Thursday, March 5, 2020
Working Online Protecting Your Identity And Your Work - Introvert Whisperer
Introvert Whisperer / Working Online Protecting Your Identity And Your Work - Introvert Whisperer Working Online: Protecting Your Identity And Your Work Ashley Andrews January 6, 2017 Adaptability, Career Development No responses Working from home is every introvertâs dream. Not only does it take away the pressure of having to deal with your co-workers in person, itâs cheaper and you will get a lot more done! Of course, working from homewhether itâs running your own business or telecommuting as an employeedoes present some unique challenges. Most notably, you have to be more vigilant about protecting your work and your identity than you do when you work out of someone elseâs company space. Keeping Private Data Private Whether you are working as an employee or are building your own business, it is incredibly important that you not leave proprietary information digitally lying around. For example, donât keep financial information in an easily accessible cloud folder or on a computer without malware and hacking protection. Instead, keep important documents on a SecureUSB that you only plug into your device when you absolutely have to. This way, even if someone does break in and take a stroll through your files they wonât find anything. And, of course, having a backup of your backup is always a good idea. Just Say No to BYOD If you are telecommuting as someone elseâs employee, ask that your employer provides the machine on which you will be doing your work. Supplying your own computer opens up your personal information to whatever prying eyes might be trying to take advantage of your employeror that one coworker who isnât exactly subtle about wanting your job. If your employer is hesitant, remind them that there are many advantages to their providing you with the computers and devices youâll need for work. For instance, they can install monitoring software that will track whatever you do while using that device (allowing them to keep tabs on your productivity). They can also decide which malware protection and software will be downloaded. They wonât have that level of control if youâre using your personal device! Protecting Personal Devices If you lose that battle with your employer or if you are building your own business, you will need to take some extra steps to protect your company as well as your personal information. Basic malware protection isnât going to be enough. Here are some extra steps you can take: Email Encryption: encrypting your email doesnât have to be complicated or require extensive knowledge of coding like it used to. Today there are a bunch of different plugins that you can download and install that will do all of that work for you. Obviously, if you want to learn the code yourself, thatâs great! But if your brain doesnât speak code, a plugin will work just fine. File Encryption: In addition to encrypting your communications, you should also use drive and file encryption to thwart any jerks who are able to skirt your malware protection protocols. File encryption is usually built into most computing these days but if you want to add some extra protection, using independent encryption is better. These codes are updated far more frequently than built in encryption is updated by manufacturers. Password Protection: You likely already know the basic rules of creating a really good password. And you also likely already know that you need to create multiple passwords and you need to change them often. Doing this can eat up a lot of your time and still leaves you slightly vulnerable. A better option is to use a password protection program that uses two-factor authorization for use. This way you donât have to remember or manually enter your passwords and the two-factor authorization will prevent data breaches from compromising your information. Two Factor Authorization: Speaking of two-factor authorization, turn on this feature on every account that offers it. Two-factor authorization, or TFA, is where an account requires a second form of authorization from you before it will allow you or anyone else access to an account. This second form of authorization might be a code that gets sent to your cell phone via text. Sometimes it will be a regenerating code that you access via a key like Google Authenticator. Some companies will even send you physical âkeysâ that you plug into your USB ports. Not only does TFA keep your accounts secure, it will let you know immediately if someone is trying to access those accounts without your permission. Remember, working from home has a lot of perks but that doesnât mean that you can be complacent when it comes to your privacy and proprietary data. Use the tips weâve shared here to make sure youâre as safe as possible and that sensitive information doesnât fall into nefarious hands. Ashley Andrews is an entrepreneur and blogger. She now lives in San Diego, CA and is happily self-employed. She enjoys writing about anything that catches her interest, especially business and entrepreneurship. Go to top CAREER ACCELERATION Do you know what your next career step is? Many people donât. I want to help you accelerate your career by connecting you with your Free Instant Access to my eBook on how to construct your Career SMART Goals â" that will help you put together your actions and keep you accountable. Get your copy now and start your action plan today! Brought to you by Dorothy Tannahill-Moran â" dedicated to unleashing your professional potential. Introvert Whisperer
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.