Security for Enterprise Telework, Remote Access, and (BYOD) Solutions – The National Institute of Standards and Technology (NIST) has guidelines on telework and remote access to help organizations mitigate security risks.
- Understanding Patches and Software Updates – When vendors become aware of vulnerabilities in their products, they often issue patches to fix those vulnerabilities. Make sure to apply relevant patches to your computer as soon as possible so that your system is protected.
- Defending Cell Phones Against Attack – As cell phones become more technologically advanced, attackers are finding new ways to target victims. By using text messaging or email, an attacker could lure you to a malicious site or convince you to install malicious code on your portable device.