{"id":1304,"date":"2020-06-12T15:50:00","date_gmt":"2023-10-18T15:50:07","guid":{"rendered":"https:\/\/www.salesforce.com\/?p=1304"},"modified":"2023-10-18T17:35:33","modified_gmt":"2023-10-18T17:35:33","slug":"how-to-secure-remote-work-environment","status":"publish","type":"post","link":"https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/","title":{"rendered":"Is Your Remote Environment Secure? Here\u2019s How to Keep It Safe"},"content":{"rendered":"\n<p>We\u2019ve witnessed the largest workforce transformation in history when the world went remote almost overnight in March. As Salesforce\u2019s Chief Trust Officer, I partner with teams across the company to ensure we seamlessly continue to deliver our service in this new environment while our global security team continues to protect customer data around the clock. <\/p>\n<p>As many of you are now responsible for keeping work-from-home environments secure, here are some important steps you can take to protect yourself, your data, and your work.<\/p>\n<h2><b>Beware of COVID-19 phishing emails<\/b><\/h2>\n<p>Hackers are <a href=\"https:\/\/www.bbc.com\/news\/technology-51838468\" target=\"_blank\" rel=\"nofollow noopener\">taking advantage<\/a> of the heightened emotions during this time. Cybercriminals are targeting individuals and organizations throughout the globe. To help protect yourself, take time to review the details of your received emails, such as:<\/p>\n<ul>\n<li>\n<p><b>Subject line<\/b>: Is something off? For example, if you receive an email with a notice about a delivery you weren\u2019t expecting, it could be a phishing attempt.<\/p>\n<\/li>\n<li>\n<p><b>Unrecognized email addresses<\/b>: Do you know this person? Were you expecting anything from this person? If not, be wary.<\/p>\n<\/li>\n<li>\n<p><b>Attachments<\/b>: Anything suspicious about the attachment? The name? The format? Do not click on these suspicious attachments.<\/p>\n<\/li>\n<li>\n<p><b>Credential requests<\/b>: Is an email asking you to log in to something? Are they asking for your username, password, or other sensitive information? Do not give this information away unless you are sure the email is from a trusted sender.<\/p>\n<\/li>\n<li>\n<p><b>Content integrity<\/b>: How does the message read? Is it poorly written? If so, it may be up to no good.<\/p>\n<\/li>\n<li>\n<p><b>Calls to action<\/b>: Is the message requesting immediate, urgent attention? Are they asking for money? These types of emails are suspicious.<\/p>\n<\/li>\n<\/ul>\n<p>If you notice any of the above, do not reply or click the links within the email. Instead, forward the suspect email to your organization\u2019s security team, mark it as suspicious through your email provider (if possible), and then delete it.<\/p>\n<h2><b>Enable multi-factor authentication (MFA)<\/b> <\/h2>\n<p>You may be more familiar with the concept of two-factor authentication, or 2FA. MFA and 2FA both protect against unauthorized access by requiring a user to provide multiple authentication factors to prove their identity. This second layer of security may come in the form of a hardware security key or temporary tokens, Touch ID (which requires you to use your fingerprint to authenticate your identity), or authentication apps like<a href=\"https:\/\/www.salesforce.com\/solutions\/mobile\/app-suite\/security\/\" target=\"_blank\" rel=\"nofollow noopener\"> Salesforce Authenticator<\/a>. Always check the security settings of the programs you use and enable MFA when it\u2019s available.<\/p>\n<h2><b>Use a strong password<\/b><\/h2>\n<p>A different password on all your apps and devices \u2014 work, social, and personal \u2014 is a simple measure you can take to protect your account,especially if MFA is not available. Ensure each password includes a mix of letters, numbers, special characters, and contains at least eight to ten characters. Do not share your password with anyone. Use a password manager, like <a href=\"https:\/\/www.lastpass.com\/get-premium?gclid=EAIaIQobChMIqq6br7jr6AIVAP3jBx0uSw2HEAAYAiAAEgIUM_D_BwE\" target=\"_blank\" rel=\"nofollow noopener\">LastPass<\/a>, to securely store all your passwords and make it easier to create and use unique passwords across apps and services.<\/p>\n<h2><b>Ensure a secure connection <\/b><\/h2>\n<p>Devices that connect to the internet, such as computers and phones, have varying levels of security controls. If your organization provides a VPN (Virtual Private Network), use it consistently to make your internet connection more secure. You can also help keep foreign devices off your network by using the router\u2019s administrator console to enable encryption (use WPA2 or WPA3) and updating your firmware when it\u2019s necessary.<\/p>\n<h2><b>Secure your virtual meetings<\/b><\/h2>\n<p>The use of video conference platforms is at an all-time high. Take a moment to review your web conference platform\u2019s security settings (<a href=\"https:\/\/support.google.com\/a\/answer\/7304109?hl=en\" target=\"_blank\" rel=\"nofollow noopener\">Google Meet<\/a>, <a href=\"https:\/\/help.webex.com\/en-us\/v5rgi1\/Cisco-Webex-Best-Practices-for-Secure-Meetings-Site-Administration\" target=\"_blank\" rel=\"nofollow noopener\">Cisco WebEx<\/a>) to help <a href=\"https:\/\/www.ciodive.com\/news\/zoom-bomb-remote-work-privacy\/574730\/\" target=\"_blank\" rel=\"nofollow noopener\">prevent gatecrashers from joining your meetings<\/a>. Use the platform\u2019s built-in security features, such as waiting rooms, screen sharing permissions, and participant notifications to manage activity to prevent unauthorized attendees. Be sure to create new meeting access codes and links for each meeting. Also, disable features on the platform that you don\u2019t need \u2014 such as file transfer and recordings \u2014 to prevent unsolicited content and unauthorized sharing.<\/p>\n<h2><b>Secure your calls<\/b><\/h2>\n<p>Whether you are on the computer or on the phone, be aware of your surroundings and use headphones for work calls to minimize what others can hear. When using a landline, make sure others can not pick up the line on a different phone.<\/p>\n<h2><b>Secure your physical workspace<\/b><\/h2>\n<p>Prevent accidentally sending a sensitive email from your device by remembering to lock your screen when you walk away from your computer. If available, use a privacy screen for additional security.<\/p>\n<h2><b>Secure your data<\/b><\/h2>\n<p>Working from home can be a little chaotic at times, but especially in a pandemic. Be sure to store online work-related data like important files and emails in a secure location that is approved and accessible by your company. Also, be sure to back up your data in the cloud so you can alway retain it, even if your son spills his morning orange juice on your MacBook. If you have sensitive information in hard copy, keep it stored in a locked file. When you no longer need it, shred it immediately.<\/p>\n<h2><b>Keep devices patched<\/b><\/h2>\n<p>Your day-to-day schedule isn\u2019t the only thing that needs a reboot \u2014 so do your devices. Reboot at least once a week and stay up-to-date with the latest versions of software and browsers. Through patching, aka version updates, your device automatically adds necessary new features, removes old ones, fixes performance issues, and removes bugs, all of which helps keep hackers out. <\/p>\n<p>Check out some additional Salesforce security resources here:<\/p>\n<ul>\n<li>\n<p><a href=\"https:\/\/www.salesforce.com\/blog\/2020\/03\/safety-and-wellbeing-those-around-you.html\" target=\"_blank\" rel=\"nofollow noopener\">Updates on Salesforce Safety and Wellbeing Actions<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/help.salesforce.com\/articleView?id=000352938&amp;type=1&amp;mode=1\" target=\"_blank\" rel=\"nofollow noopener\">Measures in place in response to Coronavirus (COVID-19)<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/trust.salesforce.com\/en\/security\/stay-current-security\/\" target=\"_blank\" rel=\"nofollow noopener\">Salesforce Security Best Practices<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/help.salesforce.com\/articleView?id=security_overview.htm&amp;type=5\" target=\"_blank\" rel=\"nofollow noopener\">Salesforce Help: Protect Your Salesforce Organization<\/a><\/p>\n<\/li>\n<\/ul>\n<p>To get more tips on navigating through COVID-19, check out our<a href=\"https:\/\/www.salesforce.com\/ca\/blog\/category\/leading-through-change.html\" target=\"_blank\" rel=\"nofollow noopener\"> Leading Through Change<\/a> series, where you\u2019ll find thought leadership, tips, and resources to help business leaders manage through crisis.<\/p>\n<ul>\n<li>\n<p>Here are<a href=\"https:\/\/www.salesforce.com\/ca\/blog\/2020\/03\/5-things-to-help-our-employees-navigate-work.html\" target=\"_blank\" rel=\"nofollow noopener\"> five ways we\u2019re helping our employees navigate work<\/a><\/p>\n<\/li>\n<li>\n<p>Ways to<a href=\"https:\/\/www.salesforce.com\/ca\/blog\/2020\/03\/remote-customer-relationship-management.html\" target=\"_blank\" rel=\"nofollow noopener\"> maintain customer relationships<\/a> when you can\u2019t meet in person<\/p>\n<\/li>\n<li>\n<p>You need to have a<a href=\"https:\/\/www.salesforce.com\/ca\/blog\/2020\/03\/customer-communication-crisis.html\" target=\"_blank\" rel=\"nofollow noopener\"> crisis communications plan<\/a> in place<\/p>\n<\/li>\n<\/ul>\n<p> <span id=\"authorRoot\" path=\"\/content\/blogs\/ca\/en\/authors\/\"><\/span> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Many of us are now responsible for keeping work-from-home environments secure. Here are some important steps you can take to protect yourself, your data, and your work.<\/p>\n","protected":false},"author":1,"featured_media":1268,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sf_justforyou_enable_alt":true,"optimizely_content_id":"","post_meta_title":"","ai_synopsis":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"sf_topic":[71,54,44,66,42],"sf_content_type":[],"coauthors":[72],"class_list":["post-1304","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","sf_topic-best-practices","sf_topic-future-of-work","sf_topic-leading-through-change","sf_topic-it","sf_topic-salesforce-ohana"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Keep Your Remote Environment Safe - Salesforce<\/title>\n<meta name=\"description\" content=\"Many of us are now responsible for keeping work-from-home environments secure. Here are some important steps you can take to protect yourself, your data, and your work.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is Your Remote Environment Secure? Here\u2019s How to Keep It Safe\" \/>\n<meta property=\"og:description\" content=\"Many of us are now responsible for keeping work-from-home environments secure. Here are some important steps you can take to protect yourself, your data, and your work.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/\" \/>\n<meta property=\"og:site_name\" content=\"Salesforce\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-18T15:50:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-18T17:35:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.salesforce.com\/ca\/blog\/wp-content\/uploads\/sites\/12\/2023\/10\/leading-through-change-blue.png\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"281\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jim Alkove\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jim Alkove\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/\"},\"author\":[{\"@id\":\"https:\/\/www.salesforce.com\/ca\/blog\/#\/schema\/person\/image\/a0d1621f05db5993c51a8f4f080603a8\"}],\"headline\":\"Is Your Remote Environment Secure? Here\u2019s How to Keep It Safe\",\"datePublished\":\"2023-10-18T15:50:07+00:00\",\"dateModified\":\"2023-10-18T17:35:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/\"},\"wordCount\":1013,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/ca\/blog\/wp-content\/uploads\/sites\/12\/2023\/10\/leading-through-change-blue.png\",\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/\",\"url\":\"https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/\",\"name\":\"How to Keep Your Remote Environment Safe - Salesforce\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/ca\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/ca\/blog\/wp-content\/uploads\/sites\/12\/2023\/10\/leading-through-change-blue.png\",\"datePublished\":\"2023-10-18T15:50:07+00:00\",\"dateModified\":\"2023-10-18T17:35:33+00:00\",\"author\":{\"@id\":\"https:\/\/www.salesforce.com\/ca\/blog\/#\/schema\/person\/601f410a2801f4ddcf6f00cb182e69d3\"},\"description\":\"Many of us are now responsible for keeping work-from-home environments secure. Here are some important steps you can take to protect yourself, your data, and your work.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/#primaryimage\",\"url\":\"https:\/\/www.salesforce.com\/ca\/blog\/wp-content\/uploads\/sites\/12\/2023\/10\/leading-through-change-blue.png\",\"contentUrl\":\"https:\/\/www.salesforce.com\/ca\/blog\/wp-content\/uploads\/sites\/12\/2023\/10\/leading-through-change-blue.png\",\"width\":500,\"height\":281,\"caption\":\"Is Your Remote Environment Secure? Here\u2019s How to Keep It Safe\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.salesforce.com\/ca\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is Your Remote Environment Secure? Here\u2019s How to Keep It Safe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.salesforce.com\/ca\/blog\/#website\",\"url\":\"https:\/\/www.salesforce.com\/ca\/blog\/\",\"name\":\"Salesforce\",\"description\":\"News, tips, and insights from the global cloud leader\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.salesforce.com\/ca\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.salesforce.com\/ca\/blog\/#\/schema\/person\/image\/a0d1621f05db5993c51a8f4f080603a8\",\"name\":\"Jim Alkove\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\/\/www.salesforce.com\/ca\/blog\/#\/schema\/person\/image\/b14fdce9a2172c9a7c821cb819545180\",\"url\":\"https:\/\/www.salesforce.com\/ca\/blog\/wp-content\/uploads\/sites\/12\/2023\/10\/jim-alkove.jpg?w=150&h=150&crop=1\",\"contentUrl\":\"https:\/\/www.salesforce.com\/ca\/blog\/wp-content\/uploads\/sites\/12\/2023\/10\/jim-alkove.jpg?w=150&h=150&crop=1\",\"width\":\"150\",\"height\":\"150\",\"caption\":\"Jim Alkove\"},\"description\":\"As Salesforce\u2019s Chief Trust Officer, Jim Alkove is responsible for enterprise-wide information security and compliance, as well as information management and strategy to deliver the most secure and trusted enterprise cloud. He leads a team with a strategic focus on information security, including engineering, operations, assurance, training and awareness, communications, governance, and M&amp;A integration. He serves as an Advisory Board member of the World Economic Forum Centre for Cybersecurity and as the site lead for Salesforce in the Pacific Northwest. Connect with him on\u00a0LinkedIn. \u00a0\",\"url\":\"https:\/\/www.salesforce.com\/ca\/blog\/author\/jim-alkove\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Keep Your Remote Environment Safe - Salesforce","description":"Many of us are now responsible for keeping work-from-home environments secure. Here are some important steps you can take to protect yourself, your data, and your work.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/","og_locale":"en_US","og_type":"article","og_title":"Is Your Remote Environment Secure? Here\u2019s How to Keep It Safe","og_description":"Many of us are now responsible for keeping work-from-home environments secure. Here are some important steps you can take to protect yourself, your data, and your work.","og_url":"https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/","og_site_name":"Salesforce","article_published_time":"2023-10-18T15:50:07+00:00","article_modified_time":"2023-10-18T17:35:33+00:00","og_image":[{"width":500,"height":281,"url":"https:\/\/www.salesforce.com\/ca\/blog\/wp-content\/uploads\/sites\/12\/2023\/10\/leading-through-change-blue.png","type":"image\/png"}],"author":"Jim Alkove","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jim Alkove","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/#article","isPartOf":{"@id":"https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/"},"author":[{"@id":"https:\/\/www.salesforce.com\/ca\/blog\/#\/schema\/person\/image\/a0d1621f05db5993c51a8f4f080603a8"}],"headline":"Is Your Remote Environment Secure? Here\u2019s How to Keep It Safe","datePublished":"2023-10-18T15:50:07+00:00","dateModified":"2023-10-18T17:35:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/"},"wordCount":1013,"commentCount":0,"image":{"@id":"https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/ca\/blog\/wp-content\/uploads\/sites\/12\/2023\/10\/leading-through-change-blue.png","inLanguage":"en-CA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/","url":"https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/","name":"How to Keep Your Remote Environment Safe - Salesforce","isPartOf":{"@id":"https:\/\/www.salesforce.com\/ca\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/#primaryimage"},"image":{"@id":"https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/ca\/blog\/wp-content\/uploads\/sites\/12\/2023\/10\/leading-through-change-blue.png","datePublished":"2023-10-18T15:50:07+00:00","dateModified":"2023-10-18T17:35:33+00:00","author":{"@id":"https:\/\/www.salesforce.com\/ca\/blog\/#\/schema\/person\/601f410a2801f4ddcf6f00cb182e69d3"},"description":"Many of us are now responsible for keeping work-from-home environments secure. Here are some important steps you can take to protect yourself, your data, and your work.","breadcrumb":{"@id":"https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/"]}]},{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/#primaryimage","url":"https:\/\/www.salesforce.com\/ca\/blog\/wp-content\/uploads\/sites\/12\/2023\/10\/leading-through-change-blue.png","contentUrl":"https:\/\/www.salesforce.com\/ca\/blog\/wp-content\/uploads\/sites\/12\/2023\/10\/leading-through-change-blue.png","width":500,"height":281,"caption":"Is Your Remote Environment Secure? Here\u2019s How to Keep It Safe"},{"@type":"BreadcrumbList","@id":"https:\/\/www.salesforce.com\/ca\/blog\/how-to-secure-remote-work-environment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.salesforce.com\/ca\/blog\/"},{"@type":"ListItem","position":2,"name":"Is Your Remote Environment Secure? Here\u2019s How to Keep It Safe"}]},{"@type":"WebSite","@id":"https:\/\/www.salesforce.com\/ca\/blog\/#website","url":"https:\/\/www.salesforce.com\/ca\/blog\/","name":"Salesforce","description":"News, tips, and insights from the global cloud leader","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.salesforce.com\/ca\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"},{"@type":"Person","@id":"https:\/\/www.salesforce.com\/ca\/blog\/#\/schema\/person\/image\/a0d1621f05db5993c51a8f4f080603a8","name":"Jim Alkove","image":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/www.salesforce.com\/ca\/blog\/#\/schema\/person\/image\/b14fdce9a2172c9a7c821cb819545180","url":"https:\/\/www.salesforce.com\/ca\/blog\/wp-content\/uploads\/sites\/12\/2023\/10\/jim-alkove.jpg?w=150&h=150&crop=1","contentUrl":"https:\/\/www.salesforce.com\/ca\/blog\/wp-content\/uploads\/sites\/12\/2023\/10\/jim-alkove.jpg?w=150&h=150&crop=1","width":"150","height":"150","caption":"Jim Alkove"},"description":"As Salesforce\u2019s Chief Trust Officer, Jim Alkove is responsible for enterprise-wide information security and compliance, as well as information management and strategy to deliver the most secure and trusted enterprise cloud. He leads a team with a strategic focus on information security, including engineering, operations, assurance, training and awareness, communications, governance, and M&amp;A integration. He serves as an Advisory Board member of the World Economic Forum Centre for Cybersecurity and as the site lead for Salesforce in the Pacific Northwest. Connect with him on\u00a0LinkedIn. \u00a0","url":"https:\/\/www.salesforce.com\/ca\/blog\/author\/jim-alkove\/"}]}},"jetpack_featured_media_url":"https:\/\/www.salesforce.com\/ca\/blog\/wp-content\/uploads\/sites\/12\/2023\/10\/leading-through-change-blue.png","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Salesforce","distributor_original_site_url":"https:\/\/www.salesforce.com\/ca\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.salesforce.com\/ca\/blog\/wp-json\/wp\/v2\/posts\/1304","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.salesforce.com\/ca\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.salesforce.com\/ca\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/ca\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/ca\/blog\/wp-json\/wp\/v2\/comments?post=1304"}],"version-history":[{"count":2,"href":"https:\/\/www.salesforce.com\/ca\/blog\/wp-json\/wp\/v2\/posts\/1304\/revisions"}],"predecessor-version":[{"id":5898,"href":"https:\/\/www.salesforce.com\/ca\/blog\/wp-json\/wp\/v2\/posts\/1304\/revisions\/5898"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/ca\/blog\/wp-json\/wp\/v2\/media\/1268"}],"wp:attachment":[{"href":"https:\/\/www.salesforce.com\/ca\/blog\/wp-json\/wp\/v2\/media?parent=1304"}],"wp:term":[{"taxonomy":"sf_topic","embeddable":true,"href":"https:\/\/www.salesforce.com\/ca\/blog\/wp-json\/wp\/v2\/sf_topic?post=1304"},{"taxonomy":"sf_content_type","embeddable":true,"href":"https:\/\/www.salesforce.com\/ca\/blog\/wp-json\/wp\/v2\/sf_content_type?post=1304"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.salesforce.com\/ca\/blog\/wp-json\/wp\/v2\/coauthors?post=1304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}