{"id":50416,"date":"2020-05-04T18:22:00","date_gmt":"2022-10-18T18:22:23","guid":{"rendered":"https:\/\/www.salesforce.com\/?p=50416"},"modified":"2022-11-01T21:03:11","modified_gmt":"2022-11-02T04:03:11","slug":"how-to-secure-your-remote-working-environment","status":"publish","type":"post","link":"https:\/\/www.salesforce.com\/au\/blog\/how-to-secure-your-remote-working-environment\/","title":{"rendered":"How to Secure Your Remote Working Environment"},"content":{"rendered":"\n<p>We\u2019ve witnessed the largest workforce transformation in history when the world went remote almost overnight in March. As Salesforce\u2019s Chief Trust Officer, I partner with teams across the company to ensure we seamlessly continue to deliver our service in this new environment while our global security team continues to protect customer data around the clock.&nbsp;<\/p>\n\n\n\n<p>As many of you are now responsible for keeping work-from-home environments secure, here are some important steps you can take to protect yourself, your data, and your work.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-beware-of-covid-19-phishing-emails\">Beware of COVID-19 phishing emails<\/h2>\n\n\n\n<p>Hackers are <a href=\"https:\/\/www.bbc.com\/news\/technology-51838468\" target=\"_blank\" rel=\"noopener\">taking advantage<\/a> of the heightened emotions during this time. Cybercriminals are targeting individuals and organisations throughout the globe. To help protect yourself, take time to review the details of your received emails, such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><b style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\">Subject line:<\/b><span style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\"> Is something off? For example, if you receive an email with a notice about a delivery you weren\u2019t expecting, it could be a phishing attempt.<\/span> <\/li><li><b style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\">Unrecognised email addresses: <\/b><span style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\">Do you know this person? Were you expecting anything from this person? If not, be wary.<\/span> <\/li><li><b style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\">Attachments: <\/b><span style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\">Anything suspicious about the attachment? The name? The format? Do not click on these suspicious attachments.<\/span> <\/li><li><b style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\">Credential requests:<\/b><span style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\"> Is an email asking you to log in to something? Are they asking for your username, password, or other sensitive information? Do not give this information away unless you are sure the email is from a trusted sender.<\/span> <\/li><li><b style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\">Content integrity:<\/b><span style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\"> How does the message read? Is it poorly written? If so, it may be up to no good.<\/span> <\/li><li><b style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\">Calls to action:<\/b><span style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\"> Is the message requesting immediate, urgent attention? Are they asking for money? These types of emails are suspicious.<\/span> <\/li><\/ul>\n\n\n\n<p>If you notice any of the above, do not reply or click the links within the email. Instead, forward the suspect email to your organisation\u2019s security team, mark it as suspicious through your email provider (if possible), and then delete it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-enable-multi-factor-authentication-mfa\">Enable multi-factor authentication (MFA)&nbsp;<\/h2>\n\n\n\n<p>You may be more familiar with the concept of two-factor authentication, or 2FA. MFA and 2FA both protect against unauthorised access by requiring a user to provide multiple authentication factors to prove their identity. This second layer of security may come in the form of a hardware security key or temporary tokens, Touch ID (which requires you to use your fingerprint to authenticate your identity), or authentication apps like <a href=\"https:\/\/www.salesforce.com\/au\/solutions\/mobile\/app-suite\/security\/\" target=\"_blank\" rel=\"noopener\">Salesforce Authenticator<\/a>. Always check the security settings of the programs you use and enable MFA when it\u2019s available.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-use-a-strong-password\">Use a strong password<\/h2>\n\n\n\n<p>A different password on all your apps and devices \u2014 work, social, and personal \u2014 is a simple measure you can take to protect your account, especially if MFA is not available. Ensure each password includes a mix of letters, numbers, special characters, and contains at least eight to ten characters. Do not share your password with anyone. Use a password manager, like <a href=\"https:\/\/www.lastpass.com\/\" target=\"_blank\" rel=\"noopener\">LastPass<\/a>, to securely store all your passwords and make it easier to create and use unique passwords across apps and services.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-ensure-a-secure-connection\">Ensure a secure connection&nbsp;<\/h2>\n\n\n\n<p>Devices that connect to the internet, such as computers and phones, have varying levels of security controls. If your organisation provides a VPN (Virtual Private Network), use it consistently to make your internet connection more secure. You can also help keep foreign devices off your network by using the router\u2019s administrator console to enable encryption (use WPA2 or WPA3) and updating your firmware when it\u2019s necessary.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-secure-your-virtual-meetings\">Secure your virtual meetings<\/h2>\n\n\n\n<p>The use of video conference platforms is at an all-time high. Take a moment to review your web conference platform\u2019s security settings (<a href=\"https:\/\/support.google.com\/a\/answer\/7304109?hl=en\" target=\"_blank\" rel=\"noopener\">Google Meet<\/a>, <a href=\"https:\/\/help.webex.com\/en-us\/v5rgi1\/Cisco-Webex-Best-Practices-for-Secure-Meetings-Site-Administration\" target=\"_blank\" rel=\"noopener\">Cisco WebEx<\/a>) to help <a href=\"https:\/\/www.ciodive.com\/news\/zoom-bomb-remote-work-privacy\/574730\/\" target=\"_blank\" rel=\"noopener\">prevent gatecrashers<\/a> from joining your meetings.&nbsp;<\/p>\n\n\n\n<p>Use the platform\u2019s built-in security features, such as waiting rooms, screen sharing permissions and participant notifications to manage activity to prevent unauthorised attendees. Be sure to create new meeting access codes and links for each meeting. Also, disable features on the platform that you don\u2019t need \u2014 such as file transfer and recordings \u2014 to prevent unsolicited content and unauthorised sharing.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-secure-your-calls\">Secure your calls<\/h2>\n\n\n\n<p>Whether you are on the computer or on the phone, be aware of your surroundings and use headphones for work calls to minimise what others can hear. When using a landline, make sure others can not pick up the line on a different phone.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-secure-your-physical-workspace\">Secure your physical workspace<\/h2>\n\n\n\n<p>Prevent accidentally sending a sensitive email from your device by remembering to lock your screen when you walk away from your computer. If available, use a privacy screen for additional security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-secure-your-data\">Secure your data<\/h2>\n\n\n\n<p>Working from home can be a little chaotic at times, but especially in a pandemic. Be sure to store online work-related data like important files and emails in a secure location that is approved and accessible by your company.<\/p>\n\n\n\n<p>Also, be sure to back up your data in the cloud so you can always retain it, even if your son spills his morning orange juice on your MacBook. If you have sensitive information in hard copy, keep it stored in a locked file. When you no longer need it, shred it immediately.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-keep-devices-patched\">Keep devices patched<\/h2>\n\n\n\n<p>Your day-to-day schedule isn\u2019t the only thing that needs a reboot \u2013 so do your devices. Reboot at least once a week and stay up-to-date with the latest versions of software and browsers. Through patching, aka version updates, your device automatically adds necessary new features, removes old ones, fixes performance issues and removes bugs, all of which helps keep hackers out.&nbsp;<\/p>\n\n\n\n<p>Check out some additional Salesforce security resources here:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li> <a style=\"font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em; background-color: rgb(255, 255, 255);\" href=\"https:\/\/help.salesforce.com\/articleView?id=000352938&amp;type=1&amp;mode=1\" target=\"_blank\" rel=\"noopener\">Measures in place in response to Coronavirus (COVID-19)<\/a> <\/li><li> <a style=\"font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em; background-color: rgb(255, 255, 255);\" href=\"https:\/\/trust.salesforce.com\/en\/security\/stay-current-security\/\" target=\"_blank\" rel=\"noopener\">Salesforce Security Best Practices<\/a> <\/li><li> <a style=\"font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em; background-color: rgb(255, 255, 255);\" href=\"https:\/\/help.salesforce.com\/articleView?id=security_overview.htm&amp;type=5\" target=\"_blank\" rel=\"noopener\">Salesforce Help: Protect Your Salesforce Organisation<\/a> <\/li><\/ul>\n\n\n\n<p>For more advice and expert how-tos for leading your businesses or team through COVID-19, check out the <a href=\"https:\/\/www.salesforce.com\/au\/blog\/category\/leading-through-change.html\" target=\"_blank\" rel=\"noopener\">\u2018Leading through Change\u2019 series<\/a>.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image is-style-circular\"><a href=\"https:\/\/www.salesforce.com\/au\/blog\/category\/leading-through-change.html\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/LTC_BLOG_BANNER-12.jpg?strip=all&#038;quality=95\" alt=\"Leading through change banner cta\"\/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Nine important steps to keep work-from-home environments secure \u2013 protect yourself, your data and your work.<\/p>\n","protected":false},"author":1,"featured_media":50418,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sf_justforyou_enable_alt":true,"optimizely_content_id":"ff0c1c8e2030450db331b8673055b023","post_meta_title":"","ai_synopsis":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"sf_topic":[2539,2487,2467,2504,2575],"sf_content_type":[],"coauthors":[2454],"class_list":["post-50416","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","sf_topic-best-practices","sf_topic-leading-through-change","sf_topic-future-of-work","sf_topic-it","sf_topic-salesforce-ohana"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Secure Your Remote Working Environment | Salesforce<\/title>\n<meta name=\"description\" content=\"Nine important steps to keep work-from-home environments secure \u2013 protect yourself, your data and your work.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.salesforce.com\/au\/blog\/how-to-secure-your-remote-working-environment\/\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Secure Your Remote Working Environment\" \/>\n<meta property=\"og:description\" content=\"Nine important steps to keep work-from-home environments secure \u2013 protect yourself, your data and your work.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.salesforce.com\/au\/blog\/how-to-secure-your-remote-working-environment\/\" \/>\n<meta property=\"og:site_name\" content=\"Salesforce\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/salesforce\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-18T18:22:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-02T04:03:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/LTC_Template_Blog_Wordmark_500x281_v3Blue_Generic-2-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"281\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Salesforce\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@salesforce\" \/>\n<meta name=\"twitter:site\" content=\"@salesforce\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Salesforce\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/how-to-secure-your-remote-working-environment\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/how-to-secure-your-remote-working-environment\/\"},\"author\":[{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/3116597fb93569a20b61fd4fe1a932b8\"}],\"headline\":\"How to Secure Your Remote Working Environment\",\"datePublished\":\"2022-10-18T18:22:23+00:00\",\"dateModified\":\"2022-11-02T04:03:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/how-to-secure-your-remote-working-environment\/\"},\"wordCount\":964,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/how-to-secure-your-remote-working-environment\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/LTC_Template_Blog_Wordmark_500x281_v3Blue_Generic-2-2.png\",\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.salesforce.com\/au\/blog\/how-to-secure-your-remote-working-environment\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/how-to-secure-your-remote-working-environment\/\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/how-to-secure-your-remote-working-environment\/\",\"name\":\"How to Secure Your Remote Working Environment | Salesforce\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/how-to-secure-your-remote-working-environment\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/how-to-secure-your-remote-working-environment\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/LTC_Template_Blog_Wordmark_500x281_v3Blue_Generic-2-2.png\",\"datePublished\":\"2022-10-18T18:22:23+00:00\",\"dateModified\":\"2022-11-02T04:03:11+00:00\",\"description\":\"Nine important steps to keep work-from-home environments secure \u2013 protect yourself, your data and your work.\",\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.salesforce.com\/au\/blog\/how-to-secure-your-remote-working-environment\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/how-to-secure-your-remote-working-environment\/#primaryimage\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/LTC_Template_Blog_Wordmark_500x281_v3Blue_Generic-2-2.png\",\"contentUrl\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/LTC_Template_Blog_Wordmark_500x281_v3Blue_Generic-2-2.png\",\"width\":500,\"height\":281},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#website\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/\",\"name\":\"Salesforce\",\"description\":\"Learn how to get ahead of trends and supercharge professional relationships\",\"publisher\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.salesforce.com\/au\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-AU\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#organization\",\"name\":\"Salesforce\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Salesforce\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/salesforce\",\"https:\/\/x.com\/salesforce\",\"https:\/\/instagram.com\/salesforce\",\"http:\/\/www.linkedin.com\/company\/salesforce\",\"http:\/\/www.youtube.com\/Salesforce\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/3116597fb93569a20b61fd4fe1a932b8\",\"name\":\"Salesforce\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/5c0ee1996ec3a82ffd225f681265d95d\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/salesforce-avatar-e1666571807979.png?w=128&h=96&crop=1\",\"contentUrl\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/salesforce-avatar-e1666571807979.png?w=128&h=96&crop=1\",\"width\":128,\"height\":96,\"caption\":\"Salesforce\"},\"description\":\"The 360 Blog from Salesforce teaches readers how to improve work outcomes and professional relationships. Our content explores the mindset shifts, organisational hurdles, and people behind business evolution. We also cover the tactics, ethics, products, and thought leadership that make growth a meaningful and positive experience.\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/author\/salesforce\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Secure Your Remote Working Environment | Salesforce","description":"Nine important steps to keep work-from-home environments secure \u2013 protect yourself, your data and your work.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.salesforce.com\/au\/blog\/how-to-secure-your-remote-working-environment\/","og_type":"article","og_title":"How to Secure Your Remote Working Environment","og_description":"Nine important steps to keep work-from-home environments secure \u2013 protect yourself, your data and your work.","og_url":"https:\/\/www.salesforce.com\/au\/blog\/how-to-secure-your-remote-working-environment\/","og_site_name":"Salesforce","article_publisher":"https:\/\/www.facebook.com\/salesforce","article_published_time":"2022-10-18T18:22:23+00:00","article_modified_time":"2022-11-02T04:03:11+00:00","og_image":[{"width":500,"height":281,"url":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/LTC_Template_Blog_Wordmark_500x281_v3Blue_Generic-2-2.png","type":"image\/png"}],"author":"Salesforce","twitter_card":"summary_large_image","twitter_creator":"@salesforce","twitter_site":"@salesforce","twitter_misc":{"Written by":"Salesforce","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.salesforce.com\/au\/blog\/how-to-secure-your-remote-working-environment\/#article","isPartOf":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/how-to-secure-your-remote-working-environment\/"},"author":[{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/3116597fb93569a20b61fd4fe1a932b8"}],"headline":"How to Secure Your Remote Working Environment","datePublished":"2022-10-18T18:22:23+00:00","dateModified":"2022-11-02T04:03:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/how-to-secure-your-remote-working-environment\/"},"wordCount":964,"commentCount":0,"publisher":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#organization"},"image":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/how-to-secure-your-remote-working-environment\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/LTC_Template_Blog_Wordmark_500x281_v3Blue_Generic-2-2.png","inLanguage":"en-AU","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.salesforce.com\/au\/blog\/how-to-secure-your-remote-working-environment\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.salesforce.com\/au\/blog\/how-to-secure-your-remote-working-environment\/","url":"https:\/\/www.salesforce.com\/au\/blog\/how-to-secure-your-remote-working-environment\/","name":"How to Secure Your Remote Working Environment | Salesforce","isPartOf":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/how-to-secure-your-remote-working-environment\/#primaryimage"},"image":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/how-to-secure-your-remote-working-environment\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/LTC_Template_Blog_Wordmark_500x281_v3Blue_Generic-2-2.png","datePublished":"2022-10-18T18:22:23+00:00","dateModified":"2022-11-02T04:03:11+00:00","description":"Nine important steps to keep work-from-home environments secure \u2013 protect yourself, your data and your work.","inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.salesforce.com\/au\/blog\/how-to-secure-your-remote-working-environment\/"]}]},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.salesforce.com\/au\/blog\/how-to-secure-your-remote-working-environment\/#primaryimage","url":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/LTC_Template_Blog_Wordmark_500x281_v3Blue_Generic-2-2.png","contentUrl":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/LTC_Template_Blog_Wordmark_500x281_v3Blue_Generic-2-2.png","width":500,"height":281},{"@type":"WebSite","@id":"https:\/\/www.salesforce.com\/au\/blog\/#website","url":"https:\/\/www.salesforce.com\/au\/blog\/","name":"Salesforce","description":"Learn how to get ahead of trends and supercharge professional relationships","publisher":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.salesforce.com\/au\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"},{"@type":"Organization","@id":"https:\/\/www.salesforce.com\/au\/blog\/#organization","name":"Salesforce","url":"https:\/\/www.salesforce.com\/au\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Salesforce"},"image":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/salesforce","https:\/\/x.com\/salesforce","https:\/\/instagram.com\/salesforce","http:\/\/www.linkedin.com\/company\/salesforce","http:\/\/www.youtube.com\/Salesforce"]},{"@type":"Person","@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/3116597fb93569a20b61fd4fe1a932b8","name":"Salesforce","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/5c0ee1996ec3a82ffd225f681265d95d","url":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/salesforce-avatar-e1666571807979.png?w=128&h=96&crop=1","contentUrl":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/salesforce-avatar-e1666571807979.png?w=128&h=96&crop=1","width":128,"height":96,"caption":"Salesforce"},"description":"The 360 Blog from Salesforce teaches readers how to improve work outcomes and professional relationships. Our content explores the mindset shifts, organisational hurdles, and people behind business evolution. We also cover the tactics, ethics, products, and thought leadership that make growth a meaningful and positive experience.","url":"https:\/\/www.salesforce.com\/au\/blog\/author\/salesforce\/"}]}},"jetpack_featured_media_url":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/LTC_Template_Blog_Wordmark_500x281_v3Blue_Generic-2-2.png","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Salesforce","distributor_original_site_url":"https:\/\/www.salesforce.com\/au\/blog","push-errors":false,"primary_topic":{"term_id":2575,"name":"Salesforce Ohana","slug":"salesforce-ohana","term_group":0,"term_taxonomy_id":2575,"taxonomy":"sf_topic","description":"","parent":0,"count":29,"filter":"raw"},"featured_image_url":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/LTC_Template_Blog_Wordmark_500x281_v3Blue_Generic-2-2.png?w=500","_links":{"self":[{"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/posts\/50416","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/comments?post=50416"}],"version-history":[{"count":5,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/posts\/50416\/revisions"}],"predecessor-version":[{"id":55832,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/posts\/50416\/revisions\/55832"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/media\/50418"}],"wp:attachment":[{"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/media?parent=50416"}],"wp:term":[{"taxonomy":"sf_topic","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/sf_topic?post=50416"},{"taxonomy":"sf_content_type","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/sf_content_type?post=50416"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/coauthors?post=50416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}