{"id":18467,"date":"2021-05-26T09:00:15","date_gmt":"2021-05-26T08:00:15","guid":{"rendered":"\/gb\/en\/blog\/?p=18467"},"modified":"2023-01-16T12:43:55","modified_gmt":"2023-01-16T12:43:55","slug":"cybersecurity-tips-working-from-home","status":"publish","type":"post","link":"\/gb\/en\/blog\/cybersecurity-tips-working-from-home\/","title":{"rendered":"11 Cybersecurity Tips for Working from Home"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The concept of remote work has been around for some time, and it\u2019s only growing larger. More and more people are working from home each year, and the global COVID-19 pandemic has only sped up this trend. The benefits are clear. People don\u2019t have to leave their homes \u2013 they can organise their time, work and avoid typical challenges <\/span><a href=\"\/gb\/en\/blog\/benefiting-working-remotely\/\"><span style=\"font-weight: 400;\">with traditional employment<\/span><\/a><span style=\"font-weight: 400;\">. However, many people live in a bubble, thinking that working from home is completely safe.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As more and more businesses and individuals turn to online work, the percentage of cybercrime continues to go up. Most people think that only large businesses are exposed to cyberattacks, but this isn\u2019t true. Anyone can get scammed or get their data stolen online. That\u2019s why remote workers need to start taking the necessary steps towards securing themselves.\u00a0<\/span><\/p>\n<h2><strong>Remote working security tips<\/strong><\/h2>\n<h3><strong>1. Don\u2019t use public Wi-Fi <\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Working from home doesn\u2019t strictly refer to working from home. Perhaps the better name for it would be working outside of the office. Why? Because some people prefer working from their <a href=\"\/gb\/en\/blog\/how-to-setup-voip-server-home-office\/\">home office<\/a> while others enjoy working from a nearby park, library, restaurant, or even on the road. People who use public Wi-Fi to do work expose themselves and the companies they work for to cybersecurity risks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The most <\/span><a href=\"https:\/\/e-channelnews.com\/top-5-most-dangerous-public-wifi-attacks\/\"><span style=\"font-weight: 400;\">dangerous public Wi-Fi attacks<\/span><\/a><span style=\"font-weight: 400;\"> include man-in-the-middle, Evil Twin (WIFIPHISHER), AirCrack-NG, Passive Sniffing, and Cowpathy. These attacks enable hackers to get into your computer or company\u2019s internal network, download, delete, or encrypt sensitive data, or take full control of your device and company\u2019s server.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Public Wi-Fi is generally unsafe, and all the traffic you send or receive could be exposed to third parties. The repercussions of using it could be severe. What is the alternative? You can use your mobile data to do your work. Unlike public Wi-Fi, the <a href=\"\/gb\/en\/blog\/ultimate-guide-to-broadband-for-your-home-office\/\">internet connection<\/a> through your carrier is encrypted and well-secured. However, if you have no other option but to use public Wi-Fi, the next tip will keep you safe.<\/span><\/p>\n\t<div class=\"cta-banner  CID-2FdM5dTp IID-6a0ade7d9f378\"\r\n\t\tdata-dl-custom-type=\"ctaButton\">\r\n\t\t<div class=\"cta-banner-img-wrap\">\r\n\t\t\t<div class=\"cta-banner-img\" style=\"background-image:url(\/gb\/en\/blog\/wp-content\/uploads\/2019\/05\/ringcentral-security.jpg)\"><\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"cta-body\" data-dl-custom-type=\"ctaButton\">\r\n\t\t\t<span class=\"cta-sub-heading\">Top industry security rating<\/span>\r\n\t\t\t<h3 class=\"cta-heading\">End-to-end security<\/h3>\r\n\t\t\t<p>The RingCentral platform utilises multiple layers of security to protect your data and communications while also guarding against fraud and service abuse.<\/p>\r\n\t\t\t<a class=\"rc-cta-shortcode btn btn-primary btn-lg\" data-dl-element=\"button\"\r\n\t\t\t\thref=\"https:\/\/www.ringcentral.com\/gb\/en\/technology\/security.html?\" class=\"btn btn-primary\"\r\n\t\t\t\ttarget=\"_blank\" rel=\"noopener\" data-dl-additional-info=\"End-to-end security\"\r\n\t\t\t\tdata-dl-name=\"End-to-end security | Find out more\">Find out more<\/a>\r\n\r\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\t\n<h3><strong>2. Use a virtual private network\u00a0<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Once you <\/span><a href=\"\/gb\/en\/blog\/creating-best-work-from-home-environment\/\"><span style=\"font-weight: 400;\">set up your home office to your needs<\/span><\/a><span style=\"font-weight: 400;\">, you should start thinking about how secure your internet connection is. Falling victim to a cybersecurity attack or a phishing scam can set you back and even put your reputation at stake. There are many cybersecurity solutions to help you add additional layers of security. VPN emerges as the most versatile one, though.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">VPN stands for a virtual private network. VPN is a service you can use to improve your online anonymity and security. It allows you to connect to the internet via a virtual network. You get to choose the location you want to appear to be connected from. VPN then assigns you a brand-new IP while hiding your true IP and location.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">As an additional security measure, VPN uses industry-grade encryption protocols to scramble your traffic and make it unusable to anyone else but yourself. Due to its capabilities, VPN is a go-to solution for people who have to work on public Wi-Fi.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">Now it may sound too technical for someone who never used it before, but in reality, it isn\u2019t. According to WHSR, <\/span><a href=\"https:\/\/www.webhostingsecretrevealed.net\/blog\/security\/how-to-setup-a-vpn\/\"><span style=\"font-weight: 400;\">setting up a VPN and using it is fairly easy<\/span><\/a><span style=\"font-weight: 400;\">. The best thing about it is that you can use it on your dedicated work computer and smartphone to protect your data from cybercriminals.<\/span><\/p>\n<h3><strong>3. Store data in the cloud<\/strong><\/h3>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-18471\" src=\"\/gb\/en\/blog\/wp-content\/uploads\/2021\/05\/Business-Analytics-and-Data-Management-System-DMS-scaled.jpg\" alt=\"Business Analytics and Data Management System (DMS) giving key insights for corporate strategy. Concept with expert analyst building visualization with KPI and metrics from database information-464\" width=\"2048\" height=\"1365\" srcset=\"\/gb\/en\/blog\/wp-content\/uploads\/2021\/05\/Business-Analytics-and-Data-Management-System-DMS-scaled.jpg 2048w, \/gb\/en\/blog\/wp-content\/uploads\/2021\/05\/Business-Analytics-and-Data-Management-System-DMS-300x200.jpg 300w, \/gb\/en\/blog\/wp-content\/uploads\/2021\/05\/Business-Analytics-and-Data-Management-System-DMS-640x427.jpg 640w, \/gb\/en\/blog\/wp-content\/uploads\/2021\/05\/Business-Analytics-and-Data-Management-System-DMS-768x512.jpg 768w, \/gb\/en\/blog\/wp-content\/uploads\/2021\/05\/Business-Analytics-and-Data-Management-System-DMS-1536x1024.jpg 1536w\" sizes=\"(max-width: 2048px) 100vw, 2048px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Our instinct is to store the data on local storage when working from home, be it a hard or thumb drive. While it is convenient, storing data on local storage comes with certain risks. The most obvious one is a failing drive. A drive can fail for various reasons, but the outcome is always the same \u2013 the data stored on it is most likely lost.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Then we have the revision history. Most software tools don\u2019t have revision history, proving catastrophic if you want to restore the previous version. And finally, there are some types of cybersecurity attacks fatal for the data, such as ransomware and <a href=\"\/gb\/en\/blog\/definitions\/vishing-voice-or-voip-phishing\/\">vishing or VoIP phishing<\/a>.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We live in the era of cloud-native platforms. The offer of cloud storage solutions is enormous, making it very affordable. Cloud storage is far safer than local storage because it keeps its servers behind the best firewalls and antivirus tools, making it virtually impossible for hackers to get in.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Their servers are also secured from other hazards such as fire. The revision history has also become a standard feature in many cloud storage providers. Finally, they do regular backups as a contingency plan for unplanned events.<\/span><\/p>\n<h3><strong>4. Learn to recognise phishing emails\u00a0<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Another common cybersecurity threat you should know about is phishing. <a href=\"\/gb\/en\/blog\/definitions\/vishing-voice-or-voip-phishing\/\">Phishing attacks<\/a> are often launched via phishing emails once the target clicks on the link. Phishing emails are emails that often impersonate legitimate organisations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">Their goal is to take advantage of the trust you have. Once you click on the link contained in the phishing email, you\u2019ll be asked to provide some sensitive information, such as social security number, credit card info, and password.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">At first glance, these emails appear real, but if you know where and what to look for, you can easily tell that it\u2019s a scam. These emails usually feature a legit subject line and a story tailored to trick you into clicking a link and giving your data. Here\u2019s how you can recognise phishing emails:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Check if the domain is a public one \u2013 companies will never use public domains for business;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Carefully inspect the email address \u2013 scammers often use misspelt domain names to play the credibility card;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Poor spelling and grammar are common indicators of phishing emails;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Mouse over the link in the email. If it doesn\u2019t match the domain name of the company, it\u2019s a scam;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">If a message creates a sense of urgency, it\u2019s usually an indicator of foul play.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">They usually offer free stuff, inform you that you need to make an urgent payment, or initiate a personal information confirmation process with your bank or other service providers. The most efficient way to <\/span><span style=\"font-weight: 400;\">protect yourself from phishing scams<\/span><span style=\"font-weight: 400;\"> is never to open an email or click on a link that appears suspicious.<\/span><\/p>\n<h3><strong>5. Protect your video conferences<\/strong><\/h3>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-18472\" src=\"\/gb\/en\/blog\/wp-content\/uploads\/2021\/05\/man-working-from-home-scaled.jpg\" alt=\"man working from home\" width=\"2048\" height=\"1365\" srcset=\"\/gb\/en\/blog\/wp-content\/uploads\/2021\/05\/man-working-from-home-scaled.jpg 2048w, \/gb\/en\/blog\/wp-content\/uploads\/2021\/05\/man-working-from-home-300x200.jpg 300w, \/gb\/en\/blog\/wp-content\/uploads\/2021\/05\/man-working-from-home-640x427.jpg 640w, \/gb\/en\/blog\/wp-content\/uploads\/2021\/05\/man-working-from-home-768x512.jpg 768w, \/gb\/en\/blog\/wp-content\/uploads\/2021\/05\/man-working-from-home-1536x1024.jpg 1536w\" sizes=\"(max-width: 2048px) 100vw, 2048px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">The need for streamlined communications has spiked due to the remote work trend, and many business communication platforms such as <\/span><a href=\"https:\/\/www.ringcentral.com\/gb\/en\/\"><span style=\"font-weight: 400;\">RingCentral<\/span><\/a><span style=\"font-weight: 400;\"> have suddenly become immensely popular. The same applies to commercial communication platforms such as Zoom.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">Thanks to new technologies, you can now directly speak with your co-workers and managers and participate in live meetings. Video conferences make communication more efficient than text-based chat. They have become a big part of remote work and need to be protected as well.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">There are several ways to <\/span><a href=\"https:\/\/hideandseek.online\/internet-safety\/how-to-secure-your-zoom-meetings\/\"><span style=\"font-weight: 400;\">protect your online meetings<\/span><\/a><span style=\"font-weight: 400;\">. Some of them we\u2019ve already covered, such as using VPN. Video conferences are not encrypted, and VPN can help you encrypt your communication and keep eavesdroppers at bay.\u00a0<\/span><\/p>\n<h3><strong>6. Update software regularly\u00a0<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">You probably use dozens of software tools on a day-to-day basis, forgetting that the devs who create these tools don\u2019t always do a perfect job. All the tools, applications, and operating systems you use have security vulnerabilities that are &#8220;fixed&#8221; with regular updates.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">Most of these tools have support for the automatic update feature. You can quickly patch the bugs and backdoors hackers can use with these updates. Go to settings in the apps you frequently use and enable it. It applies both to your computer and smartphone.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">Smartphones are more straightforward when it comes to software update management. You can conveniently set the updates to trigger whenever you plug your phone to charge automatically. Some updates will require you to reset your device. Ensure to do so because you can only fix some bug fixes and security vulnerabilities after a complete restart.<\/span><\/p>\n<h3><strong>7. Backup your site\u00a0<\/strong><\/h3>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-18473\" src=\"\/gb\/en\/blog\/wp-content\/uploads\/2021\/05\/Backup-concept-with-tablet-computer-scaled.jpg\" alt=\"Backup concept with tablet computer-438\" width=\"2048\" height=\"1045\" srcset=\"\/gb\/en\/blog\/wp-content\/uploads\/2021\/05\/Backup-concept-with-tablet-computer-scaled.jpg 2048w, \/gb\/en\/blog\/wp-content\/uploads\/2021\/05\/Backup-concept-with-tablet-computer-300x153.jpg 300w, \/gb\/en\/blog\/wp-content\/uploads\/2021\/05\/Backup-concept-with-tablet-computer-640x327.jpg 640w, \/gb\/en\/blog\/wp-content\/uploads\/2021\/05\/Backup-concept-with-tablet-computer-768x392.jpg 768w, \/gb\/en\/blog\/wp-content\/uploads\/2021\/05\/Backup-concept-with-tablet-computer-1536x784.jpg 1536w\" sizes=\"(max-width: 2048px) 100vw, 2048px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">If you are one of those remote workers in charge of a company\u2019s or personal website management, you should pay attention to its security too. Something as simple as an outdated plugin can make your website <\/span><a href=\"https:\/\/blog.sucuri.net\/2021\/03\/how-do-websites-get-hacked.html\"><span style=\"font-weight: 400;\">vulnerable to attacks<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">If you have your own site, you need to secure the data on it. The most important thing to do is have a contingency plan, and every contingency plan starts with website backup. Make sure to do it regularly so that you can restore your website if something unforeseen happens.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">There are several things you can do to improve your website security. If you are using a CMS platform such as WordPress and Joomla, regularly update your CMS and plugins. The updates often contain bug and security fixes and help prevent hackers from exploiting any issues and gaining access to your website.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Your host\u2019s security practices are also an important factor in keeping your website safe \u2013 you can even consider <\/span><a href=\"https:\/\/www.hover.com\/blog\/choose-web-hosting-provider-security-factors\/\"><span style=\"font-weight: 400;\">moving to a new hosting provider<\/span><\/a><span style=\"font-weight: 400;\"> with better security measures. You stand to gain a lot from more secure web hosting, including:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Regular security updates fix the security vulnerability issues and keep your site safe;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Regular backups of your website;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Real-time website monitoring for any suspicious activity;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Your website will be stored in a private data centre with all the redundant protection measures to keep it intact;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Secure hosting delivers an SSL certificate to protect your visitors\u2019 sensitive data;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The secure version of the File Transfer Protocol (SFTP) will enable you to upload files to your account safely.<\/span><\/li>\n<\/ul>\n<h3><strong>8. Invest in anti-virus software\u00a0<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Anti-virus software has gone a long way, from protecting users only from viruses to complex cloud-based security solutions. Modern anti-virus tools can protect you from several cybersecurity threats ranging from adware and spyware to bots, viruses, and ransomware. Since you are doing your work online, anti-virus software is a must.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">The latest anti-virus solutions provide umbrella-like protection. They will divert you from suspicious websites, prevent malicious website scripts from executing, and keep your device virus-free.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">The heading of this section implies that you need to spend some cash on anti-virus software, but if you want to test it before buying, there are plenty of <\/span><a href=\"https:\/\/www.pcmag.com\/picks\/the-best-free-antivirus-protection\"><span style=\"font-weight: 400;\">free anti-virus tools from top companies<\/span><\/a><span style=\"font-weight: 400;\">. If the basic features provide all the protection you need, you can stick with a free version for as long as you want.<\/span><\/p>\n<h3><strong>9. Use two-factor authentication<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Your username and password make the first layer of security for all your online accounts. However, since hackers deploy various methods to brute-force access to targets\u2019 accounts, you should consider adding a layer. The solution you should consider using is two-factor authentication.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">Two-factor authentication is a security measure that ensures you are the owner of the account you are trying to log into. Two-factor authentication uses SMS, email, or in-software confirmations to verify your identity. Please enable it on all your online accounts to improve security and thwart malicious login attempts.<\/span><\/p>\n<h3><strong>10. Create strong passwords\u00a0<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Even though it might seem like an obvious thing to do, many people still don\u2019t care about their passwords. With so many online accounts, one can easily lose track of all the passwords, so many people use the same simple password across different accounts. That\u2019s a big no-no.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">There are thousands of bots online trying to log into people\u2019s accounts online. If you choose a simple password, your accounts are at risk.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0It would be best if you<\/span><span style=\"font-weight: 400;\">\u00a0had a unique and strong password for every account. A strong password should contain at least eight characters, caps letters, numbers, and special characters \u2013 some cybersecurity experts advise bringing the number of characters up to 12.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">You can streamline the creation of strong passwords with <\/span><a href=\"https:\/\/vpnoverview.com\/password-managers\/best-free-password-managers\/\"><span style=\"font-weight: 400;\">password management tools<\/span><\/a><span style=\"font-weight: 400;\"> such as Myki Password Manager &amp; Authenticator, LogMeOnce Password Management Suite, Bitwarden, and PassHub. Most of them are free, and they get the job done. These tools will help you generate strong random passwords, encrypt, and store them for you.\u00a0<\/span><\/p>\n<h3><strong>11. Use your device for work only<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">If you want to bring up your cybersecurity game to the next level, consider using one of your devices exclusively for work. If you use your working device to surf the web and play games, you could potentially expose sensitive data.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">You can accidentally pick up a worm on a random website or expose yourself to adware. If you use one device for work, you\u2019ll significantly reduce the risks involved in spending time online. You\u2019ll only have the software toolkit required for work installed, which translates into streamlined updating.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">Not to mention the increase in productivity as you will no longer use your device to scroll social media, read news, or do whatever you do to get your mind off work for a \u201ccouple of minutes\u201d.<\/span><\/p>\n<h2><strong>Conclusion<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">The cybersecurity landscape is quite dynamic, and there is nothing you can do to be 100% safe. The best thing you can do is to follow the latest cybersecurity tips. The additional security layers will keep you safe as you complete your tasks at home.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Given that the new cyber threats emerge regularly, you should also consider staying tuned to relevant news portals and blogs in the niche. Keeping your data safe is an ongoing project, and its success depends on your commitment and discipline.<\/span><\/p>\n<p><span style=\"font-size: 24px; line-height: 30px;\">Get details on the security and trust built into RingCentral products and services.<\/span><span class=\"text-center\" style=\"display: block;\" data-dtm-element=\"button\" data-dtm-context=\"bottom-cta\" data-dtm-additional-info=\"Get the guide\"><a class=\"btn btn-primary btn-lg\" style=\"margin-top: 16px; font-weight: bold;\" title=\"Read the eBook\" href=\"https:\/\/netstorage.ringcentral.com\/uk\/documents\/cloud_communications_and_collaboration.pdf\" target=\"_blank\" rel=\"noopener noreferrer\" data-dtm-name=\"Bottom CTA\">Download the white paper<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The concept of remote work has been around for some time, and it\u2019s only growing larger. More and more people are working from home each year, and the global COVID-19 &hellip; <a href=\"\/gb\/en\/blog\/cybersecurity-tips-working-from-home\/\" class=\"more-link\">Read more<span class=\"screen-reader-text\"> &#8220;11 Cybersecurity Tips for Working from Home&#8221;<\/span><\/a><\/p>\n","protected":false},"author":244,"featured_media":18469,"comment_status":"open","ping_status":"closed","sticky":false,"template":"single-content-hub.php","format":"standard","meta":{"footnotes":""},"categories":[4,21,3],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>11 Cybersecurity Tips for Working from Home | RingCentral UK Blog<\/title>\n<meta name=\"description\" content=\"Remote workers need to start taking the necessary steps towards securing themselves. READ THESE CYBERSECURITY TIPS to stop different cyberattacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ringcentral.com\/gb\/en\/blog\/cybersecurity-tips-working-from-home\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"RingCentral Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"11 Cybersecurity Tips for Working from Home | RingCentral UK Blog","description":"Remote workers need to start taking the necessary steps towards securing themselves. READ THESE CYBERSECURITY TIPS to stop different cyberattacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ringcentral.com\/gb\/en\/blog\/cybersecurity-tips-working-from-home\/","twitter_misc":{"Written by":"RingCentral Team","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":":\/gb\/en\/blog\/cybersecurity-tips-working-from-home\/#article","isPartOf":{"@id":"\/gb\/en\/blog\/cybersecurity-tips-working-from-home\/"},"author":{"name":"RingCentral Team","@id":"\/gb\/en\/blog\/#\/schema\/person\/cc4f043d2b478862a8622c28b0ebd08c"},"headline":"11 Cybersecurity Tips for Working from Home","datePublished":"2021-05-26T08:00:15+00:00","dateModified":"2023-01-16T12:43:55+00:00","mainEntityOfPage":{"@id":"\/gb\/en\/blog\/cybersecurity-tips-working-from-home\/"},"wordCount":2265,"commentCount":0,"publisher":{"@id":"\/gb\/en\/blog\/#organization"},"articleSection":["Business Trends - CX","Developer","UC - Collaboration"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":[":\/gb\/en\/blog\/cybersecurity-tips-working-from-home\/#respond"]}]},{"@type":"WebPage","@id":"\/gb\/en\/blog\/cybersecurity-tips-working-from-home\/","url":":\/gb\/en\/blog\/cybersecurity-tips-working-from-home\/","name":"11 Cybersecurity Tips for Working from Home | RingCentral UK Blog","isPartOf":{"@id":"\/gb\/en\/blog\/#website"},"datePublished":"2021-05-26T08:00:15+00:00","dateModified":"2023-01-16T12:43:55+00:00","description":"Remote workers need to start taking the necessary steps towards securing themselves. READ THESE CYBERSECURITY TIPS to stop different cyberattacks.","breadcrumb":{"@id":":\/gb\/en\/blog\/cybersecurity-tips-working-from-home\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":[":\/gb\/en\/blog\/cybersecurity-tips-working-from-home\/"]}]},{"@type":"BreadcrumbList","@id":":\/gb\/en\/blog\/cybersecurity-tips-working-from-home\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"RingCentral Blog","item":"\/gb\/en\/blog\/"},{"@type":"ListItem","position":2,"name":"UC - Collaboration"}]},{"@type":"WebSite","@id":"\/gb\/en\/blog\/#website","url":"\/gb\/en\/blog\/","name":"RingCentral UK Blog","description":"RingCentral News and Tips","publisher":{"@id":"\/gb\/en\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"\/gb\/en\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"\/gb\/en\/blog\/#organization","name":"RingCentral UK","url":"\/gb\/en\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"\/gb\/en\/blog\/#\/schema\/logo\/image\/","url":"\/gb\/en\/blog\/wp-content\/uploads\/2021\/11\/ringcentral-logo.png","contentUrl":"\/gb\/en\/blog\/wp-content\/uploads\/2021\/11\/ringcentral-logo.png","width":1921,"height":416,"caption":"RingCentral UK"},"image":{"@id":"\/gb\/en\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"\/gb\/en\/blog\/#\/schema\/person\/cc4f043d2b478862a8622c28b0ebd08c","name":"RingCentral Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"\/gb\/en\/blog\/#\/schema\/person\/image\/","url":"https:\/\/rcbloguk.wpengine.com\/gb\/en\/blog\/wp-content\/plugins\/rc-profile-photo\/images\/default-avatar.png","contentUrl":"https:\/\/rcbloguk.wpengine.com\/gb\/en\/blog\/wp-content\/plugins\/rc-profile-photo\/images\/default-avatar.png","caption":"RingCentral Team"},"url":"\/gb\/en\/blog\/author\/ringcentral-team\/"}]}},"_links":{"self":[{"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/posts\/18467"}],"collection":[{"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/users\/244"}],"replies":[{"embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/comments?post=18467"}],"version-history":[{"count":0,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/posts\/18467\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/media\/18469"}],"wp:attachment":[{"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/media?parent=18467"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/categories?post=18467"},{"taxonomy":"post_tag","embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/tags?post=18467"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}