Every single human life has been affected by the Covid-19 pandemic that has taken over the world in ways nobody could ever imagine.

One big change on the professional front is the growth of working remotely which is now becoming a routine for the majority of the country. Before the Corona Virus breakdout, working from home was a luxury that only around 7% of the population had access to. However, this is not the case anymore. As per a survey by a signal booster provider based in California, approximately 85 million Americans have been operating with their remote setups at home due to the lockdown in the country.

One of the negative repercussions of this practice is that the security breaches have increased taking advantage of the stretched corporate networks. This had lead to an urgent need to educate all the remote workers on cyber-security so they can protect their business and personal data from hackers and scammers.

Below are some of the tips that can be used by the employers and employees to safeguard their data from cyber-attacks.

  • Use VPN (Virtual Private Network)VPN will let the employees connect to the organization’s internal network securely. This will not only prevent attacks on the remote locations but also reduce the need for data to be stored locally on users machines.

  • Avoid public Wi-FiPublic Wi-Fi services are not secured internet connections and should not be used for work devices.

  • Secure personal Wi-Fi networkThe passwords of the personal Wi-Fi networks of the employee need to be strong. Easily predictable passwords such as mobile numbers, date of birth, or one’s name need to be avoided.

  • Filter out internal network accessDepending on the requirement of the work role, employers may filter out the employees who need access to the complete internal network of the organizations and those who need minimum access.



What to look out for:

  • Unauthorized emails from healthcare officialsThe scammers take advantage of the agitation caused due to Coronavirus and send fake emails posing as government agencies asking people to download malware. This may lead to giving away one’s credentials.

  • Suspicious emails from a colleagueAny emails from a colleague asking for any unexpected personal details need to be cross-checked via a phone call.

  • Tempting links or file attachmentsEmployees need to be wary of any links that look interesting or the file attachments that are sent by unknown or distrustful email addresses.


  • Provide corporate equipmentTo avoid any breaches to the company data, providing the employee with a machine from the organization is advisable.

  • Anti-virus when using a personal machineIf the employee is using a personal laptop or computer to log-in to the network, he/she may have to make sure that updated anti-virus software is installed on the machine.

  • No personal use policyAccessing any website or application via the machine used for office work should be avoided. This also includes keeping the devices away from the kids at home.

  • Personal email accessEmployers should ask their workers to NOT use their personal email address even in case of emergency as those cannot be monitored and kept safe by the IT department of an organization.


  • Review audio & video settingsBefore starting any official conference calls, the employee should be directed to review all the settings related to the meeting to make sure that there are no unnecessary features enabled.

  • Monitor attendees listThe host of the meeting is advised to scan through the attendee list before the meeting starts and at the end of the call. Examining the list during the call would be a good practice to affirm that no unknown participant has joined the meeting at any point.

  • Additional passwordsThe employees may be provided with an additional password separately that can be used while joining the web meeting.

  • Avoid the use of social media to coordinateThe employer needs to ensure that the meeting URLs or passwords must not be shared via any of the social media platforms.

***These protocols need to be reviewed by the employer periodically to ensure that the employees are following them unfailingly.

By following some of these basic precautionary measures, the security of the company’s confidential and sensitive information can be prevented from getting compromised.