Skip to main content

Information Technology

Working From Home

Better understand your new office or secondary office.  

Top 4 Steps to Securely Work from Home

You are the best defense:

Attackers have learned that the easiest way to get what they want is to target you.  They will attempt to trick you into giving them what they want, often creating a sense of urgency. You have the power to defend against them.   

Home Network:

Almost every home network starts with a wireless network. Most home wireless networks are controlled by your Internet router or a separate, dedicated wireless access point. This means securing your wireless network is a key part of protecting your home.

Recommend the following steps to secure it:

Change the default administrator password:

The administrator account is what allows you to configure the settings for your wireless network. An attacker can easily discover the default password that the manufacturer has provided

Allow only people that you trust:

Do this by enabling strong security so that only people you trust can connect to your wireless network. Strong security will require a password for anyone to connect to your wireless network. It will encrypt their activity once they are connected

Make passwords strong:

The passwords people use to connect to your wireless network must be strong and different from the administrator password. Remember, you only need to enter the password once for each of your devices, as they store and remember the password

Unsure how?

Ask your Internet Service Provider, check their website, check the documentation that came with your wireless access point, or refer to the vendor's website

Passwords:

If you recall from the "Lock Down Your Account" page create strong password.

  • The more character it has, the stronger it is.
  • Using a passphrase, a password made of multiple words, is one of the simplest ways to ensure that you have a strong password.
  • Enable two-step verification (also called two-factor or multi-factor authentication) when possible. It uses your password, but also adds a second step, such as a code sent to your smartphone or an app that generates the code for you. Two-step verification is probably the most important step you can take to protect your online accounts and it's much easier than you may think.

Updates:

  • Make sure all your computers, mobile devices, program and apps are running the latest version of its software by installing updates.
  • Cyber attackers are constantly looking for new vulnerabilities in the software your devices use.
  • By ensuring your computers and mobile devices install these updates promptly, you make it much harder for someone to hack you.
  • To stay current, simply enable automatic updating whenever possible.
  • This rule applies to almost any technology connected to a network, including Internet-connected TV's, baby monitors, security cameras, home routers, gaming consoles or even your car.