{"id":2252,"date":"2022-10-03T20:54:00","date_gmt":"2022-10-04T00:54:00","guid":{"rendered":"https:\/\/joindeleteme.com\/?p=2252"},"modified":"2024-10-09T11:18:16","modified_gmt":"2024-10-09T15:18:16","slug":"privacy-at-work","status":"publish","type":"b2b-post","link":"https:\/\/joindeleteme.com\/business\/blog\/privacy-at-work\/","title":{"rendered":"10 Ways to Reboot Your Privacy at Work"},"content":{"rendered":"\n<p><strong>When personal data is out there on the open web it can lead to privacy and security incidents at work that <\/strong><a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2022\/06\/23\/privacy-as-a-growing-and-changing-source-of-business-risk\/?sh=662e76f03c1c\" target=\"_blank\" rel=\"noopener\"><strong>open you\u2014and your company\u2014up to risk<\/strong><\/a><strong>. For cybersecurity awareness month, we&#8217;re offering tips on rebooting your privacy at work.<\/strong><\/p>\n\n\n\n<div class=\"wp-block-rank-math-toc-block uk-card-default uk-padding\" style=\"font-size:16px\" id=\"rank-math-toc\"><h4>Table of Contents<\/h4><nav><ul><li><a href=\"#video-meetings\">Video Meetings\u00a0<\/a><\/li><li><a href=\"#smartphones\">Smartphones\u00a0<\/a><\/li><li><a href=\"#email-safety\">Email Safety\u00a0<\/a><\/li><li><a href=\"#general-computer-safety\">General Computer Safety\u00a0<\/a><\/li><li><a href=\"#computer-software\">Computer Software\u00a0<\/a><\/li><li><a href=\"#passwords\">Passwords\u00a0<\/a><\/li><li><a href=\"#internet\">Internet\u00a0<\/a><\/li><li><a href=\"#linked-in\">LinkedIn\u00a0<\/a><\/li><\/ul><\/nav><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"video-meetings\"><strong>Video Meetings&nbsp;<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Blur your backgrounds when on video calls.&nbsp;<\/li>\n\n\n\n<li>Keep the microphone muted when not in use.<\/li>\n\n\n\n<li>Be wary of the information that others may see when you share your screen. Consider sharing a specific tab or application instead. Hide the bookmarks bar if exposed on open tabs.<\/li>\n\n\n\n<li>Follow Zoom (or your video conferencing platform of choice) meeting best practices.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"smartphones\"><strong>Smartphones&nbsp;<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Avoid apps downloaded from third-party sources (neither Android nor Apple app stores).<\/li>\n\n\n\n<li>Screen existing apps to determine what they have access to and revoke permissions for any non-essential data access. [How-To: <a href=\"https:\/\/support.apple.com\/guide\/iphone\/control-app-tracking-permissions-iph4f4cbd242\/ios\" target=\"_blank\" rel=\"noopener\">Apple<\/a>; <a href=\"https:\/\/support.google.com\/android\/answer\/9431959?hl=en\" target=\"_blank\" rel=\"noopener\">Android<\/a>]<\/li>\n\n\n\n<li>Keep your phone password-protected with strong, unique passwords.&nbsp;<\/li>\n\n\n\n<li>\u201c<a href=\"https:\/\/portswigger.net\/daily-swig\/mfa-fatigue-attacks-users-tricked-into-allowing-device-access-due-to-overload-of-push-notifications\" target=\"_blank\" rel=\"noopener\">MFA bombing or MFA fatigue<\/a>\u201d is a real thing. Don\u2019t be tricked into accepting push notifications if they\u2019re sent over and over.<\/li>\n\n\n\n<li>Where available, use <a href=\"https:\/\/support.google.com\/accounts\/answer\/1066447?hl=en&amp;ref_topic=2954345\" target=\"_blank\" rel=\"noopener\">hardware-based authenticators<\/a> for important account MFA rather than SMS or email.<\/li>\n\n\n\n<li>Don\u2019t ignore software updates.&nbsp;<\/li>\n\n\n\n<li>Encrypt your device data and sensitive information.&nbsp;<\/li>\n\n\n\n<li>Maintain a data backup plan.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"email-safety\"><strong>Email Safety&nbsp;<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Avoid clicking links in emails. If your boss or a colleague emails you something that seems important, authenticate the sender or call or message them to verify.&nbsp;<\/li>\n\n\n\n<li>Take your company\u2019s phishing training seriously.<\/li>\n\n\n\n<li>When appropriate, use a masked email or dummy e-mail when an address is requested by vendors or services you don\u2019t do business with.&nbsp;<\/li>\n\n\n\n<li>Consider removing any non-essential PII (e.g. personal cell number, links to profiles) from your email signature lines.&nbsp; You can always send contact cards to trusted business partners.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"general-computer-safety\"><strong>General Computer Safety&nbsp;<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use a camera cover when you are not on camera.&nbsp;<\/li>\n\n\n\n<li>Don\u2019t use your photo as your lock screen image; always lock your computer when walking away.&nbsp;<\/li>\n\n\n\n<li>Use screen protectors when in public areas so onlookers can\u2019t see your screen.&nbsp;<\/li>\n\n\n\n<li>Keep your work laptop for work and your personal laptop for leisure.&nbsp;<\/li>\n\n\n\n<li>Don\u2019t share your work devices with family and friends.&nbsp;<\/li>\n\n\n\n<li>Enable the find my device and the remote wipe features.&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/www.filecenter.com\/blog\/how-to-password-protect-a-folder-mac-windows-and-phones\/\" target=\"_blank\" rel=\"noopener\">Password-protect any folders\/<\/a>files with confidential company files, or sensitive client data<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"computer-software\"><strong>Computer Software&nbsp;<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Keep your operating system, antivirus, and other software updated to avoid giving cybercriminals easy access to your device through known vulnerabilities.&nbsp;<\/li>\n\n\n\n<li>Don\u2019t install tools or services without approval from your IT department.&nbsp;<\/li>\n\n\n\n<li>Take advantage of the privacy and sharing settings in Google Docs and Microsoft 365.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"passwords\"><strong>Passwords&nbsp;<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Passwords should be strong and secure (read: don\u2019t use easily findable personally identifiable information). Ideally, you should be using multi-factor authentication (MFA).&nbsp;<\/li>\n\n\n\n<li>Use a reputable password manager to automatically create unique passwords and periodically update them.&nbsp;<\/li>\n\n\n\n<li>Don\u2019t share your passwords with family and friends, or store them in insecure content-searchable file formats (e.g. plain text\/txt, PDF, CSV, HTML)<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"internet\"><strong>Internet&nbsp;<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use a VPN when working remotely, check with your IT department for their recommendations.&nbsp;<\/li>\n\n\n\n<li>Make sure your home WiFi is strong and secure if you work remotely some or all of the time.&nbsp;<\/li>\n\n\n\n<li>Make sure to use all available privacy features on your preferred browsers.<\/li>\n\n\n\n<li>Clear history and cookies on a regular basis.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"linked-in\"><strong>LinkedIn&nbsp;<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>LinkedIn&#8217;s&nbsp;<a href=\"https:\/\/www.csoonline.com\/article\/3675542\/8-strange-ways-employees-can-accidently-expose-data.html\" target=\"_blank\" rel=\"noopener\">new job updates<\/a>&nbsp;can leave you vulnerable to smishing (SMS-phishing) attacks.<\/li>\n\n\n\n<li>Remember that everything on LinkedIn is public domain.<\/li>\n\n\n\n<li>Never share personal information, even if it seems innocent.<\/li>\n\n\n\n<li>There are&nbsp;<a href=\"https:\/\/www.linkedin.com\/pulse\/scam-warning-employees-contacted-linkedin-fraudulent-users-lynch\/\" target=\"_blank\" rel=\"noopener\">fraudulent users<\/a>&nbsp;on LinkedIn, beware.<\/li>\n<\/ul>\n\n\n\n<p>Hopefully, you&#8217;re doing most of these things to ensure your privacy at work. For more privacy tips, if you&#8217;re 100% working at home, you might want to check out this post: <a href=\"https:\/\/joindeleteme.com\/business\/blog\/operational-security-and-remote-work-the-role-of-employees-and-their-pii\/\">Operational Security And Remote Work: The Role of Employees and Their PII<\/a>. Additionally, you can read our tips for rebooting your <a href=\"https:\/\/joindeleteme.com\/blog\/10-tips-to-reboot-your-privacy-online\/\">personal privacy online<\/a> here.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When personal data is out there on the open web it can lead to privacy and security incidents at work that open you\u2014and your company\u2014up to risk. For cybersecurity awareness month, we&#8217;re offering tips on rebooting your privacy at work. Video Meetings&nbsp; Smartphones&nbsp; Email Safety&nbsp; General Computer Safety&nbsp; Computer Software&nbsp; Passwords&nbsp; Internet&nbsp; LinkedIn&nbsp; Hopefully, you&#8217;re [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":7377,"menu_order":0,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"b2b-category":[45],"class_list":["post-2252","b2b-post","type-b2b-post","status-publish","format-standard","has-post-thumbnail","hentry","b2b-category-resources"],"acf":[],"_links":{"self":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/b2b-post\/2252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/b2b-post"}],"about":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/types\/b2b-post"}],"author":[{"embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/users\/16"}],"version-history":[{"count":0,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/b2b-post\/2252\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/media\/7377"}],"wp:attachment":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/media?parent=2252"}],"wp:term":[{"taxonomy":"b2b-category","embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/b2b-category?post=2252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}