Skip to main content
YOUR SOURCE FOR IMPROVING INFORMATION SECURITY FOR YOURSELF AND OUR CES COMMUNITY.

Working & Studying from Home

Working From Home

As many jobs and classes shift to a more home-friendly hybrid approach, you may find yourself studying or working remotely. While this arrangement can be relieve stress for some, it also opens the door to more cybercrime. Home networks aren't afforded the same strength as campus networks, which means we need to be extra vigilant and informed about information security at home. Use the following guidelines to master your home's data security.

1—Protect Data and Information

  • Use university provided laptops/workstations if possible and do not allow other family members to use.
  • Do not store sensitive university information on personal devices and home computers. Use the BYU Box online storage service instead (box.byu.edu).
  • Protect sensitive documents from the view of others in the home.
  • Use Duo multi-factor authentication service to protect your access to university applications (duo.byu.edu).
  • Make a habit of locking your computer when you step away. (For Windows, use the Windows key + L. For Apple Mac, use Command + Shift + Power Button).
  • Set boundaries to make sure family (including children) and friends understand they cannot use your work devices as they can accidentally erase or modify information or accidentally infect the device.

2—Protect Your Home Network

Home networks enable your devices to connect to the internet. Almost all of the home networks use a wireless router or access point, which makes securing your networks an important part of securing your home office.

  • Change the default administer log-in password and user name for your router. An attacker can easily discover the default password and user name that the manufacturer has provided.
  • Configure your home network firewall. Most home or small office routers already contain a built-in firewall. Ask your internet provider and check their website or that of the vendor’s website for steps on how to complete this process.
  • Work from a secured home network and do not access sensitive information or accounts using unsecured public Wi-Fi.

3—Keep Software Updated and Protected

Cyber attackers are constantly looking for new vulnerabilities in the software your devices use. When they discover vulnerabilities, they use programs to exploit them and hack into your devices.

  • Ensure each of your browsers, operating systems, and programs are running the latest version of software. Often you can setup automatic updates.
  • Install and run antivirus software. Use antivirus software, like CrowdStrike Falcon, to automatically scan websites, downloaded files, email attachments, and content.

Remember, technology alone cannot fully protect our data and systems. Each of us has the responsibility to be the first line of defense for information security threats. Although these guidelines are not all inclusive, implementing them will help secure your work and will help you create a secure home office environment.
For additional information, please e-mail cessoc@byu.edu with specific concerns or questions.

slideNumber:
student attending class on her laptop, while chilling out to some good lo-fi beats