Agree & Join LinkedIn

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Skip to main content
LinkedIn
  • Articles
  • People
  • Learning
  • Jobs
  • Games
Join now Sign in
Last updated on Mar 20, 2025
  1. All
  2. IT Services
  3. Information Security

You're managing sensitive information while working remotely. How do you keep your data secure?

When working remotely, it's essential to take steps to keep your data secure. Here are some strategies to ensure your sensitive information stays protected:

  • Use strong, unique passwords: Combine letters, numbers, and symbols for each account to enhance security.

  • Enable two-factor authentication (2FA): An extra layer of security that requires a second form of identification.

  • Utilize VPNs (Virtual Private Networks): Encrypt your internet connection to safeguard data from potential breaches.

What other measures do you take to secure your data while working remotely?

Information Security Information Security

Information Security

+ Follow
Last updated on Mar 20, 2025
  1. All
  2. IT Services
  3. Information Security

You're managing sensitive information while working remotely. How do you keep your data secure?

When working remotely, it's essential to take steps to keep your data secure. Here are some strategies to ensure your sensitive information stays protected:

  • Use strong, unique passwords: Combine letters, numbers, and symbols for each account to enhance security.

  • Enable two-factor authentication (2FA): An extra layer of security that requires a second form of identification.

  • Utilize VPNs (Virtual Private Networks): Encrypt your internet connection to safeguard data from potential breaches.

What other measures do you take to secure your data while working remotely?

Add your perspective
Help others by sharing more (125 characters min.)
9 answers
  • Contributor profile photo
    Contributor profile photo
    Adrian O.

    AiSP Validated Information Security Professional (AVIP) | CISSP | ELISHA Graduate | OLPS PPC |

    • Report contribution

    Keep your software updated. Regularly update your operating system and all applications to patch vulnerabilities. Be cautious of phishing attempts. Don't click on suspicious links or open attachments from unknown senders. Use a secure internet connection: Avoid using public Wi-Fi networks for sensitive tasks, and always connect to a secure network when possible. Back up your data regularly: Regularly back up important files to an external hard drive or cloud service. Limit access to sensitive information. Only share information with those who need it. Be aware of your surroundings: When working in public, be mindful of who can see your screen.

    Like
    4
  • Contributor profile photo
    Contributor profile photo
    Alexia Wong

    Tuition teacher. Earned Community Top Voice Badge in Teaching in '23 and Community Top Voice Badge in Cybersecurity in '24.

    • Report contribution

    To keep your data secure, you need to first enable multi-factor authentication. This is to ensure that only you have access to the sensitive information. You need to also make sure that you use strong firewall and antivirus. This is to ensure that your devices and system are always protected. You must also use encryption tools when you're sending information remotely. This is to ensure that no one would be able to hack and decipher the information.

    Like
    3
  • Contributor profile photo
    Contributor profile photo
    Luis Valente ™

    •

    • Report contribution

    Securing sensitive data while working remotely is paramount. Here's how to safeguard your information: 1. Use a VPN to encrypt your internet connection 2. Enable multi-factor authentication on all accounts 3. Keep software and systems updated 4. Use strong, unique passwords for each service 5. Encrypt sensitive files and communications 6. Be cautious of public Wi-Fi networks 7. Implement endpoint protection on all devices 8. Regularly back up data to secure cloud storage Security is a continuous process. Stay vigilant and adapt to new threats. Educate yourself and your team on best practices, as human error remains a significant risk factor.

    Like
    3
  • Contributor profile photo
    Contributor profile photo
    Deepa Ajish

    Vice President | ServiceNow Transformation & Automation Leader | Security & Compliance | IT Security Strategist | Judge | Coach | Mentor

    • Report contribution

    Encrypting files is a smart way to protect sensitive information, as it ensures that only authorized individuals can access the data.

    Like
    2
  • Contributor profile photo
    Contributor profile photo
    Saibal Dasgupta

    IT/OT Security Solution Specialist || IT Infrastructure Solution Architect || IT Service Delivery || AI Enthusiast

    • Report contribution

    For securing information, just technical controls like encryption, MFAs, strong passwords are not enough. These are just some links in the info sec chain.The most critical link in this security chain are human being aka the users. The users are also the weakest link, prone to making mistakes leading to weakness in the security ecosystem. User training and awareness is the most important requirement to ensure organisational data are kept safe and secure no matter where they are being accessed from.

    Like
    2
  • Contributor profile photo
    Contributor profile photo
    Harry Waldron, CPCU

    Business Systems Analyst

    • Report contribution

    SECURITY BEST PRACTICES for remote users * VPN/MFA (2 step encrypted logins) * Use 8+ CHAR PSWD (ALPHA, CASE, NUMBER & SPEC-CHAR mix) * Quality Antivirus * Harden network/cloud/devices * End-to-end encryption * Harden GPO Windows settings * SPAM, phish & web protection * Enforced Auto Updates * Active HR & Security POLICIES * BUSINESS USE ONLY all devices * Access User & Network Monitoring * Latest WIRELESS routers & protocols * Restrict user Local ADMIN rights * BITLOCKER for hard drives & USB * Active SECURITY AWARENESS training * SANS or KNOWBE4 training/testing all employees * Monitor, PENTEST, continuous improvement PRIVACY & AUDIT BEST PRACTICES * SAS-70 * GDPR * CCPA * HIPAA * SOX/COSO/COBIT * PCI-DSS * SOC2 * NIST * ISO 27001

    Like
    2
  • Contributor profile photo
    Contributor profile photo
    Nibin Nelson

    Software Architect and Developer

    • Report contribution

    Use a VPN to encrypt your connection, enable multi-factor authentication (MFA) for added security, and keep devices updated with antivirus software. Encrypt files before sharing, use secure collaboration tools, and maintain strong password hygiene with a password manager. Stay vigilant to protect your data.

    Like
    1
  • Contributor profile photo
    Contributor profile photo
    Hafiz Ahsan Javed

    Cloud and Network Security Engineer | CCNA | HCIA | HCIP | AZ-104 | AWS Certified | Fortinet NSE1 | NSE2 | NSE3 and NSE 7 (Fortinet Enterprise Firewall 7.0 Administrator) | Securing Digital Landscape with Expertise

    • Report contribution

    In addition to strong passwords, 2FA, and VPNs, I also ensure that all devices used for remote work have up-to-date antivirus software and are encrypted—especially laptops and mobile devices. I avoid using public Wi-Fi for sensitive tasks, or I tether to a secure mobile hotspot when needed. Cloud storage is limited to company-approved platforms with strict access controls, and I regularly back up important data to a secure location. Lastly, I stay mindful of phishing attempts and ensure my screen is not visible during virtual meetings in public spaces. Security isn't just about tools—it's about habits, too.

    Like
    1
  • Contributor profile photo
    Contributor profile photo
    Rohit Mangla

    QA Executive @noon

    • Report contribution

    The main thing will be: Enable two-factor authentication (2FA): An extra layer of security that requires a second form of identification.

    Like
    1
Information Security Information Security

Information Security

+ Follow

Rate this article

We created this article with the help of AI. What do you think of it?
It’s great It’s not so great

Thanks for your feedback

Your feedback is private. Like or react to bring the conversation to your network.

Tell us more

Report this article

More articles on Information Security

No more previous content
  • You're facing evolving cyber threats. How will you adapt your access controls to stay ahead?

  • You're facing a security incident with your team. How do you maintain transparency?

    15 contributions

  • You're trying to balance security and usability in authentication. Are your current methods effective?

    7 contributions

  • You need to explain multi-factor authentication to a non-technical team. How do you make it clear?

    9 contributions

  • You're faced with multiple critical system vulnerabilities. How do you determine which one to patch first?

    3 contributions

  • Facing a data breach incident, how can you collaborate seamlessly with external cybersecurity experts?

    8 contributions

  • You're facing a data breach crisis. How do you maintain speed without compromising precision?

No more next content
See all

More relevant reading

  • Software Development
    Here's how you can safeguard data security and privacy while working remotely.
  • Data Management
    How do you ensure data security when working remotely?
  • Computer-Aided Design (CAD)
    What do you do if your CAD data is at risk while working remotely?
  • Data Management
    How do you ensure data security when working remotely?

Explore Other Skills

  • IT Strategy
  • System Administration
  • Technical Support
  • Cybersecurity
  • IT Management
  • Software Project Management
  • IT Consulting
  • IT Operations
  • Data Management
  • Information Technology

Are you sure you want to delete your contribution?

Are you sure you want to delete your reply?

  • LinkedIn © 2025
  • About
  • Accessibility
  • User Agreement
  • Privacy Policy
  • Cookie Policy
  • Copyright Policy
  • Brand Policy
  • Guest Controls
  • Community Guidelines
Like
9 Contributions