Menu

News Article

IT & Internet

WorkLight offers top tips for security on National working from home day

By CreditMan Thursday, May 15, 2008

London, Thursday 15th May 2008 - Today is National Work from Home Day which could see an estimated five million people not coming into work but instead working from the comfort of their home. However, even though employees will be sitting comfortably, the IT mangers will no doubt be uncomfortable at the thought of the security issues that exist around working from home.

To ease this discomfort, here are some top tips from WorkLight, an Enterprise 2.0 company, on how to be safe and secure while working from home along with an animation on the benefits of bringing the home into the office:

Top Tips for Working Securely from Home

1 - Use an approved computer for working at home. This way, the company has verified that the necessary protections are in place (up to date virus protection, approved VPN tools, etc.). This will protect you from introducing malware into your company’s environment inadvertently and it will protect you from your company’s ire if “something goes wrong.”

2 - Make sure everything is updated. Before you start working on your computer or laptop make sure you turn on your automatic updates for your applications as well as installing the latest anti-virus and anti-spyware software to make sure you and your personal information is also protected.

3 - Never enter your username and password on a page you arrived at by clicking on a link in an email, IM message, third party web site or social networking site. These are the tools hackers use most often to steal passwords.

4 - When entering your username and password on any site, always verify first that the URL in the browser’s address bar matches the URL of the site you (think) you are accessing. This is the best way to ensure your password won’t be intercepted by some evil-doer.

5 - Set limits about what you are willing to expose about yourself when working online and remember the context of the interaction (business or personal). Be wary, since embarrassing or inappropriate information about yourself may appear in contexts that you did not expect. It is very difficult to “clean up” your profile later on.

6 - Social networking sites and blogs are business tools, make sure you are using a safe environment for professional networking. Treat the network as a resource of valuable information, and tap into your colleagues’ expertise with the collaborative tools available on the network.

7 - Secret is not secured. Some social networks, like Facebook, allow users to engage in private or secret groups. Although these forums take place away from the public eye, apt hackers can still crack open the discussion boards and access conversations, unless appropriate enterprise-grade safeguards have been put in place.

8 - When adding RSS feeds to a feed reader, always prefer to use a link you got from the content provider’s web site rather than from any third party (an email, an IM, a link on a social networking site etc.) This improves the likelihood that the information you are seeing is what the content provider intended.

9 - When accessing corporate applications from a web browser, use a separate browser instance, not just a new tab or a new window opened from the browser you are using to access public sites. This makes it more difficult for hackers to launch request forgery attacks that target your corporate systems.

10 - When using public sites for work related tasks, be aware of the information you expose. Keep In mind, the search queries you run, the sites you visit, your web-based bookmarks and tags, the RSS feeds you've subscribed to and your social network connections are all potential sources for data leakage.

11 - When using Web based collaboration tools, avoid exposing proprietary information. Even when communicating with colleagues, the information you provide can easily become accessible to unauthorized parties.

12 - Familiarise yourself with your employer's acceptable use policy for employee blogs and social networks. Adhering to such policies will help avoid any unpleasant situations. If your employer hasn't published such policies, demand them.

13 - Keep personal and business “digital assets” separate. As personal lives and business lives merge, it becomes increasing compelling to do personal tasks on work time. Be careful not to merge these two lives on your computer. Some tips - use business time for business and do not store personal files on your business computer (and vice versa).

Here is a short animation movie on bringing the home into the office! - http://www.myworklight.com/animation

For further information or to speak to WorkLight’s Vice President Marketing & Product Strategy, David Lavenda, Please contact Darshna Kamani on 020 7183 2834 or email Darshna@eskenzipr.com

About WorkLight
WorkLight™ Inc. develops and markets a line of server products that consumerise the corporate computing experience, by making popular consumer services like iGoogle, MS Live, Netvibes, and Facebook "enterprise-ready." Through WorkLight, employees and consumers connect to protected enterprise data (and to each other) using Web 2.0 services.

WorkLight is a venture-backed company with offices in Boston, Massachusetts and Yakum, Israel. WorkLight has received prestigious industry accolades including being selected as a Winner of the Red Herring 100 Europe 2008 Award, named as one of the "Five Enterprise 2.0 Startups to Watch," by Information Week magazine, selected as part of CIO Magazine's Web 2.0 Product Suite, and singled out with an honourable mention as one of Computerworld's "10 Cool Cutting-edge Technologies on the Horizon." WorkLight also received the "Stay Organized" award at Microsoft's Under the Radar Conference. For more information, visit www.myWorkLight.com