[{"@context":"https:\/\/schema.org\/","@type":"BlogPosting","@id":"https:\/\/univista.com\/posts\/the-ping-security-in-public-places\/#BlogPosting","mainEntityOfPage":"https:\/\/univista.com\/posts\/the-ping-security-in-public-places\/","headline":"The Ping: Security in Public Places","name":"The Ping: Security in Public Places","description":"ShareTweet Working remotely may seem rather quick and easy. You head on over to your local coffee shop, order your triple-shot, half-caff, no foam, extra hot latte and sit at your favorite table in the corner.\u00a0 You double check to make sure no one is looking over your shoulder, pop open your laptop and get [&hellip;]","datePublished":"2018-09-21","dateModified":"2018-09-24","author":{"@type":"Person","@id":"https:\/\/univista.com\/posts\/author\/corie-bogan\/#Person","name":"Corie Bogan","url":"https:\/\/univista.com\/posts\/author\/corie-bogan\/","identifier":5,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"UniVista","logo":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2017\/11\/Ping-Logo-300x126.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2017\/11\/Ping-Logo-300x126.png","height":"126","width":"300"},"url":"https:\/\/univista.com\/posts\/the-ping-security-in-public-places\/","about":["bluetooth","business management","cloud","compliance","desktop","disaster recovery","internet","iPhone","laptop","malware","network","safety","Security","The Ping","update","virus","vulnerability","wifi","windows"],"wordCount":634,"articleBody":"ShareTweet                                        Working remotely may seem rather quick and easy. You head on over to your local coffee shop, order your triple-shot, half-caff, no foam, extra hot latte and sit at your favorite table in the corner.\u00a0 You double check to make sure no one is looking over your shoulder, pop open your laptop and get to work. Right? Well, it\u2019s actually a little more complicated than that. Staying secure in a non-secure work place comes with some much needed extra steps to keep your company data away from prying eyes.How to stay safeFirst, keep your items close to your person. According to Gartner, one laptop is stolen every 53 seconds. If you have to run to the restroom or just pick up your coffee at the stand, make sure to bring your laptop and expensive belongings with you. If you\u2019re worried you might step away without grabbing them, remember to turn on your \u201cFind my Device\u201d function.Be cautious of public Wi-FiIf you can avoid it, do so at all costs.\u00a0 Data sent over a public Wi-Fi can be by intercepted by bad actors both inside the establishment and in the parking lot. Does your cell phone have hotspot capability? Consider using this method instead. Also, consider turning off your Bluetooth on your computer and phone. When you leave your Bluetooth enabled, you\u2019re leaving your device open to vulnerabilities such as unauthorized connections or attacks from nearby intruders.Keep your antivirus software up-to-dateIf you do happen to fall victim to an attack, make sure you have as much support as possible to try and stop it as quickly as possible. Most updates to antivirus software include safeguards against the most recent methods of attack.\u00a0 Having the most current definitions is a surefire way to help be proactive vs reactive.Virtual Private Network (VPN)Connecting to your company data is best done over a Virtual Private Network, or VPN. A VPN \u201cextends a private network across a public network, and enables users to send and receive data\u201d within this tunnel across shared or public networks. This encrypted connection allows a user to connect to his\/her company infrastructure so they can use email and software over a secure environment.Make sure to change your passwordPassword complexity and changes are often glossed over by the everyday user and yet can be the first step in preventing cyber-attacks. Make sure to change your password at least every 30 days and follow these generic password creation rules:Do not use any names (e.g., your first name, your middle name, your last name, your logon name, spouse&#8217;s name, children&#8217;s name, etc.).Do not use common information (e.g., license plate number, address, driver&#8217;s license number, social security number, telephone number, brand of automobile, etc.).Do not use a single, common word (words found in a dictionary).Do not use repeating characters or single digits.Make your password easy to remember.Consider using a &#8220;pass phrase&#8221; as a password, such as \u201cUniVista is looking out for me!\u201d (I don\u2019t think it\u2019s commonly accepted to use spaces in a password?)Use a minimum of 7 characters for your passwords.Use both upper- and lower-case letters (e.g., A,a,B,b, etc.).Use non-alphanumeric characters (e.g., 1, 2, 3, !, @, etc.).Do not re-use the same password for multiple different logins.&nbsp;While working remotely can increase productivity and decrease employer costs (see our previous article, The Ping: Definition of a Modern Office) safety is still a major priority. If you feel your company would benefit from increasing your employees\u2019 remote work but worry about whether you\u2019re prepared for such an undertaking, feel free to give us a call at 512-832-6209!&nbsp;Your UniVista Team*Celebrating 20 Years of Customer Satisfaction*ShareTweet                                        "},{"@context":"https:\/\/schema.org\/","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Posts","item":"https:\/\/univista.com\/posts\/#breadcrumbitem"},{"@type":"ListItem","position":2,"name":"The Ping: Security in Public Places","item":"https:\/\/univista.com\/posts\/the-ping-security-in-public-places\/#breadcrumbitem"}]}]