Working Remotely Requirements and Recommendations
Working Remotely:
IT Requirements and Recommendations
Whether working in the office or remotely from home, various kinds of cyber security threats are present and ever changing. We must protect our data and assets both internally and externally – everyone must take ownership in protecting H2M data. In particular, remote work environments greatly increase the target for hackers and phishing attacks; therefore, we have created a guide of IT requirements and recommendations for employees to follow and update when working remotely from their homes. These measures are intended to protect you/your family
and H2M’s information from cyber invasion.
Basic Remote Requirements/Information:
•
You are required to have a webcam (can be built-in or separate) and a headset with a microphone if you are not able to get audio from your laptop/computer.
•
Refer to the documentation provided with your router to proceed with the next level of requirements in this document. If you do not have your router documentation, you can simply locate the instructions via the manufacturer’s web site (i.e. FIOS, Optimum’s website). Be sure you know the model of your router before proceeding. The model number and relevant information about your router can be found by physically viewing the back of your home router box.
Internet Connectivity:
•
It is recommended that you have a broadband internet connection of at least 100 mbps. Keep in mind that the more devices on your home network, the greater it will tax bandwidth, thereby possibly decreasing connectivity and internet speed. (Such devices include Alexa/iPads/Ring/cell phones/printers/laptops and other smart devices). Should you need to increase your connectivity speed because of poor connectivity (broadband issues), contact your internet service provider.
•
You can check your actual speed at this link: https://projectstream.google.com/speedtest
•
The fastest and most reliable connection to the internet is achieved when directly connecting via an Ethernet cable wired directly to a port on the router or Ethernet jack. However, most of us connect via Wi-Fi so additional steps must be taken to protect your home network from unwanted access.
Secure Configuration Requirements (Refer to your router instructions as mentioned above):
•
Change Administrator password from the default (can be found on the back of the router) to a strong password containing letters/numbers/special characters. Be sure this is not the same as the WiFi password you select.
•
Change the Wi-Fi password from the default (can be found on the back of router) to a strong password containing letters/numbers/special characters.
•
Be sure to change the name of your home network (called SSID) to make it difficult to identify. Do not use names such as “johnshouse”
•
Turn on the highest level of WPA2 encryption (if an option, enable/select AES).
•
Turn off “Plug-n-Play” option
•
Turn off Remote Access
•
Turn off utilization of PINs for WPS (Wi-Fi Protected Setup)
•
Turn on Firewall
Tips for Greater Security:
•
Create a guest Wi-Fi network and offer its use to visitors. If possible, set the guest network to turn itself off after a set period.
•
If you have several smart devices, consider connecting them to your guest Wi-Fi network instead of your primary network to speed up connectivity and minimize the damage resulting from any potential compromise.
If you have any questions or require assistance, please reach out to a member of the IT department.