Netimperative
Netimperative
  • Home
  • Ads
  • Content
  • Mobile
  • E-commerce
  • Social
  • Regulation
  • Video
  • Viral
Menu
  • Apple
  • Amazon
  • Facebook
  • Google
  • twitter
  • WhatsApp
  • YouTube

Top tips: Securing your home office in the age of WFH

June 26, 2020
Top tips: Securing your home office in the age of WFH

Large parts of the UK are now working from home which leads to unknown risks. Chris Lin, VP, Information Technology at Mozilla, offers tips on how companies and employees can successfully design a secure home office in the age of COVID-19.

It’s no exaggeration to say that the pandemic has fundamentally changed the way we work. Work-from-home policies have been deployed across industries that will be in place long after the crisis is resolved. We only need to look at the accelerated adoption of communication platforms such as Slack and Zoom to see this.

 

For example, Microsoft’s collaboration platform Teams generated almost three billion minutes of online meetings in a single day in early April, a new record and just under five times the amount generated just four weeks earlier. With this huge and abrupt shift to telecommuting however, comes new challenges and security risks that need to be addressed. 

 

When it comes to security, there are three core areas that should be addressed when designing a home office: IT and hardware security, connection security and data security. At Mozilla, we’re well versed in approaches to home office security, as half our global workforce (and more than two thirds of our UK workforce) worked remotely prior to the pandemic. Because of this, we’ve learned some things along the way on how to build a secure home office – here are our tips:

 

Secure IT

 

Most devices provided to employees and associated software are monitored by an in-house IT expert or a specialised contractor. This means someone is dedicated to maintaining the antivirus software and firewall protections that have been set up, making sure they stay clear of virus, malware and potential security threats.

 

Companies as a rule tend to impose guidelines around the use of private devices such as laptops or storage drives for work because they are significantly less secure. However, when working from home, the likelihood of strict adherence is reduced, particularly if they’re not set out clearly. 

 

That’s why it makes sense for employees to only use equipment secured in advance with common protection software by the company’s IT department. However, they also need to be protected when used in the home – this means not using private USB sticks coupled with other private devices (via Bluetooth, for example).

 

Moreover, employees should be careful when checking work and private emails on the same device as malicious actors often try to spread malware in inboxes. Some are impersonating Zoom, Microsoft Teams, and Google Meet for phishing scams, and others are even sending out emails posing as authorities such as an organisation’s CEO.

 

Secure data transmission

 

Another major consideration is how company data is stored and transmitted between employee devices. Most companies require access to employee data at all times, and ensuring data is stored in a secure and safe manner is paramount.

 

To achieve this, we highly recommend strictly separating work and private computing devices, from laptops to smartphones and even tablets. Employers should ensure employees are using specific cloud solutions such as Egnyte, Dropbox and Box for storing all company assets, and discouraging the use of personal storage solutions or private USB sticks. 

 

Employees should also only use secure and approved platforms when sending data to third parties such as customers, clients or service providers. There are a number of different options available such as Firefox Send, WeTransfer or Google Drive that can be used to guarantee  data doesn’t fall into the wrong hands.

 

Connecting securely

 

What has also been made clear by the rise of remote working is the need to secure the connections over which sensitive data is transferred between businesses and employees. At home, most people access the internet over Wi-Fi, which in many cases, is not protected effectively against attacks. 

 

While most people are aware of the dangers of connecting to public wi-fi networks, many may not realise the weakness of home wi-fi networks. Most people use their routers after purchase by plug & play with the default provided password and a weak Wi-Fi key, which is definitely insufficient for professional work.

 

Most organisations mandate that a VPN (virtual private network) should be used for access to an internal company network where documents and programs are stored. This is an effective protection measure to avoid hostile actors intercepting data, as you never know who may take the opportunity to break in.

 

Employees can also safeguard against the dangers of an insecure connection strategy at home in a number of ways. At home, it’s recommended to engage at least WPA2 encryption for your WI-FI router, and ideally WPA3 if you have access to it on your device. Vigilance with related software and firmwares is also key, as is ensuring company data is only accessed via a VPN and avoiding public networks if this facility is not available.

 

In the end, there’s no one right way to secure your home office, but the strategies outlined above will go a long way to mitigating the potential risks. Focusing on these three areas will help make sure security best practices are deployed across your organisation to remove potential risks and concerns at a time when they are least welcome.

Top tips: Securing your home office in the age of WFHBy Chris Lin

VP, Information Technology

Mozilla

Regulation security

Archives

Tags

advertising agencies Amazon analytics Android Apple apps Australia BBC brands Brazil broadband China Christmas comScore content digital marketing ecommerce email Entertainment Europe Facebook France games Germany global Google government images infographic local marketing media Microsoft music Privacy retail Search security smartphones technology Twitter UK video YouTube

Recent Posts

  • Top six Valentine’s Day ads for 2022
  • 2021 Halloween: digital marketing campaigns we loved this year
  • Empowering employees; the critical link between EX and CX
  • Investing in in-app social features is a must in a world that is crying out to be connected
  • QR codes, Gen Z and the future of OOH

Copyright © 2025 Netimperative.

Magazine WordPress Theme by themehall.com

We use cookies to improve the website and your experience. We’ll assume you’re okay with this, but you’re welcome to opt-out
Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT