Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Edge Slideshows

11/25/2019
01:45 PM
Ericka Chickowski
Ericka Chickowski
Edge Slideshows
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Home Safe: 20 Cybersecurity Tips for Your Remote Workers

How can you protect your precious corporate endpoints from the mysterious dangers that might await when you're not by their side? Empower home office users with these tips.

Segment Off Your Personal Network

'One of the easiest ways of protecting work-at-home endpoints is to put company assets on their own wireless networks. A home user can connect more than one wireless device to their cable modem or other gateway device and keep their personal devices, home automation, or other components on a separate network. Especially if the company configures and provides the device, it can minimize the risks of disclosure of WPA keys or other avenues of attack.' 
--Jacob Ansari, senior manager of payments industry assessment services, Schellman & Co. 


Image Source: Adobe (Antonio)

Segment Off Your Personal Network

"One of the easiest ways of protecting work-at-home endpoints is to put company assets on their own wireless networks. A home user can connect more than one wireless device to their cable modem or other gateway device and keep their personal devices, home automation, or other components on a separate network. Especially if the company configures and provides the device, it can minimize the risks of disclosure of WPA keys or other avenues of attack."
--Jacob Ansari, senior manager of payments industry assessment services, Schellman & Co.

Image Source: Adobe (Antonio)

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Previous
13 of 21
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
   OVER THE EDGE
An Identity Management Spin on Shaggy's Hit Song

Source: Emirates NBD

What security-related videos have made you laugh? Let us know! Send them to [email protected].

The Edge Cartoon Caption Contest: Latest Winners, New Toon 'Like a Boss'