Skip to the content
  • Why Vertex
    • Expertise in Education
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
  • Why Vertex
    • Expertise in Education
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
LOG IN

Top Cyber Security Recommendations When Working From Home

Below are 7 top cyber security recommendations when working from home during The COVID-19 pandemic. Both Vertex Security and the ACSC (Australian Cyber Security Centre) offer these recommendations because working from home has specific cyber security risks.

Unfortunately, targeted cybercrime is on the rise and access to your information can have a devastating effect on both your finances and your work life.

Beware of Scams

Cybercriminals may try to turn a crisis into an opportunity. They may try to use the COVID-19 pandemic disruption to scam you and gain access to your systems. While working from home we recommend being extra cautious when opening messages, attachments, or clicking on links from unknown senders. As well as be wary of any personal details, passwords or bank detail requests.

Always Use Strong and Unique Passwords

 

Strong passwords are more important than ever right now. Be sure to use a strong and unique passphrase on all your devices including as laptops, mobile phones and tablets.

Use a different passphrase for each website and app, particularly those that store your credit card details or personal information. To use the same username (such as an email address) and passphrase for multiple accounts means that if one is compromised, they are all at risk.

Implement Multi-factor Authentication

Multi-factor authentication is one of the most effective ways to prevent unauthorised access to computers, applications and online services. It makes it much harder to access your systems. Cybercriminals might manage to steal one type of proof of identity but it is very difficult to steal the correct combination of several proofs for any given account.

You can view the ACSC Step-by-Step Guides – Turning on Two-Factor Authentication

Update Your Software And Operating Systems

Software updates are often developed to address security issues. So, it’s important to allow automatic updates on your devices. Updates also often include new security features that protect your data and device.

Training Your Employees To Be Cyber Safe

Working from home has different cyber security risks and threats that need to be understood and managed differently. 

We can perform our audit’s remotely with Zoom or Google Meet. Through some simple questions and our technology we can gather all the information to perform our assessment and provide an Audit report. Our Audit report includes an explanation of each Cyber Risk and the actions you and your employees need to take to reduce the risk.

Find out more about our Work From Home Cyber Security Audit.

Use Trusted Wi-Fi

Often free wireless internet networks can put your information at risk and can expose your browsing activity to cybercriminals. Cybercriminals have also been known to set up rogue Wi-Fi hotspots with names that look legitimate and can intercept communications, steal your banking credentials, account passwords, and other valuable information.

Use trusted connections when working from home, such as your home internet or mobile internet service, or VPN provided by your work.

Avoid Using Portable Storage Devices

If possible, transfer files in more secure ways than USB drives, such as your organisation’s cloud storage or collaboration solutions. When using USBs and external drives, make sure they are protected with encryption and passphrases.

 

CATEGORIES

Cyber Security

TAGS

Business cybersecurity - cyber - cyber attack - cyber insurance - cyber risk - cyber security - cyber security audit - cyber security monitoring - cyber security training - cyber security vulnerability - work from home - work from home audit

SHARE

PrevPreviousPassword Fingerprint Cloning
NextShould I use COVIDSafe the Australian contract tracing app?Next

Follow Us!

Facebook Twitter Linkedin Instagram
Cyber Security by Vertex, Sydney Australia

Your partner in Cyber Security.

Terms of Use | Privacy Policy

Accreditations & Certifications

blank
blank
blank
blank
blank
  • 1300 229 237
  • Suite 13.04 189 Kent Street Sydney NSW 2000 Australia
  • 121 King St, Melbourne VIC 3000
  • Lot Fourteen, North Terrace, Adelaide SA 5000
  • Level 2/315 Brunswick St, Fortitude Valley QLD 4006, Adelaide SA 5000

(c) 2025 Vertex Technologies Pty Ltd.

download (2)
download (4)

We acknowledge Aboriginal and Torres Strait Islander peoples as the traditional custodians of this land and pay our respects to their Ancestors and Elders, past, present and future. We acknowledge and respect the continuing culture of the Gadigal people of the Eora nation and their unique cultural and spiritual relationships to the land, waters and seas.

We acknowledge that sovereignty of this land was never ceded. Always was, always will be Aboriginal land.