Secure Computing: Best Practices for Remote Workers

Safeguard Your Devices

It's important to safeguard your personal computers, mobile devices, tablets, and other devices while working remotely.

  • Personal computers may be any brand, running a modern operating system that still receives security updates.
  • The computer must be able to connect to Columbus State’s campus network and the Internet using Wi-Fi or a high-speed Ethernet connection.
  • The computer must be equipped with virus protection and firewall software, which needs to be installed and running prior to connecting the computer to the Columbus State network.
  • All persons who utilize Columbus State resources such as network, campus labs, etc., are expected to abide by the Information Technology Policy.

Computing Best Practices

  1. Enable personal firewalls
  1. Perform regular operating system, software, and app updates. These updates often include security patches.
  • Learn more about Windows and MacOS X operating system updates.
  1. Use current and active antivirus and antispyware software. 
  • Schedule daily antivirus updates and scans.
  • Note that Windows 10 has Windows Defender Antivirus built in and automatically turned on.
  1. Make sure your passwords are protected.
  • ​​​​​​​Do not share passwords or write them down.
  1. Connect to secured and trusted Wi-Fi, avoid free Wi-Fi.
  • Create a strong, unique password for the Wi-Fi connection.
  • Use latest encryption, WPA-2 or WPA-3 where possible.
  1. Do not store college data on personal equipment.
     
  2. Watch out for phishing scams and suspicious calls.
  • Scammers often target holidays and large events
  • If it looks suspicious, report it!
  1. Lock your computer when not in use.
     
  2. Enable multi-factor authentication (MFA) where available.

Restricted & Privileged Data

Do not store restricted and privileged data on personal computing devices. Examples include:

  • Attorney - Client Privileged Information
  • Credit Card or Payment Card Industry (PCI) Information
  • Federal Information Security Management Act (FISMA) Data
  • IT Security Information
  • Personally Identifiable Information (PII)
  • Protected Health Information (PHI)
  • Social Security Numbers
  • Student Education Records (FERPA)
  • Student Loan Application Information (GLBA)
  • Other Sensitive Institutional Data
Was this helpful?
0 reviews