ESSENTIAL SECURITY PRACTICES FOR REMOTE WORKERS

Remote work has become increasingly common and has redefined the modern workplace. The days of rigid office schedules and commutes are behind us. However, with this flexibility introduces a new set of challenges, cybersecurity threats. 

ESSENTIAL SECURITY PRACTICES FOR REMOTE WORKERS

To ensure data integrity and safeguarding against cybersecurity threats, remote workers should adhere to essential security practices in any working location.

Implement these 12 practices to enhance security measures:

  • Secured Connection - Ensure your WIFI connection is secure by using WAPA3 encryption for your home network, use a VPN to encrypt internet traffic and ensure secure communication when connecting to the network.
  • Strong Passwords - Use strong and unique passwords for all accounts. Make sure to use trusted password managers to generate and store strong passwords securely. 
  • Updates and Applications - Protect devices by ensuring the latest Operating System and application updates are applied.
  • Protective Security Software - Use Anti-virus and Anti-malware.
  • Device Safety - Lock devices when not in use, even when working from home. 
  • Backup Data - make sure you backup your data regularly to an external drive or cloud service in case of ransomware attacks or hardware failure.
  • Use Encryption - make sure storage devices are encrypted to prevent data theft in case they are lost or stolen.
  • Use Safe Browsing Practices - Avoid entering personal information to websites that lack HTTPS, websites that use HTTPS (the lock symbol in the address bar) are secure as they encrypt the communication between your browser and the website you are accessing. 
  • Practise Safe File Sharing - Use secure file-sharing services like OneDrive, Google Drive or company approved platforms which offer encryption. Limit access to shared files and folders, providing permissions to only those users which need access. 
  • Keep Updated with Policy - Regularly review security policies and ensure staff stay up to date with your company's remote working policies and security guidelines.
  • Stay Aware - Engage in cybersecurity awareness training.
  • Accountability - Take personal responsibility and be vigilant. 

Migrate Multiple Projects Between BIM 360 and ACC: What you need to know

09 June 2025

As Autodesk gradually shifts its focus from Autodesk BIM 360 to the more unified and scalable Autodesk Construction Cloud (ACC), many AEC organisations are navigating the complex process of migrating active and archived projects. While ACC offers enhanced collaboration, improved workflows, and long-term scalability, the path to get there isn’t always straightforward. In this post, we will explore some key complexities organisations face when migrating data from BIM 360 and ACC and offer insights on how to streamline the process.

Hidden Risks You Might Be Ignoring

21 May 2025

In this month’s IT Bulletin, we’re shedding light on the cybersecurity threats that often go unnoticed — but can have serious consequences for businesses of any size.

How to Simplify Configuration for your Engineering Software

20 May 2025

In this blog, we’ll look at some common challenges teams face when configuring engineering software and share practical tips on how to simplify the process. We’ll also explain how Symetri’s solutions can help you optimise your software setup, reduce errors, and keep your projects running smoothly.