Skip to main content

10 Ways to Reboot Your Privacy at Work

10 Ways to Reboot Your Privacy at Work

DeleteMe

October 3, 2022

Reading time: 4 minutes

When personal data is out there on the open web it can lead to privacy and security incidents at work that open you—and your company—up to risk. For cybersecurity awareness month, we’re offering tips on rebooting your privacy at work.

Video Meetings 

  • Blur your backgrounds when on video calls. 
  • Keep the microphone muted when not in use.
  • Be wary of the information that others may see when you share your screen. Consider sharing a specific tab or application instead. Hide the bookmarks bar if exposed on open tabs.
  • Follow Zoom (or your video conferencing platform of choice) meeting best practices. 

Smartphones 

  • Avoid apps downloaded from third-party sources (neither Android nor Apple app stores).
  • Screen existing apps to determine what they have access to and revoke permissions for any non-essential data access. [How-To: Apple; Android]
  • Keep your phone password-protected with strong, unique passwords. 
  • MFA bombing or MFA fatigue” is a real thing. Don’t be tricked into accepting push notifications if they’re sent over and over.
  • Where available, use hardware-based authenticators for important account MFA rather than SMS or email.
  • Don’t ignore software updates. 
  • Encrypt your device data and sensitive information. 
  • Maintain a data backup plan. 

Email Safety 

  • Avoid clicking links in emails. If your boss or a colleague emails you something that seems important, authenticate the sender or call or message them to verify. 
  • Take your company’s phishing training seriously.
  • When appropriate, use a masked email or dummy e-mail when an address is requested by vendors or services you don’t do business with. 
  • Consider removing any non-essential PII (e.g. personal cell number, links to profiles) from your email signature lines.  You can always send contact cards to trusted business partners.

General Computer Safety 

  • Use a camera cover when you are not on camera. 
  • Don’t use your photo as your lock screen image; always lock your computer when walking away. 
  • Use screen protectors when in public areas so onlookers can’t see your screen. 
  • Keep your work laptop for work and your personal laptop for leisure. 
  • Don’t share your work devices with family and friends. 
  • Enable the find my device and the remote wipe features. 
  • Password-protect any folders/files with confidential company files, or sensitive client data

Computer Software 

  • Keep your operating system, antivirus, and other software updated to avoid giving cybercriminals easy access to your device through known vulnerabilities. 
  • Don’t install tools or services without approval from your IT department. 
  • Take advantage of the privacy and sharing settings in Google Docs and Microsoft 365. 

Passwords 

  • Passwords should be strong and secure (read: don’t use easily findable personally identifiable information). Ideally, you should be using multi-factor authentication (MFA). 
  • Use a reputable password manager to automatically create unique passwords and periodically update them. 
  • Don’t share your passwords with family and friends, or store them in insecure content-searchable file formats (e.g. plain text/txt, PDF, CSV, HTML)

Internet 

  • Use a VPN when working remotely, check with your IT department for their recommendations. 
  • Make sure your home WiFi is strong and secure if you work remotely some or all of the time. 
  • Make sure to use all available privacy features on your preferred browsers.
  • Clear history and cookies on a regular basis.

LinkedIn 

  • LinkedIn’s new job updates can leave you vulnerable to smishing (SMS-phishing) attacks.
  • Remember that everything on LinkedIn is public domain.
  • Never share personal information, even if it seems innocent.
  • There are fraudulent users on LinkedIn, beware.

Hopefully, you’re doing most of these things to ensure your privacy at work. For more privacy tips, if you’re 100% working at home, you might want to check out this post: Operational Security And Remote Work: The Role of Employees and Their PII. Additionally, you can read our tips for rebooting your personal privacy online here.

SHARE THIS ARTICLE
DeleteMe was created in 2010 when we realized the difficulty of navigating privacy issues in today’s interconnected and digital world. Our mission is to provide everyone with the power to control t…
DeleteMe was created in 2010 when we realized the difficulty of navigating privacy issues in today’s interconnected and digital world. Our mission is to provide everyone with the power to control t…
How does DeleteMe privacy protection work?
  1. Employees, Executives, and Board Members complete a quick signup
  2. DeleteMe scans for exposed personal information
    Opt-out and removal requests begin
  3. Initial privacy report shared and ongoing reporting initiated
  4. DeleteMe provides continuous privacy protection and service all year
Your employees’ personal data is on the web for the taking.

DeleteMe is built for organizations that want to decrease their risk from vulnerabilities ranging from executive threats to cybersecurity risks.

Want more privacy
news?

Join Incognito, our monthly newsletter from DeleteMe that keeps you posted on all things privacy and security.

Is employee personal data creating risk for your business?

DeleteMe provides business solutions for the enterprise, public orgs and public interest groups.

Is employee personal data creating risk for your business?

DeleteMe provides business solutions for the enterprise, public orgs and public interest groups.

Related Posts

Our 2022 Cybersecurity Excellence Award Speech: How We Started, Where We’re Going

We are excited to announce that DeleteMe was recognized (twice!) with 2022 Cybersecurity Excellence Awards, an annual competition honoring ind…
DeleteMe
February 10, 2022

The Time is Now to Limit Russian Hacker Access to Publicly Available PII

Although the launch of ContiLeaks and the information revealed there didn’t slow the Russian Hacker gang down, it did provide everyone here a…
Will Simonds
March 10, 2022

Webinar Recap: New Strategies for Mitigating Phishing Risk

Security professionals are working hard to defend their organizations from cyberattacks through a combination of training, policies, and technology…
DeleteMe
May 20, 2022