Skip Navigation

Securing Remote Work

Work Anywhere, The University of Oklahoma website wordmark
Skip Side Navigation

Securing Remote Work

11 Connection Requirements

While working remotely, it is imperative that you be cognizant of security options since you may not have the same network level protections we employ at the University. We recommend following these steps to secure your laptop, smartphone, tablet, applications, and data while using a public Wi-Fi or Internet connection.

That starts with you as a human firewall. Technology can't get hacked without human error. To equip yourself with Digital-Self Defense tools, review the COVID-19 Cybersecurity Alert page for tips against social engineering.

In addition, ensure the firewall is turned on for all your devices.

Be sure to change your default admin password. Manufacturing passwords are easy for hackers to find.

Use strong passwords so that only people you trust can access your home network. 

Passphrases are the easiest way to ensure a strong password. Passhprases are made up of multiple words and meet the critera of not using dictionary words.

For example: I love 20 chicken nuggets and 1 chocolate milk! = iL20cna1cm!

In addition to passphrases, use different passphrases for each device, or online account, to ensure if one is hacked the others can't be hacked as well. Visit OU IT's Cyber Hygiene page for a list of password managers.

Keep your device operating system, applications and antivirus software updated. Hackers are constantly searching for vulnerabliites. Enable automatic updates for your systems and check for updates at least once a month to ensure everythign is downloading properly. 

Encrypt all the data on your device before you travel. Encryption may be a regulatory requirement at all times for some devices and data.

Turn off file sharing and airdrop on your devices and turn off Wi-Fi when not in use.

If handling sensitive or regulated data, connect to campus through the VPN and multi-factor authentication where applicable, which will ensure the data stays encrypted. You should follow established policy for encrypting your endpoint if you will be working with sensitive or regulated data.

Beware of public Wi-Fi or public Internet hubs. Preferably, use a secure Internet connection such as those that leverage a password for authentication and encrypt your Internet session.

If at all possible, do not use a public Wi-Fi or Internet connection to conduct financial transactions (e.g., accessing your bank account or using your credit card) or access regulated or confidential data.

In the list of available Wi-Fi networks, choose the exact name that matches the Wi-Fi name your hotel or provider gave you. Hackers often set up names that are similar to try and trick you into logging into the wrong network and steal your information.

Use a network that has a lock icon or says “secure” and requires a password from your provider.

If possible, take your own hotspot or pay for a subscription to a hotspot service.

Family and friends can accidentaly erase, modify, or infect devices. Help them understand work devices cannot be used.

Set your device to ask you before joining networks rather than connecting automatically.

 

Use web sites that use HTTPS and SSL encryption. Look for the lock icon and “secure” in the address bar.

Need More Info?