Best Practices for Telecommuting Securely

Keep work data on work computers

Using a personally-owned device to do University business puts both you and the Campus at risk. If you do not have a work computer to use at home, you must follow these practices:

  1. 1. Update and patch

    Update everything on your devices, including operating systems, web browsers, and apps. Attackers can exploit vulnerabilities in old versions of software.

    Enable automatic updates on Microsoft and macOS

  2. 2. Use Anti-Malware Software and a Firewall

    Install anti-malware software (anti-spyware, anti-virus) and enable a firewall on your device(s). Default firewall settings are acceptable for current Macs and PCs, but be sure to verify they're turned on.

  3. 3. Avoid Public Wi-Fi and Use the Campus VPN

    Do not use public Wi-Fi when logging into campus systems or doing non-public work. Use the Campus Virtual Private Network (VPN) or your phone as a personal hotspot instead.

    The Remote Access VPN Services provides encryption between your computer and VT resources. For more information, read our 4help article.

  4. 4. Protect the Data on Your Device

    VT's Minimum Security Standard states that endpoints with moderate or high risk data must be strongly encrypted and it is recommended for low risk endpoints. The two most common methods to protect data are "whole disk encryption" and "file encryption".

    Whole Disk Encryption Software protects the entire hard drive
    File Encryption Software encrypts a file or folder
  5. 5. Frequently Save and Backup Your Work

    Frequently save your work to ensure you don't lose progress; especially when connected to remote systems. Backing up data is an important step in protecting it.

    If you choose to backup to an external hard drive or USB key, be sure to encrypt the media and unplug it after backup to protect it from malware or ransomware.

  1. 1. Lock Your Doors and Never Leave Your Devices in the Car

    Never leave your device unattended, always lock your doors, and never leave your device in a vehicle - not even in the trunk. Keep work laptops and devices secure at all times while working remotely.

  2. 2. Lock Up Your Laptop

    Lock up your laptop when you step away, even at home. Incidents happen, and it’s good practice to lock up your laptop when you are not using it.

  3. 3. Password-Protect Your Devices

    Create strong passwords by using a passphrase - a password made up of multiple words. Use a unique passphrase for every device or online account. That way if one passphrase is compromised, other accounts and devices are unaffected.

    Tip: use a password manager, which is a specialized program that securely stores your passphrases in an encrypted format.

    Enable two-step verification whenever possible. It uses your password, but also adds a second step, such as a code sent to your smartphone or an app that generates the code for you. Two-step verification is an easy step to protect online accounts.

  4. 4. Lock Your Screens

    Configure your desktop to automatically lock after 15 minutes of inactivity and set your phone to lock the screen after no more than 15 minutes of inactivity. Shorter is even better.

Keep work data on work computers

Using a personally-owned device to do University business puts both you and the Campus at risk. If you do not have a work computer to use at home, you must follow these practices:

  1. 1. Update and patch

    Update everything on your devices, including operating systems, web browsers, and apps. Attackers can exploit vulnerabilities in old versions of software.

    Enable automatic updates on Microsoft and macOS

  2. 2. Use Anti-Malware Software and a Firewall

    Install anti-malware software (anti-spyware, anti-virus) and enable a firewall on your device(s). Default firewall settings are acceptable for current Macs and PCs, but be sure to verify they're turned on.

  3. 3. Avoid Public Wi-Fi and Use the Campus VPN

    Do not use public Wi-Fi when logging into campus systems or doing non-public work. Use the Campus Virtual Private Network (VPN) or your phone as a personal hotspot instead.

    The Remote Access VPN Services provides encryption between your computer and VT resources. For more information, read our 4help article.

  4. 4. Protect the Data on Your Device

    VT's Minimum Security Standard states that endpoints with moderate or high risk data must be strongly encrypted and it is recommended for low risk endpoints. The two most common methods to protect data are "whole disk encryption" and "file encryption".

    Whole Disk Encryption Software protects the entire hard drive
    File Encryption Software encrypts a file or folder
  5. 5. Frequently Save and Backup Your Work

    Frequently save your work to ensure you don't lose progress; especially when connected to remote systems. Backing up data is an important step in protecting it.

    If you choose to backup to an external hard drive or USB key, be sure to encrypt the media and unplug it after backup to protect it from malware or ransomware.

  1. 1. Lock Your Doors and Never Leave Your Devices in the Car

    Never leave your device unattended, always lock your doors, and never leave your device in a vehicle - not even in the trunk. Keep work laptops and devices secure at all times while working remotely.

  2. 2. Lock Up Your Laptop

    Lock up your laptop when you step away, even at home. Incidents happen, and it’s good practice to lock up your laptop when you are not using it.

  3. 3. Password-Protect Your Devices

    Create strong passwords by using a passphrase - a password made up of multiple words. Use a unique passphrase for every device or online account. That way if one passphrase is compromised, other accounts and devices are unaffected.

    Tip: use a password manager, which is a specialized program that securely stores your passphrases in an encrypted format.

    Enable two-step verification whenever possible. It uses your password, but also adds a second step, such as a code sent to your smartphone or an app that generates the code for you. Two-step verification is an easy step to protect online accounts.

  4. 4. Lock Your Screens

    Configure your desktop to automatically lock after 15 minutes of inactivity and set your phone to lock the screen after no more than 15 minutes of inactivity. Shorter is even better.