More employees work away from the office now than ever before. Today’s technology allows employees to work virtually anywhere. But with greater mobility comes greater risk. To protect businesses and our clients, there are strict data security laws in place, and big fines for serious data breaches.
The company relies on you to keep its information safe. If your device is damaged, lost, or stolen, report it immediately so risks can be contained. Identify the risks, take the appropriate action, and escalate when necessary.
Hardware can be replaced. But when data falls into the wrong hands, our company can become involved in lawsuits. The damage can often be irreparable. Make sure you keep your devices close to you at all times.
In the past, the threat of malware applied only to PCs and laptops – now tablets and phones are targeted by malware. This is becoming a huge problem as so many staff now use mobile devices for work. You can protect your devices, and our data, from malware threats by making sure you do not permit others to use your device, maintaining work devices for professional purposes only, and immediately flagging any suspicious correspondences with the relevant department.
It is essential that information and equipment are always stored securely. Do not leave devices containing confidential information where they could be stolen or damaged. Ensure that devices are both encrypted and password-protected.
Thomas is traveling for business and wants to go online to complete some work.
Which of these connection options is the most secure?
- Using a PC in the hotel business center
- Connecting his laptop to the Wi-Fi while in the bar
- Connecting from his room, over Ethernet using VPN
- Using the personal hotspot on his phone
Wired networks are usually more secure than their wireless equivalent. Connecting by Ethernet from a hotel room allows you to use your company laptop more securely, and using the VPN software should ensure the security of the connection. Don’t take chances though. If you don’t trust the hotel, a location, or the connection don’t log on and seek help. If you don’t know who to contact with questions, you can find out here.
Thomas has an important electronic document to send.
- Save it to a USB device and send it by courier.
- Encrypt the file with company-authorized encryption and zip the file to send by email.
- Transfer it over the VPN.
- Attach it to an email and send it.
Thomas now knows that the ideal solution is to transfer files over a secure VPN connection. If you must use email, ensure that any confidential information is properly encrypted.
- Recognize the risks when connecting remotely to your office.
- Know that you are responsible for the security and safety of your mobile devices.
- Understand that you must encrypt sensitive data when transmitting it by any means
This content is an extract from the data privacy training course