Search
Close this search box.

Insights

What Employees Can Do to Increase Data Security While Working Remotely

William J. Nowik

ABOUT THE AUTHOR

William J. Nowik

Principal & Chief Information Security Officer

Read Bio

AREAS OF EXPERTISE

Financial Services
Healthcare
Manufacturing
Distribution & Retail
Technology

Share

LinkedIn
Facebook
Threads
X
Reddit
Email

As more and more states and districts establish various levels of social distancing, social isolation, and stay-at-home guidance during this COVID-19 pandemic, businesses have been instituting their own orders for employees to work remotely. As these movements begin, it is more crucial than ever to remain diligent on data security best practices—especially at home. Here are a few reminders of what you can be doing remotely to ensure the confidentiality and security of assets and information.

1. Work Space

If you live with others, be cognizant of where your screen is situated. Remember to lock your screen if you walk away from your computer to limit access by unauthorized parties.

2. Phone Etiquette

When having phone or video conversations pertaining to client information, seclude yourself in an area where you can ensure client privacy.

3. Printing

Limit printing. If it’s not critical to print, avoid it. Refrain from printing confidential information outside of the workplace.

4. Shredding

If you do have to print documents, shred them (if you have a personal shredder). For those without a personal shredder, store the documents in a secure location until they can be brought back to your office.

5. Phishing Emails

Hackers and malicious actors might be taking advantage of the panic caused by COVID-19. Don’t get caught up in the anxiety and potentially click on a false email proclaiming important information pertaining to the virus. Be cautious of business email compromise (BEC) and remain alert for suspicious emails imitating your organization’s leadership or other employees.

Conclusion

The uncertainty and instability caused by a pandemic does not have to lead to system insecurity. By following these protocols, your organization can evade data breaches and protect assets.

CONTACT
William J. Nowik

William J. Nowik

Will is a Principal in Wolf’s Advisory Group and the Firm’s Chief Information Security Officer. He also leads Wolf’s New…

Read Bio

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
Get the insights that matter.

Stay informed with priority news and key industry updates by filling out the form to subscribe.
Name*
This field is hidden when viewing the form

Connect with a Wolf Expert

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Wolf Inquiry Form

Fill out the form below and our team will reach out to you soon.
Name*

Newsletter (Insight & Case Study | Wolf Website

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
Get the insights that matter.

Stay informed with priority news and key industry updates by filling out the form to subscribe.
Name*
This field is hidden when viewing the form

Data Solutions | LinkedIn Ads Form

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Data Solutions Inquiry Form

Fill out the form below and our team will reach out to you soon.
Name*

Get back to business with accounting support from Wolf & Company.

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Outsourced Accounting Solutions Inquiry Form

Fill out the form below and our team will reach out to you soon.
Name*

Data Solutions | Page

Get back to business with accounting support from Wolf & Company.

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
Fill out the form below and our team will reach out to you soon.
Name*

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Data Solutions Inquiry Form

Fill out the form below and our team will reach out to you soon.
Name*

Connect with a Wolf Expert

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Wolf Inquiry Form

Fill out the form below and our team will reach out to you soon.
Name*

Fintech Inquiry Form

Fill out the form below and our team will reach out to you soon.
Name(Required)

Fintech Inquiry Form

Fill out the form below and our team will reach out to you soon.

Get back to business with accounting support from Wolf & Company.

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Outsourced Accounting Solutions Inquiry Form

Fill out the form below and our team will reach out to you soon.
Name*

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

DenSecure Inquiry Form

Fill out the form below and our team will reach out to you soon.
Name*

We’re here to help.

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
Fill out the form below and our team will reach out to you soon.
Name*
This field is hidden when viewing the form