Is This Starbucks Secure? Remote Wi-Fi Network Security Checklist

blgpic-coffee

Image via Shutterstock.com

Helping your employees understand how to keep company files secure is a big task. Simple decisions they make while on the road can mean the difference between another day on the job or a privacy gaffe. Aside from implementing a secure collaboration solution, we’ve compiled a list of some of the biggest security to-dos.

Turn off File-sharing While it may sound straightforward enough, many devices utilize file-sharing while in the office. When out and about, those settings remain unchanged. Be sure to disable relevant file-sharing settings and software before hitting a public network.

Jump on the VPN What’s better than using a public Wi-Fi connection? Transferring data through a VPN after connecting. These encrypted channels provide some additional cover while on the move. While they won’t prevent accidentally sending sensitive data to the wrong distribution list, they will offer some security as that data passes through a third party.

Keep software up-to-date Plugging security holes has become a standard list item on most software updates. While it’s easy to ignore updates unless they provide a significant new feature, these security updates come into play in a big way when using a public network. Be sure to keep software maintained through regular updates.

Stop auto-connect applications Many applications are designed to jump right in as soon as a compatible Wi-Fi signal is detected. If that signal happens to be compromised, you’ll be too late to prevent data from passing through a potentially malicious third party.

Use two-factor authentication One of the most secure ways to protect data in any scenario is to use two-factor authentication. Even if a hacker gets a hold of your login and password, he or she won’t get far without also having your mobile device in hand to enter the custom security code generated upon a login attempt.

Set your firewall to kill Most modern operating systems come with a built-in firewall. Make sure the firewall is enabled and configured correctly before hopping onto the digital free-for-all.

If no password is required, think twice When connecting to a public network that does not require a password, take note: If you got in so easily, so can everybody else. Be extra vigilant when sharing sensitive data or visiting websites where sensitive login credentials are required.

If this list seems like too much to ask of your users, remember there is hope. A secure collaboration solution combined with permissions-based controls requiring no added setup or changes from users on the road is an ideal way to maintain security and reduce risk to sensitive company data.

Sound exciting? Try Arc for free now! Get Started