- Secure connection. A secure, encrypted connection is accomplished by using Virtual Private Network (VPN) software. WSU faculty and staff can connect to Weber State's secure network from off campus. VPN Installation Instructions Once you have your WiFi connection up and running the VPN should be the very next thing you do before you login to your Weber accounts. The VPN ensures that the traffic through your WiFi device is encrypted. This step is critical that you do before anything else.
- Keep Work Data on Work Computers. It can be tempting to use your personal computer if your work computer is not in a convenient place, but the risk is to high for you and our company. Ensure you only work on work data on your work computer.
- Ensure Physical Security. Improve your home security by locking your office or securing your laptop. You don't want the stress of a stolen device.
- Log off or Lock your Screen. If you walk away, even for a minute, please ensure your device has a screen lock turned on and/or you have logged off.
- Stay current with updates and patches. Ensure that you are connecting your work device on a daily basis to allow the automatic updates and patching to continue.
Remote work can present a unique challenge for information security. When you work in your campus office you are working behind many layers of preventive security controls, but while you work remotely there are new risks that you have to prepare for. Review the list of Do's and Don'ts that can help you safeguard your connection and our data.
- Human Resources - How Do I Set Up My Employee(s) to Work From Home - Remote Work Resources
- Classroom Technology Services - Online Education and Remote Access Information- Online Resources
- Zoom - Best Practices - Securing your Zoom Virtual Classrooms and Meeting Best Practices
- Securing Your Remote Home Office - CIS Cybersecurity best practices for work from home cyber defenses
- Don't fall for email scams. There is always an increase in scams during high even situations. Be diligent in investigating the emails you receive. Check the email address of the sender before you ever respond or click on anything. Ensure it is a valid and safe email. Report any suspicious emails to ISO or the Service Desk.
- Don't use the computer in an high traffic area. Always think of who will have accessibility of viewing your device. Ensure that safeguard your computer screen from your family.
- Don't throw away sensitive documents. Ensure you shred any business documents that have sensitive or regulated business information.
- Don't access critical business or business systems from personal computers. If a hacker has installed a key-logging system on your unsecure family computer they can get the password to the most sensitive business systems.
- Don't print documents. If you don't need to print something save it as a pdf and store it in a work safe location. If you print a business document ensure you secure it immediately. Make sure no one can view documents they are not authorized to read.
- Don't have business phone calls where anyone can hear you especially if you discuss confidential information.
- Don't Use Random thumb Drives. Never use a thumb drive to store business data. Never use a thumb drive that you don't know where it came from.
- Don't leave your work devices unattended or in your vehicles. Criminals are always looking in parking lots waiting for the next victim. If you have to go out, leave your work device at home and secure it properly.