Basic Security for Work From Home
Now that we are social distancing to be more physically secure at home, it’s time to focus on the security of our home computers.
According to a recent study, 54% of Americans have never worked from home before! This presents a lot of challenges and security risks to business networks as we work remotely.
Depending on the level of planning and remote workforce policies of your company, you may or may not be set up with satisfactory levels of security
at your home office. Many people are using home computers to access business networks
and their desktops at work for the first time. Home networks are generally more susceptible to attack due to less strict protocols and password requirements of home routers, WIFI and outdated or lacking Anti-Virus software. Hackers know this and will be trying to exploit this surge in new targets as quickly as possible.
Here are 5 security practices to consider for your home PC and to strengthen against attack.
Anti-Virus:
Do you have current and up-to-date Anti-Virus software on your home PC? Update your program or purchase a new product. Check with your company if they have a resource to download or will reimburse you for the purchase.
Passwords:
Change all default passwords. Have you changed your internet and WIFI routers to be a password other than the default they came with? Update your weak or non-existent passwords throughout the house. Do this for all of your network devices.
User Accounts:
Do you have user accounts set up on your shared computer? If not, it’s time to create users for everyone in your home. Each member should have an account and password. Not only is this a good practice for these times, but you can also apply content controls and restrictions to your young users’ accounts. Don’t share your login information with your children or allow them to browse the internet on the profile you use for your work connection.
Lock Screen:
Set your computer to automatically lock after a period if inactivity. Update your settings to lock the screen when not in use at an appropriate time such as 5 minutes.
Terminal:
Think about and use your home PC as a terminal. Most likely your company has many more controls and IT safety measures in place on their network than you do on yours. The safest thing you can do is leverage their security to browse the web, check your email and do all your daily work functions through your “work PC”. Use your home PC to remote into your work PC and business network and do everything through that connection. If you have non-work-related internet browsing that you want to do, do it through your phone which is likely safer than your home PC.
These are simple, yet important, steps you can take to increase your home network and IT security. And more importantly, these steps can help to prevent a hacker from exploiting you to get into your company’s network and make a big mess.
Learn how The Waker Group's Managed IT Services
can help your company.
written by:
Brendan Kelly
Brendan Kelly is a Business Alliance Manager focused on building partnerships with technology companies that can help The Walker Group’s clients increase efficiencies, reduce operating expenses and mitigate IT security risks. Prior to assuming the Business Alliance Manager role at Walker, Brendan spent 10+ years in new business sales and account management roles while working for both software and service providers.
WE ARE PROUD TO BE
More Recent News

FOR IMMEDIATE RELEASE: Farmington, CT – [April 22, 2025] – The Walker Group’s Digital Marketing Solutions (DMS) team is proud to announce its membership in The CT Community Nonprofit Alliance (The Alliance) , reinforcing its commitment to helping local non-profits maximize their impact. As both a Perpetual Purpose Trust-owned business and a social enterprise, The Walker Group operates with a mission-driven approach, making this partnership a natural fit within its business model. By joining The CT Community Nonprofit Alliance, The Walker Group DMS team gains the opportunity to collaborate with a network of organizations dedicated to strengthening non-profits across the state. Through this alliance, DMS will offer its expertise in digital marketing, website development, and strategic communications to help non-profits expand their reach, increase engagement, and amplify their missions—while making the most of their marketing budgets. “We are honored to be part of such an amazing organization that aligns perfectly with our values,” said Jeffery Williams, Creative Director at The Walker Group. “Nonprofits play a crucial role in our communities, and we are dedicated to providing them with the digital tools and marketing strategies they need to thrive.” With a strong track record of working with organizations such as The Root Center for Advanced Recovery, SCADD, and Connecticut Foodshare, The Walker Group Digital Marketing Solutions team specializes in helping non-profits leverage technology to drive awareness, increase donations, and enhance community engagement. As a social enterprise, The Walker Group is committed to using business as a force for good, reinvesting in both its employees and the communities it serves. Through this partnership, The Walker Group DMS looks forward to actively contributing to the nonprofit sector by sharing insights, sponsoring educational events, and advocating for digital transformation within the industry. For more information about The Walker Group's Digital Marketing Solutions agency and its work with nonprofits, visit https://dms.thewalkergroup.com/ Media Contact: Diana Sutcliffe Business Operations & Marketing Director The Walker Group

In today's digital world, cyberattacks are no longer a "what if" —they're a "when." No matter the size of your business or industry, cyberattacks pose a real and growing risk. From data breaches and ransomware attacks to phishing scams and system outages, the cost of a cyber incident can be devastating. This is where cybersecurity insurance becomes critical. A well-structured policy can mean the difference between a swift recovery and financial ruin. However, many companies make the mistake of only reviewing their policy after an attack happens—when it’s already too late. Businesses must proactively review and revise their coverage before an incident occurs to stay ahead of rising threats, evolving regulations, and increasing costs.