A cybersecurity attack is kind of like a car accident... you think "this will never happen to me." Until it does.


Not that we're wishing for an accident of any kind to happen to anyone. Yet, two of the biggest cyber threats today are your data and the home office. Business has evolved due to the pandemic where 50% of companies are establishing a hybrid workstation model for the foreseeable future-- partly in-office, partly at home, according to a recent PwC work survey. As a result, your data and home office are the two biggest cyber threats today. How does your workstation stack up?

In the work from home scenario, some of your team may be using their own devices to stay connected. This can be like an accident waiting to happen unless you put critical safeguards in place. Following these few simple steps below will dramatically increase the security of data from your hybrid workstation -- both remote and in-office.

3 Steps to Stay Secure

Securing your hybrid locations must be at the top of your list- Normally, a remote employee using a personal device for work-related tasks would prompt many questions – are they current with operating system and application updates? How secure is the device? Does it have corporate data on it? Are we giving up top-secret information with every call or email sent from that device? Read on for our tips.

1. Educate your employees and implement security safeguards:

  • Make sure screens are shut down when not at the desk, especially in public places. "Shoulder surfing" is a real thing and screens should be closed or shut down when not at your computer.
  • Require that all personal laptops have an EDR. Endpoint Detection and Response, also known as endpoint threat detection and response, is a cybersecurity technology that continually monitors and responds to mitigate threats.
  • For as little as $10 per month per computer, EDR can strengthen data safety and give you peace of mind.
  • Lockout inactive users.
  • Keep track of every device connected to the network.


2. Opt into Two-Factor Authentication (2FA):

  • Two-Factor Authentication (2FA) is a critical added layer of security that prevents intruders from accessing your private information such as credit card info, passwords and data by requiring you to enter an additional code when you sign in. 
  • At no cost, you can opt to use an authenticator app for 2FA, with these common authenticator apps that can be found in your mobile device app store such as:


  • Google Authenticator
  • LastPass Authenticator
  • Microsoft Authenticator
  • Authy


3. Monitor the network

  • Business leaders can block certain websites from their networks to prevent remote access to non-business-related sites such as shopping sites, Netflix, and more. Surfing the web for personal stuff can open a gateway into hacker heaven.
  • It takes more than just having a cybersecurity program installed for businesses to stay protected in today's world. Like the pandemic, cybersecurity attacks are constantly evolving, so it's important to stay vigilant with the latest malware and phishing prevention products.
  • Having an IT professional who has the experience and laser-vision to monitor and manage your network will keep you and your employees protected so you can do what you do best-- run a successful business-- no matter where your workstation is.

Stay safe and practice good cyber hygiene. We are here to help you to stay proactive with your data security at your hybrid workstations so you and your employees can focus on the business at hand-- running a successful business.