By accepting you will be accessing a service provided by a third-party external to

Basic Wireless Security for Remote Work

Basic Wireless Security for Remote Work

With remote work becoming a popular option amongst businesses nowadays, concerns and considerations should be raised about how secure the networks being used are: namely, the Wi-Fi connections many have in their homes. Just as in the office, it is important that these networks are properly secured for the good of your business.

Let’s review how your employees can still work remotely, while also maintaining the security standards you expect. This will require them to follow a few practices with their home networks:

Use Password Best Practices

It doesn’t matter that a home network is different from a business network, as password best practices are generally universal. Therefore, when setting the credentials for your home network, make sure that the usual standards apply, and that the rest of your team does the same. Here are three things that can help you keep your Wi-Fi secure:

  • Make sure that your passwords are sufficiently complicated, avoiding common phrases and password rules. There are many articles that can be found online that summarize the most popular (which means insecure) passwords, and there are a few patterns that can be spotted quite easily. Avoid using these kinds of shortcuts.
  • Consider using a passphrase, instead of a password. A good passphrase is the combination of random, unrelated words, and relying on one of these can boost the resilience of your accounts exponentially.
  • Change your network access password regularly and avoid giving it out. Most people won’t need the password to your Internet connection, so don’t give it to them.

Keep Your Setup Up to Date

Many people may not think to update their networking equipment until things start to work poorly. However, in order to take advantage of remote access, you and the other users connecting need to make sure that their tools are fully optimized and secured. A few pointers:

  • Install a firewall and antivirus. While these protections are sure to be installed on your professional network/workstations, there may not be enough on an employee’s device. Make sure you know what they currently have, and if need be, have them install a stronger version of both. A Virtual Private Network (VPN) should always be in use.
  • Adjust your hardware settings. It is likely that your employees have not updated all their networking hardware or are not using it with the best configurations enabled. Take the steps to walk your employees through the process of changing the SSID on their router and other customizations.
  • Make sure that all software is fully patched and updated. Whether your employees are using devices supplied by the workplace or their own equipment, make sure the proper security tools are installed and up to date. This includes the programs they are using to complete their tasks, as well as the software that controls and secures their devices, like their wireless router, their antivirus, and their firewall.

Of course, your employees should also be just as aware of the computing best practices that you should be enforcing in the office while they are working from home. For more security best practices and solutions, give BNMC a call at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, June 07 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Productivity Business Computing User Tips Privacy Cloud Email Network Security Microsoft Hosted Solutions Software Hackers Computer Malware Efficiency Business Communication Data Google Small Business Workplace Tips IT Services IT Support Mobile Devices Tech Term Cloud Computing Hardware Managed IT Services Internet Data Recovery Innovation Ransomware Backup Users Outsourced IT Smartphone Mobile Device Windows Smartphones Android Upgrade Saving Money Miscellaneous Data Backup Information VoIP Facebook Server Business Management Phishing Windows 10 communications Business Continuity Microsoft Office Browser Disaster Recovery Productivity Office 365 Social Media Managed IT Services Network Cybersecurity Passwords Internet of Things Data Management Windows 10 Gadgets Word App Gmail Vulnerability Remote Monitoring Encryption Quick Tips Chrome Mobile Office Infrastructure Apps Managed Service Artificial Intelligence IT Support Access Control Money VPN Save Money Information Technology Settings Managed Service Provider Applications Router Virtual Reality Tip of the week Analytics Company Culture Website Networking Remote Workers Employer-Employee Relationship BYOD Display Big Data IT Management Data Security Paperless Office WiFi HIPAA BDR Virtual Private Network Robot Unified Threat Management Google Drive Bandwidth Automation Content Filtering Collaboration Firewall Education YouTube Maintenance Apple Storage Avoiding Downtime Employee-Employer Relationship Risk Management Antivirus Government Computers Office Tips Hacker Data storage Development Windows 7 Hard Disk Drive The Internet of Things Outlook Software as a Service Spam Computing Server Management Bring Your Own Device Operating System Business Technology Vendor Management Social Downtime Touchscreen Monitors LiFi Humor Marketing Mobile Security Chromebook Hosted Solution Managed IT Administration Tablet Data loss Best Practice Telephone Systems Mouse iOS desktop End of Support Business Intelligence Going Green Two-factor Authentication Remote Computing Conferencing Managed IT Service Customer Relationship Management Managed Services Scam SaaS Printing Document Management MSP Wi-Fi Password Augmented Reality Wireless Managing Stress Holiday Solid State Drive Virtualization Break Fix IT Search OneNote Social Network Data Breach Training Retail Alert Laptop Automobile Motherboard Cables Politics Network Management Alerts G Suite USB Co-Managed IT Dark Web Holidays Work/Life Balance Alt Codes Managed Services Provider Fraud Cost Management Dell Customer Service Onboarding GDPR Cyber Monday Distribution Identity Continuity Remote Work Screen Reader Cabling Charging Health Private Cloud Slack Hard Disk Drives Legislation Smart Office WannaCry Office Samsung Print Toner Myths Google Maps Wires Tech Support Messaging SharePoint Licensing Dongle Budget Cybercrime Content Huawei Microsoft Excel Payment Card Typing Entertainment Techology Vendor Assessment Digital Signage Data Warehouse Smart Technology Logistics Solar Lenovo Mobile Management Smart Tech Current Events Monitoring Statistics Solid State Drives Work Social Engineering How To Shortcuts Voice over Internet Protocol Websites Employee-Employer Relationships Downloads Cooperation Service Level Agreement Streaming Mail Merge Processor Blockchain Inventory Cryptocurrency VoIP Unified Threat Management Hybrid Cloud Hotspot Internet Exlporer Troubleshooting Shortcut Business Analysis Distributed Denial of Service Asset Management Compliance Digital Payment Halloween Firefox Security Cameras Superfish Profiles Peripheral Connectivity Disaster IT solutions Spying Bluetooth National Security Comparison IT Technicians Optimization Digital Safety Google Docs Modem FinTech Hacks Analysis Students Staff Leominster Human Error Address Memory Permissions Shadow IT Bitcoin Scalability User Error Language Value Network Congestion Google Wallet Patch Management Virus Memes Regulations Scary Stories Utility Computing IoT Uninterrupted Power Supply Updates Specifications Mirgation Recycling Spyware Business Growth File Sharing Cookies Heating/Cooling Mixed Reality Multi-Factor Security Computer Care K-12 Schools IBM Writing Legal Running Cable Device Reducing Cost Gamification Social Networking Windows 8 Buisness Time Management Migration Printer Consulting Computing Infrastructure Professional Services Unified Communications Drones LED Threats Sports Laptops Star Wars Dark Data Update PowerPoint Virtual Desktop Black Friday Chatbots Identity Theft eWaste COVID-19 Nanotechnology Mobile Device Management Servers Google Calendar Wearable Technology Network upgrade Corporate Profile Deep Learning Mobility Emergency Batteries Mobile Data Financial Recovery Supercomputer CrashOverride How To Motion Sickness Mobile Computing Staffing Administrator Taxes Black Market Law Enforcement Web Server what was your? IT Budget Regulation Electronic Medical Records GPS Notifications Physical Security IT Consultant Twitter Upgrades Gadget Cameras Emoji Meetings Tracking Crowdsourcing Personal Information Botnet Cleaning 3D Printing CCTV Cortana Printers Webcam Machine Learning Processors Error Unsupported Software Point of Sale Ben McDonald shares Travel Computer Repair Relocation

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3