RIGA’s Top Tips on How to Remain Cyber Safe While Working From Home

March 14, 2025
Development

<img decoding="async" class="aligncenter wp-image-1743 " src="https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/firmbee-com-31OdWLEQ-78-unsplash-1024x683-2.jpg" alt="" width="643" height="429" srcset="https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/firmbee-com-31OdWLEQ-78-unsplash-1024x683-2.jpg 1024w, https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/firmbee-com-31OdWLEQ-78-unsplash-300x200-2.jpg 300w, https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/firmbee-com-31OdWLEQ-78-unsplash-768x512-2.jpg 768w, https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/firmbee-com-31OdWLEQ-78-unsplash-1536x1024-2.jpg 1536w, https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/firmbee-com-31OdWLEQ-78-unsplash-2048x1366-2.jpg 2048w" sizes="(max-width: 643px) 100vw, 643px">

Hybrid working environments, for the most part, are here to stay. While 6% of the Australian workforce was working from home before the pandemic, new research shows that 35% of Australian workers have jobs that can be done remotely. 

And in large part, the Australian public prefers the flexibility and convenience that working from home provides, with many electing to work three to four days a week. While working from home offers many benefits, it poses unique cyber security challenges. It represents a potential risk to your business, as your business is only as strong as your weakest link.

Whether you are an employee who works from home or a business owner, it is vital to prioritise cyber security.

In a previous blog post, we touched on our five tips for protecting yourself online, but today, we will focus on tips to address the challenges of working from home while remaining cyber safe. Following these tips can enhance your cyber safety and protect your business.

Ensure your home network is secure 

How often do you think about your Wi-Fi? 

As a necessity in most households, a home’s Wi-Fi often presents the biggest security risk. Wi-Fi is the hub of all activity in the house and is often one of the first things we share with our friends and connect all our phones, tablets, computers, and televisions to. As such, Wi-Fi networks are easily searchable, and passwords are often easily guessable for conscience. This is a serious cyber security risk, especially if you work from home.

To limit the risk of a potential cyber-attack, you should ensure your home network is secure. Setting a strong, unique password and enabling encryption (WPA2 or WPA3) are simple ways to increase security. 

For extra protection, disconnect any old or unfamiliar devices, regularly change your network password and use a separate network for work devices.

Secure your physical workspace 

When working from home or in a public space such as a café, it is important to remember the people around you. While our loved ones probably aren’t trying to access our work data, securing your physical workspace is still important to reduce risk. 

 You never know; your child might accidentally click on a phishing email, and now your data is a risk. 

A simple way to prevent unauthorised access to your work devices is to lock them when not in use & ensure that they have password protection enabled to avoid easy access.

If you are working in a public space, you should also avoid leaving any important documentation or notes, including passwords you may have written down, in plain sight.

Be mindful when working in public 

Speaking of public spaces, who doesn’t love working from the coffee shop occasionally? 

 While the flexibility of working from home allows for working in public spaces, you need to be aware of the potential cyber security risks. 

Firstly, when working in public spaces, be mindful of prying eyes and secure your screen from unauthorised eyes, as you never know who can see your screen. 

Secondly, avoid connecting work devices to public charging stations, as “bad actors” have crafted a way to hack these outlets and steal your data. Instead, carry a power device to charge your work devices.

When connecting your work devices to public Wi-Fi networks, it is important to remember that these networks are often unsecured, making it easier for hackers to access your devices. When working for a cafe or airport, use a Virtual Private Network (VPN) to protect your communications and prevent unauthorised access to your information. Also, avoid doing data-sensitive tasks while working in public. 

It is important to remain vigilant about cyber safety and protect your data when working remotely. By implementing these tips from the experts at RIGA, you can enhance your cyber security and minimise the risk of cyber-attacks while enjoying working from home. 

# Contact US

Want to know how Instant Windscreens and Tinting saved 2,000 hours per month?

JourneyPRO Instant Windscreens Case Study

<img decoding="async" class="alignnone size-full wp-image-1437" src="https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/RIGA-InstantWindscreens-CaseStudy-Graphic3-Mar-13-2025-05-58-07-8249-AM.png" alt="JourneyPRO Instant Windscreens Case Study" width="714" height="289" srcset="https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/RIGA-InstantWindscreens-CaseStudy-Graphic3-Mar-13-2025-05-58-07-8249-AM.png 714w, https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/RIGA-InstantWindscreens-CaseStudy-Graphic3-300x121-Mar-13-2025-05-58-26-4090-AM.png 300w" sizes="(max-width: 714px) 100vw, 714px">

Instant Windscreens and Tinting use JourneyPRO in their business today.

“JOURNEY is a ‘first-in-our-industry’ technology that improves our customer service offering, and claims back approximately 2,000 hours monthly in route scheduling for our branch management teams.”

Read more about how JourneyPRO has transformed Instant Windscreens’ business by downloading the case study here.

Simply tell us about yourself to download a copy of the Instant Windscreens and Tinting case study.

Full Name

Company Name*

Phone*

Email*

Download Case Study

Marketing by ActiveCampaign

Related Posts:

christin-hume-hBuwVLcYTnA-unsplash
<img width="300" height="200" src="https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/christin-hume-hBuwVLcYTnA-unsplash-1-300x200-Mar-13-2025-05-53-54-0960-AM.jpg" class="crp_thumb crp_featured" alt="christin-hume-hBuwVLcYTnA-unsplash" title="RIGA’s Top 5 Tips to Protect Yourself Online" srcset="https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/christin-hume-hBuwVLcYTnA-unsplash-1-300x200-Mar-13-2025-05-53-54-0960-AM.jpg 300w, https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/christin-hume-hBuwVLcYTnA-unsplash-1-1024x683-Mar-13-2025-05-53-48-0579-AM.jpg 1024w, https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/christin-hume-hBuwVLcYTnA-unsplash-1-768x512-Mar-13-2025-05-54-16-9676-AM.jpg 768w, https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/christin-hume-hBuwVLcYTnA-unsplash-1-1536x1024-Mar-13-2025-05-53-50-3625-AM.jpg 1536w, https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/christin-hume-hBuwVLcYTnA-unsplash-1-2048x1365-Mar-13-2025-05-54-01-0031-AM.jpg 2048w" sizes="(max-width: 300px) 100vw, 300px">
Working Desk
<img width="300" height="200" src="https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/iStock-599982872-300x200-2.jpg" class="crp_thumb crp_featured" alt="Working Desk" title="Working From Home. How to manage your transition effectively." srcset="https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/iStock-599982872-300x200-2.jpg 300w, https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/iStock-599982872-1024x683-3.jpg 1024w, https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/iStock-599982872-768x512-2.jpg 768w, https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/iStock-599982872-1536x1024-2.jpg 1536w, https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/iStock-599982872-2048x1365-2.jpg 2048w" sizes="(max-width: 300px) 100vw, 300px">
Why Cyber Security Awareness Should Be Your Top Priority in 2024
<img width="300" height="150" src="https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/Why-Cyber-Security-Awareness-Should-Be-Your-Top-Priority-in-2024-300x150-Mar-13-2025-05-48-34-9197-AM.png" class="crp_thumb crp_featured" alt="Why Cyber Security Awareness Should Be Your Top Priority in 2024" title="Why Cyber Security Awareness Should Be Your Top Priority in 2024" srcset="https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/Why-Cyber-Security-Awareness-Should-Be-Your-Top-Priority-in-2024-300x150-Mar-13-2025-05-48-34-9197-AM.png 300w, https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/Why-Cyber-Security-Awareness-Should-Be-Your-Top-Priority-in-2024-Mar-13-2025-05-48-20-6253-AM.png 600w" sizes="(max-width: 300px) 100vw, 300px">

Frequently Asked
Questions

Do you complete Security Audits?

YES - we can complete one-off audits to give you a second opinion on your environment. However, this is what we refer to as IT Cowboys, and we would prefer to build an ongoing relationship with you. That’s why, when you commit to one of our packages, we complete an onboarding audit, which includes a security audit, a gap analysis against our Tactical 12 fortress, along with internal and external penetration tests. We then put together a plan for remediation as quickly as possible to ensure your compliance and get your insurance sorted ASAP so you’re covered.

Do you come to site?

In the initial onboarding process, we attend your site to document and understand how you operate, completing a checklist, inspecting infrastructure suitability, meeting key stakeholders, and performing general IT housekeeping. Once the onboarding process is complete, your environment should be rock solid, and the need to attend the site moving forward should be very minimal, if at all.

Will my existing computers be supported?

YES - Providing they are a currently supported operating system by the vendor and under warranty by the manufacturer.

Do you support Apple Mac and can they be compliant?

YES - we worked hard to ensure that Apple products can be supported and secured under all our product offerings.

What happens if an issue arises outside my support contract?

inSUPPORT Helpdesk operates a 24/7 'follow-the-sun' support desk, serviced by a team of global geeks. You might get a Kiwi from New Zealand on one call, and a Pinoy/Pinay from the Philippines on the next.