Connect with us

Hi, what are you looking for?

Loan And Finance

Data Protection Day 2022: 10 tips to protect data when working from home

cyber risks 18

With Data Protection Day on 28th January, and for many of us, our way of working has changed drastically over the last 2 years, there’s no better time to talk about the importance of data protection protocols and the steps you can take to improve your processes while working from home.

A different way of working

For the majority of office workers in the UK, our working days have transformed significantly since March 2020 – not just in terms of the commute but also in terms of the devices we are using. Company-owned desktops and laptops were primarily being used by employees before, now many are using their own devices to store and input confidential business information. Depending on the device and software you and your employees are using to work from home, there are different risks to consider:

  • Company-owned devices are the most secure and generally offer the highest level of protection but businesses should;
    • Ensure that these devices can be updated remotely.
    • Put measures in place to prevent data from being extracted from the device, e.g. data loss prevention technology.
    • Use multi-factor authentication for remote access.
  • Personal devices come with additional security risks and businesses should ensure that employees are;
    • Using multi-factor authentication for remote access.
    • Keeping personal and business data separate; employees should not be able to accidentally or deliberately move data into personal storage.
    • keeping security software or operating systems up-to-date.

Here are 10 steps to increase data protection when working from home

1) IT Support – when working remotely, it’s especially important to have your IT department’s contact details on hand. This ensures that you can quickly notify them if any company or personal equipment containing company data is stolen, lost, or breached.

2) Follow company policy – your organisation will have protocols in place to ensure that data is adequately protected. Remember to follow these when working from home and avoid the more convenient, but less secure, route of sending emails from your personal account for example.

3) Use company software – if you are provided with hardware or software from your company, you should use this. They will have added protection in place and provide the best protection for data.

4) Keep it confidential – while working from home and sharing the same space with friends and/or family members, where possible try to hold conversations in a place you are less likely to be overheard and position your screen so that it is not visible to others.

Advertisement. Scroll to continue reading.

5) Beware of phishing – be especially vigilant when opening emails or links from a potentially untrustworthy source. Phishing attacks are commonly used by cybercriminals to trick users into sharing personal information, passwords and credit card details.

6) Use your VPN – businesses will typically use a Virtual Private Network (VPN) to create a secure connection to your organisation’s data while using the internet. These will most likely be in place as a password enabled or token system.

7) Back it up – data backups are an essential process to ensure that data is protected elsewhere in the event of loss or corruption. If you are unsure about what you need to back up data, or how to do it – contact your IT department.

8) Strong passwords – a simple yet effective method to protect against infiltration whether using online storage, software, or personal devices is to use strong passwords which are hard to guess. The NSC recommends using three random words together, and be sure to use different passwords for different services.

9) Keep software up-to-date – when using equipment, whether it’s your own or company owned – always ensure that the security software is up-to-date. Allowing updates to be installed reduces the risk of a successful cyber-attack by criminals.

10) Secure communications –use communication tools provided by your organisation.  If you need to share data with others internally – choose a secure messaging app or document sharing system. If you are using email, which can be unsecure, consider adding password protection to documents and sharing these passwords using a secure messaging channel.


Whilst the educational information above can help protect data and prevent breaches, no business can be 100% certain that they won’t be the next target for a cyber breach.

Our CyberSafe solution been designed specifically to address the threats SMEs face and, in the unfortunate event that they are targeted, the integrated breach response from our restorative support service helps to get businesses back up and running as quickly as possible.

Advertisement. Scroll to continue reading.

Contact us

For more information about CyberSafe Insurance or our e-trade solution, contact your NMU Development underwriter or our cyber team;

Matt Drinkwater, Cyber & Financial Lines Underwriting Manager – 07748 676262
Cliff White, Underwriter – 07971 923108
John Kellett, Underwriter – 07568 432512

Source link

Click to comment

Leave a Reply


Top Stories

To the chagrin of many Golden Visa seekers, Portuguese Finance Minister Fernando Medina has confirmed that his country will begin taxing cryptocurrency but has...

Top Stories

As the market continues to mourn over losses on the Terra (LUNA) UST and LUNA debacle, DEI, a stablecoin used as a collateral mechanism...


What you need to know Pokémon HOME is a trading and storage service offered on Nintendo Switch and phones. Laste week we learned that...

Top Stories

Winston Churchill’s statement to “never let a crisis go to waste” can be applied across many aspects of society, including the recent carnage seen...

Top Stories

Bitcoin (BTC) bounced 19% from the $25,400 low on May 12, but has investor confidence in the market been restored? Judging by the ascending...


Apple is expanding one of its child safety features to four more countries with its latest software update. Earlier today, the company released iOS...


You May Also Like


Introductions get a lot of attention. I’ve explored the topic of how to write them even though as a reader, I always skip them....

SEO Guide

There are all kinds of pictures of the world on the internet, but to find one of these specific pictures that you want to...

Online Business Success

The internet is now our nervous system. We are constantly streaming and buying and watching and liking, our brains locked into the global information...

Online Business Success

You can think of link building in many ways. I like to call it tedious, painful, and a test of patience. It’s also necessary...