MFA on VPN

Multi-factor Authentication Required for myVPN Starting July 22, 2024 - Learn More

Beyond the Screen: Home Alone with Your Data

March 5, 2024
Working from home on phone and laptop

Picture this: you're curled up on the couch, laptop balanced precariously on your knees, engrossed in research for your next big project. It's a familiar scene for many UBC faculty and staff who've embraced the flexibility of remote work. But amidst the comfort of your home office, a silent threat lurks – the potential for a cybersecurity breach.

While working remotely offers undeniable benefits, it also introduces unique security challenges. Unlike the secure confines of the university network, your home environment might not be equipped to handle sensitive UBC information. So, how can you ensure your data remains safe and sound, even when you are kilometres away from campus?

Think Like a Spy, Not a Target:

Imagine you're a secret agent, entrusted with classified information. You wouldn't leave top-secret documents lying around the house, would you? Apply the same vigilance to your work. Here's how:

  • Create a "Classified Zone": Designate a specific area in your home for work purposes. This helps maintain a physical and mental separation between your personal life and professional responsibilities.
  • Beware of Shoulder Surfers: Working from a crowded coffee shop? Be mindful of who might be able to glimpse your screen. Consider using a privacy filter or working in a more secluded location.
  • Shred Before You Shed: Just like in the movies, even seemingly insignificant documents, like printouts or notes, can contain sensitive information. Shred any discarded work materials to prevent potential data breaches.

Turn Up Your Security Thermostat:

Just like keeping your home warm in winter, robust security keeps your data safe. Here are some ways to crank up the heat:

  • Fortress of Encryption: Encrypt your devices, especially those containing sensitive information. This scrambles your data, making it unreadable even if your device falls into the wrong hands.
  • Password Powerhouse: Create strong, unique passwords or passphrases for all your work accounts. Consider using a password manager to help you generate and manage complex passwords.
  • Software Sentinel: Keep your operating system, applications, and security software up to date. These updates often contain crucial security patches that fix vulnerabilities hackers might exploit.

Remember, you are the first line of defence against cyber threats. By adopting these strategies and staying informed about evolving security practices, you can transform your home into a secure haven for your work, and keep UBC information safe from prying eyes.


Go Further:


  • Article

UBC Crest The official logo of the University of British Columbia. Urgent Message An exclamation mark in a speech bubble. Caret An arrowhead indicating direction. Arrow An arrow indicating direction. Arrow in Circle An arrow indicating direction. Arrow in Circle An arrow indicating direction. Chats Two speech clouds. Facebook The logo for the Facebook social media service. Information The letter 'i' in a circle. Instagram The logo for the Instagram social media service. Linkedin The logo for the LinkedIn social media service. Location Pin A map location pin. Mail An envelope. Menu Three horizontal lines indicating a menu. Minus A minus sign. Telephone An antique telephone. Plus A plus symbol indicating more or the ability to add. Search A magnifying glass. Twitter The logo for the Twitter social media service. Youtube The logo for the YouTube video sharing service. Bell Warning