In addition to the document “Home-Office: Securing Remote Access” we would like to provide you corresponding information for the end user on how to secure his own environment and therefore help to reduce the risk for the employer.
• Access to company ressources whenever possible applying a 2 factor authentication
• Always save data outside of the company environment in encrypted form
• Be sceptical whenever you are unexpectedly requested to open a link or an attachment
• Report suspicious emails or links to your helpdesk, especially, if you have already opened such a document or if you have already clicked on such a link.