­
Information Security Tips when Working from Home (COVID 19) - All Articles - CISO Platform

These Information Security Tips when Working from Home are posted on behalf of Bhushan Deo, CISO for Thermax Limited

Connection & Access

  1. Avoid connecting to unsecured Wi-Fi / networks for internet.
  2. Use only company provided VPN / Citrix connection. Avoid use of any other utility for accessing applications / data.
  3. Check & ensure latest antivirus updates on our laptop regularly.
  4. Strictly avoid sharing our usernames and passwords to others.

 Data sharing & Collaboration

  1. Adopt all proper & sensible precautions when handling Company data.
  2. Save & share data from Company O365 One Drive.
  3. Use Company O365 Teams to conduct meetings, to share information, screens etc.
  4. Avoid use of social media like WhatsApp while discussing / sharing sensitive business information.
  5. Do not give PRINTs at default printer of office, where the print-out may remain unattended (in absence of secure print) & may be misused.
  6. Ensure adequate security provisions of your mobile phones to protect Company information being accessed.
  7. Ensure that Company confidential information is not shared with unauthorised users, vendors, family, friends or members of the public.

 Phishing Emails and Websites

  1. Strictly avoid opening e-mails, URLs & file attachments received from unsolicited or unreliable sources.
  2. Fake emails are sent by hackers about Corona virus. Do not open such mails / URLs / attachments. Forward suspicious mails to _____ ID
  3. Also avoid the use of various maps / graphics showing the spread of Corona. There are incidents of computer hacking through them.

 Physical protection

  1. Avoid eating or drinking in the vicinity of our laptops / computers.
  2. Avoid exposing the laptop / computer to sudden impacts or shocks, humidity, sunlight, water etc.
  3. Do not repair, configure or change of system settings of the laptop / computer. Report to IT.
  4. Lock laptop / computer screen when left unattended, to prevent alteration / deletion of data.
  5. Ensure the physical protection of our laptops / computers.

 Other important points

  1.  Do not install any software on any Company computer. Do not download / copy any type of unauthorised / pirated software.
  2. Do not access Internet sites containing foul / obscene / illegal / unethical / adult / violence / rumours related content from Company computers
  3. Do not use external, web-based e-mail services (e.g. gmail.com, yahoo.com, hotmail.com) for Company business communication.
  4. Ensure to have written approval from Business authorities, prior to transferring the business information to anyone.
  5. Do not copy Business data on removable media like USB storage.
  6. Do not access others’ emails directly by using their passwords.
  7. IT continuously monitors the technical & security usage of the IT Resources, to prevent & correct any performance issues & any misuse.
  8. If you come across any misuse of Company information / asset, then bring to the notice of our business authorities, Functional Risk Officer (FRO), IT & HR; or mail to _____ email ID.
  9. Use our IT resources in a legal, ethical & responsible manner. Do not use them for unauthorised commercial activities or unauthorised personal gain.
  10. Report the Security incidents through IT tool / sending mail to _____ email ID.

P.s: Some details are gathered from our ISMS ISO 27001 policies

Votes: 0
E-mail me when people leave their comments –

Priyanka, Co-Founder and Editor, CISO Platform Breach Intelligence, leads our threat intelligence and incident analysis efforts, providing actionable insights to the global cybersecurity community. With extensive experience in cybersecurity leadership and breach analysis, she specializes in translating complex technical threats into strategic intelligence for security executives.

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Comments

  • Hi, Sorry to reply late. I was not connected to the portal for a long time.

    In my opinion, Team Viewer is safe if a proper licensed version is used. Free versions of any such tool will prone to security, privacy and compliance risks.

    Stay safe!

  • How safe is Team Viewer for remote access for Business activities.

    Please advise.

This reply was deleted.

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

CISO Platform Talks : Security FireSide Chat With A Top CISO or equivalent (Monthly)

  • Description:

    CISO Platform Talks: Security Fireside Chat With a Top CISO

    Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.

    We’ve had the privilege of…

  • Created by: Biswajit Banerjee
  • Tags: ciso, fireside chat

CISO MeetUp: Executive Cocktail Reception @ Black Hat USA , Las Vegas 2025

  • Description:

    We are excited to invite you to the CISO MeetUp: Executive Cocktail Reception if you are there at the Black Hat Conference USA, Las Vegas 2025. This event is organized by EC-Council & FireCompass with CISOPlatform as proud community partner. 

    This evening is designed for Director-level and above cybersecurity professionals to connect, collaborate, and unwind in a relaxed setting. Enjoy…

  • Created by: Biswajit Banerjee
  • Tags: black hat 2025, ciso meetup, cocktail reception, usa events, cybersecurity events, ciso

6 City Playbook Round Table Series (Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata)

  • Description:

    Join us for an exclusive 6-city roundtable series across Delhi, Mumbai, Bangalore, Pune, Chennai, and Kolkata. Curated for top cybersecurity leaders, this series will spotlight proven strategies, real-world insights, and impactful playbooks from the industry’s best.

    Network with peers, exchange ideas, and contribute to shaping the Top 100 Security Playbooks of the year.

    Date : Sept 2025 - Oct 2025

    Venue: Delhi, Mumbai, Bangalore, Pune,…

  • Created by: Biswajit Banerjee

National Insider Risk Symposium, Washington DC, USA 2025

  • Description:

    We are excited to invite you to the 10th National Insider Risk Symposium, a premier forum bringing together leaders and experts from both the commercial and public sectors to address the evolving landscape of insider threats. CISOPlatform is a proud community partner for this event. 

    Event Details:
    Venue: National Housing Center, 1201 15th St NW, Washington, D.C. 20005
    Dates: September 17–18,…

  • Created by: Biswajit Banerjee
  • Tags: national insider risk symposium, ciso, cybersecurity events, usa events