This website uses cookies. By using the website you agree with our use of cookies. Know more

Culture

Online threats to remote workers

By Pedro Vilaça
Pedro Vilaça
Loves empowering people, can be found outdoors with his camera in his overwhelming visible The North Face gear.
View All Posts
Online threats to remote workers
The internet and advancements in technology continue to make it easier for many of us to carry out our regular duties when working outside of the office space. This, however, comes with its risks, mainly by way of online security threats. Not only can remote workers have their own privacy put at risk, but it could also result in breaching security too.

Online threats to remote workers

Below are some online threats remote workers should be aware of:
  • Unsecured Wi-Fi networks can be used to spy on internet traffic and collect confidential information, including financial details.
  • Personal devices and networks often lack the tools built into business networks such as robust antivirus software, customized firewalls, and automated online backup tools. This can increase the risk of malware infecting the device, and both personal and work-related information being leaked. 
  • Scams targeting remote workers are becoming even more sophisticated. The scams strike when we are at our most vulnerable, so we should always be alert and prepared.
In this article, we'll be sharing our Cyber Security top tips for working remotely to help you with staying secure, even while you are working outside the office space:

1. Log on to a secure site (https) - make sure you are using a secure site, e.g. ‘https’ sites and has a padlock at the beginning of the URL. For further security,    use a ‘verified’ website validated by your internet web browser.

2. Phishing Emails - ensure you have a solid understanding of what information your company typically shares and how. This will help you to more easily identify suspicious communications. Be mindful of any links and/or attachment - hover over them to know its true location.  Lastly, follow-up with the sender directly using a different communication even if the contact is known.

3. Password protect any confidential documents/files -  follow your company's Password Policy and use a company-owned password manager for company-related passwords only. Encrypt your communications by using 7-zip and password, protecting your documents/files. Password protect team specific folders and share the passwords using a different form of communication from the one you used to share the documents. Lastly, remember to make your personal passwords significantly different from your professional ones.

4. Use your company’s virtual private network (VPN) connection
- VPN encrypts all your internet traffic, so it is unreadable to intercept

5. Secure your Wi-Fi connection
- change your router password and username from default (ASAP!) and remember to turn on your firewalls. Work on a secure connection by avoiding public Wi-Fi where possible. 

6. Lock your device
- make sure you lock your device whenever unattended

7. Use a strong password
that contains:
  • Upper and lowercase characters
  • Numbers
  • Punctuation
  • Special Characters
8. Set up multi-factor authentication - that confirms your identity using two or more pieces of evidence that prove you’re the legitimate user associated with the account

9. For your protection - do not disable or circumvent any of your company’s security controls, such as anti-malware/virus security software, encryption features or other security controls installed on your devices

Information security is everyone's responsibility, so make sure to be vigilant at all times, and don't be afraid to question your colleagues if you are ever unsure.

A message from Farfetch Information Security Team
Related Articles
FARFETCH Apps Development: Organizing future Sprints
Technology

FARFETCH Apps Development: Organizing future Sprints

By Francisco Medeiros
Francisco Medeiros
Foodie, design enthusiast, music addict, fashion lover, and an avid Nike sneakerhead always up for a challenge to be creative.
View All Posts
Sílvia Costa
Sílvia Costa
Development combined with QUALITY is the perfect union. Gucci enthusiast.
View All Posts
View
How to Swiftly A/B Test Recommendations From the Inside, Rocket-Style
Technology

How to Swiftly A/B Test Recommendations From the Inside, Rocket-Style

By Nelson Gomes
Nelson Gomes
From teacher to software engineer, living my learning journey to happiness on my New Balance sneakers.
View All Posts
Paulo Ventura
Paulo Ventura
Passionate about technology and delighted by a good challenge. Love to explore nature and wearing Adidas.
View All Posts
View