Categories: Articles

Take the risk out of working-on-the-go

used with permission from Microsoft For Your Business

The future of work is mobile. But you may be worried that working from anywhere, on any device, could expose you to added security risks. Whether you’re a road warrior or remote worker here are some simple tips to stay protected.

Bring your own WiFi

Working on the go can sometimes make you feel tethered to public WiFi. But free access points can be slow, unreliable, and worst of all, unsecured. Thankfully, you can use your Windows Phone as both a WiFi locator and a hotspot* to get connected on the go.

*Worried your WiFi hotspot will drain your battery? The Surface Pro 3 offers up to 9 hours of battery life when using WiFi. And a Windows Phone offers a battery-saver mode as well as cases that charge your phone on the go, like the camera grip case for the Nokia Lumia 1020.

Beware of ‘evil twins.’

An evil twin is a rogue WiFi network that appears to be legitimate, but has actually been set up by hackers for the purpose of stealing private information. (It’s the wireless equivalent of phishing.*) When in doubt, avoid doing sensitive business on public WiFi hotspots.

*Phishing – This is the attempt to acquire confidential information, like passwords and credit card info, through bogus emails that look like they’re from a trusted source.

TIP: Don’t share sensitive info via email, don’t click on unknown links or attachments, do install security updates and antivirus software, and check financial statements regularly.

Use a VPN if you’re not already.

If you must use public WiFi to get work done on the go (at the airport, coffee shop, or wherever), consider setting up a VPN, or virtual private networks, for your business. This allows employees to access private company data securely over a public network.

Make firewalls your friend.

A firewall prevents hackers and malware from accessing your computer via the Internet. Ensure that all company devices have firewall software installed and running, along with antivirus programs. This is a solid first defense against suspicious traffic.

Of course, nothing beats common sense. Be sure to talk to your employees about the importance of creating secure passwords, changing passwords frequently, and avoiding downloads or files from unfamiliar sources.

Losing a device shouldn’t mean losing sleep.

It can happen to the best of us—your shiny new phone or tablet, left in an airplane seat pocket or the back of a cab. Consider installing a device tracking app, password protecting your device, and always keeping your valuable data backed up in the cloud. And consider managing devices for your team so they don’t have to worry – Office 365 and Windows Intune allow you to remotely lock access, wipe data, and reset pins in the event of technology gone missing.

Remember – don’t panic. Everything you need is backed up in the cloud and accessible from anywhere:

  • The latest versions of your business documents are saved and accessible online, thanks to automatic version control from OneDrive for Business.
  • You still have easy remote access to on-site business apps, like accounting, HR, or CRM from your other devices.
eMazzanti Technologies

Recent Posts

How to Manage Remote Workers

With a global customer base, eMazzanti Technologies positions engineers and project managers in various locations…

4 years ago

Tips for Transitioning to Remote Work

Over a period of three weeks, most of the workforce in the United States found…

4 years ago

Collaborate with Exceptional Security and Privacy Using Microsoft 365 for Remote Work

Three years ago, Microsoft launched Teams, a powerful component of Office 365 (now Microsoft 365),…

4 years ago

You Look Marvelous! The Sprint to Video-based Team Interaction

In our new work-from-home (WFH) world, the requirement for on demand video conferencing has exploded…

4 years ago

5 Endpoint Security Best Practices When Remote Work Takes Center Stage

With the majority of employees working from home this spring, organizations have encountered new challenges.…

4 years ago

Cloud-based Security Solutions Deliver Powerful, Scalable Protection for SMBs

The average small to medium business (SMB) has most likely migrated at least some essential…

4 years ago