Working from Home Securely
Maintaining a secure environment while working from home
This webcast took place live on:
Sign up to watch the recording.
Thank you for your registration.
A confirmation email has been sent to the address you provided.
If you have any questions, please email webcast@oreilly.com.
Now that you’re working from home, you need to take extra precautions to ensure your company data is secure. Back in the office, on a corporate-managed network, you didn’t have to worry too much about security. But connecting across your home network introduces new risks and vulnerabilities that you, individually, must learn how to manage and mitigate.
Expert Ric Messier offers an overview of the most common security threats to remote workers and shows how best to protect yourself and your company.
What you’ll learn—and how you can apply it
By the end of this live online course, you’ll understand:
- What security means for remote workers
- Adversaries and threats to protect against
- Understanding what’s at stake
- How to avoid obvious security mistakes
And you’ll be able to:
- Identify threats and threat vectors
- Select appropriate practices to protect your and your company’s data and resources
- Recognize when to apply security controls
This course is for you becauseâ¦
- You work remotely with any company data and are new to issues of computer and network security.
- You want to ensure that you don't expose your company to a data breach.
Recommended follow-up:
- Watch What Is Cybersecurity? (video)
- Read Cybersecurity for Dummies (book)
- Watch Cyber Security for the End User (video)
- Read People-Centric Security: Transforming Your Enterprise Security Culture (book)
- Follow and explore Effective Remote Working (expert playlist)
- Take Being a Successful Remote Worker (live online training course with Jason Rich)
About your instructor
-
Ric Messier is a senior information security consultant with FireEye Mandiant. He’s also an author, consultant, and educator who has published several books on information security and digital forensics, and he holds GCIH, GSEC, CEH, and CISSP certifications. In his decades of experience in information technology and information security, Ric has held the varied roles of programmer, system administrator, network engineer, security engineering manager, VoIP engineer, consultant, and professor.
Course outline
What is security for remote workers? (20 minutes)
- Presentation: What are business needs?; why encryption isn’t the same as security
Working from home threats (20 minutes)
- Presentation: Phishing; websites
Best practices (20 minutes)
- Presentation: Deciding when to VPN and when not to; using antivirus software; why (and when) you shouldn’t use sharing services