
Working From Home Mini Guide
If you are running your business from home or it’s something you have had to implement in response to recent events, the requirement to protect personal data doesn’t change.

What is a Data Breach?
• A Network Security Breach
• Ransomware, Phishing Emails
• Loss of a Device
• Loss of Manual / Paper documents
• Data sent to the wrong person
• Inappropriate access or sharing
• Accidental inclusion in an email chain
• Fraud
• Unescorted visitors accessing data on your premises
• Loss files deleted or destroyed in error
• Amendment Personal Data has been edited or amended in error.
• Non-Secure Disposal Data or equipment storing it has not been destroyed securely
• Ransomware, Phishing Emails
• Loss of a Device
• Loss of Manual / Paper documents
• Data sent to the wrong person
• Inappropriate access or sharing
• Accidental inclusion in an email chain
• Fraud
• Unescorted visitors accessing data on your premises
• Loss files deleted or destroyed in error
• Amendment Personal Data has been edited or amended in error.
• Non-Secure Disposal Data or equipment storing it has not been destroyed securely
Tips for working from home
• Always run the most up to date versions of software and install updates as soon as they are available these updates often include security and patches which are responding to newly identified threats.
• Have and keep Malware / Anti Virus Protections up to date at all times
• Ensure that only ever authorized users can download or update any software.
• Understand what Phishing emails are and how to block and/or identify them
• If you are working from home permanently consider using a Virtual Private Connection (VPN)
• Ensure that devices are encrypted and can be remotely shut off if lost or stolen.
• Implement Strict Password Management Controls
• Avoid printing personal data if you can and if you must, Always cross shred confidential / Personal Information as soon as you can and no longer need it. Always keep it securely locked away in the meantime.
• Avoid using Personal Email accounts & storage and always keep your business data separate
• Avoid using personal devices, unless you can apply all the above measures to your own devices too. In reality, these are less likely to be encrypted and often have less robust passwords…. Do your kids play with your phone?
• Inappropriate access or sharing is a breach. Be mindful that visible screens, calls you make at home will include details that shouldn’t be shared with others including visitors or members of
• Have and keep Malware / Anti Virus Protections up to date at all times
• Ensure that only ever authorized users can download or update any software.
• Understand what Phishing emails are and how to block and/or identify them
• If you are working from home permanently consider using a Virtual Private Connection (VPN)
• Ensure that devices are encrypted and can be remotely shut off if lost or stolen.
• Implement Strict Password Management Controls
• Avoid printing personal data if you can and if you must, Always cross shred confidential / Personal Information as soon as you can and no longer need it. Always keep it securely locked away in the meantime.
• Avoid using Personal Email accounts & storage and always keep your business data separate
• Avoid using personal devices, unless you can apply all the above measures to your own devices too. In reality, these are less likely to be encrypted and often have less robust passwords…. Do your kids play with your phone?
• Inappropriate access or sharing is a breach. Be mindful that visible screens, calls you make at home will include details that shouldn’t be shared with others including visitors or members of
Do you have a Remote Working Policy?
Do you have a Remote Working Policy? A Remote Working policy with some simple guidelines including these examples, that everyone can follow can help you to continue to protect your clients, your employees and your business.
