Sound Networks IT Support
Sound Networks IT Services
IT Support
Managed IT Services
Cyber Security
Knowledge Base
About Us

Request Quote

This site uses cookies for functionality and analytics Manage Close

Making your home "Office-Proof"

Remote work security

Cyber security at home isn't about dramatic hacks; it’s about avoiding the ordinary lapses—like leaving a laptop unlocked during a delivery—that lead to exposure. At home, work devices operate in spaces designed for convenience, not control. To keep our business secure, we must treat physical security as the first line of cyber defence. Following guidance from the NCSC and Microsoft, use this checklist as the minimum standard for working away from the office.

1. Physical Habits & Access

  • Lock the Screen Every Time: Set a short auto-lock timer. Habitually lock your device (Win+L) every time you step away, even for a moment.
  • Store Securely: When finished, store your laptop out of sight—not on the sofa or in a car. Treat it as a high-value asset.
  • No Shared Use: Never allow family or friends to use a work device. Even well-intentioned "quick checks" can lead to accidental downloads or data leaks.

2. Identity & Connectivity

  • Strong Sign-ins & MFA: Use long, unique passphrases. Multi-factor authentication (MFA) is a baseline requirement, not an optional extra.
  • Secure Home Wi-Fi: Change default router passwords and ensure modern encryption (WPA3/WPA2) is enabled. If your router is too old for security updates, it is a risk to the business.
  • Work Data in Work Storage: Only save documents to approved company cloud storage. Avoid personal accounts or local drives that aren't backed up or audited.

3. Device Health & Maintenance

  • Patch Fast: Enable automatic updates and restart your device as soon as prompted. Updates fix known "holes" that attackers actively exploit.
  • Keep Tools Active: Never disable firewalls or antivirus software. If security tools are causing friction, report it to IT rather than switching them off.
  • Minimalist Software: Only install approved applications. Remove unnecessary software to reduce the "attack surface" of the device.

4. Vigilance

  • Treat Pressure as Suspicious: If an email or message demands you "confirm now" or "click here" urgently, it is likely a phishing attempt. Verify through a separate, trusted channel.
  • Healthy Devices Only: Access to company systems is restricted to "healthy" devices that meet our security standards. Unmanaged personal devices should not be used for work tasks.

Security at home shouldn't be an obstacle course; it should be a routine. By mastering these fundamentals, we ensure remote work remains productive and protected. Is your home setup up to scratch? If you need help securing your home router or configuring your MFA, contact us today.

MSP
Watch Guard
Datto
Huntress
Dell Technologies
Hyper-V
BitDefender
Microsoft 365
3CX
Veeam
Signable
Cyber Essentials
MSP
Watch Guard
Datto
Huntress
Dell Technologies
Hyper-V
BitDefender
Microsoft 365
3CX
Veeam
Signable
Cyber Essentials
Need Help?