How to Secure Customer Information From Work at Home Computer

I doubt if your cat will be hacking into your computer to steal valuable customer information but make sure you have enough security anyway.

I strongly suggest that work at home employees have upgraded security on their home computer to protect the confidential information of their customers. Imagine being the one responsible for such data and having the information easily stolen by hackers?

Media Post published this article by Marc Robinson which has some great advice on what kind of security you should have if you are a work at home agent for a larger company or if you take personal financial information like credit cards.

How to Secure Customer Information From a Work at Home Computer

The main concern with agents working from home is security of the customer’s information. In a time when data breaches occur almost every week, customers are often uncomfortable giving out their personal information to an unknown voice on the phone.

Here are seven strategies to use to protect customer identities and confidential information when agents work from home:

1. Leverage managed, thin client devices for the Work-at-Home agents. First, ensure that agents do not use their home computers without additional software to protect data. Second, keep confidential customer information secure with a company-provided thin client device. These devices include technology and software already in place to keep the computer at the server-level.  Third, with no further output options (printers, external storage, etc.), customer data cannot be extracted.

2. Deploy end-point encapsulation on the thin client device with a virtual desktop infrastructure (VDI).  Provide a completely secured environment through both hardware and software. The cloud-based VDI lockdown will prevent access to the Internet or private documents and will only allow the agent access to client-approved areas.

3. Only allow the device to unlock after two-factor authentication. Implement a token generator and a user profile for access rights. Access to the network and support tools are only available when the agent enters the correct username and password and token.

Click Here to To Read more: 

I am not this computer savvy and I am guessing many of you are not either. All of this sounded a bit foreign to me so what I did was talked to one of my very helpful friends who is also a computer wizard. If you work from home and take any kind of personal customer information this is a very important issue so go to your local computer help center or a good friend and find out more about how to secure customer information from a work at home computer. In the end it was not that complicated and I feel a lot better knowing my clients are protected.

Photo credit: Infographe_Elle from morguefile.com

This entry was posted in entrepreneurship and tagged , , , , , , , . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *