Work From Home Self-Check

This survey asks you a few questions about your work from home systems to help you identify security concerns and provide recommendations for ways you can improve your protection. 

Survey

1

Internet Access

I have sufficient Internet bandwidth at home to work effectively from my home network and don't need to use public or neighbor's wi-fi to work. 

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
2

Two-Factor Authentication

I use Two-Factor Authentication (2FA) for my most sensitive online accounts.

?

Multi-factor authentication is a method of computer access control where a user enters several separate pieces of evidence confirming their identity during an authentication process. The term "two-factor authentication" or "2FA" is widely used. Two-factor authentication uses a combination of two different components. Example: Username/password in addition to entering a numerical pin sent via a text message to a mobile phone.

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
3

Device Login

I am the only person who uses the device(s) I use for work. If I do share a device with another person(s) in my household, we have separate logins for the device and I always log off before leaving my device for the other person(s).

?

Sharing a single device between multiple persons can lead to security issues if information is not appropriately secured by a unique logon for each user of the device. 

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
4

Software Updates

I keep my operating system and applications up-to-date on both my computer(s) and mobile device(s).

?

For example, I keep my Mac OS, Windows, iOS and/or Android operating systems up-to-date on all my devices. I also update software and apps such as Microsoft Office, Adobe Reader and Zoom regularly to keep them current. 

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
5

Antivirus Software

I have antivirus software on my computer and scan regularly for malware. 

?

Antivirus software, which is also referred to as malware and/or endpoint protection, is software that protects your computer from malicious attacks from sources such as viruses, malware, computer worms, and spyware. 

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
6

Backup

I am confident that my important information would not be lost if I suffered a hard drive failure or other data loss because I back up information that is important to me.

?

For example, I use Time Machine, Carbonite, BackBlaze or other services to backup my data and I test periodically to ensure I can restore files from the backup. 

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
7

Default Passwords

Have you changed the default password on your home network devices, such as routers, wireless access points, Smart TVs and security cameras?

?

Many devices some with published and/or easy to guess passwords such as "admin" or "1234". Leaving these unchanged can open your home network to breach. 

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
8

Password Manager

I use a password manager to store and manage my passwords.

?

Examples of password managers include LastPass, 1Password and DashLane. Using a password manager, I can easily store and access my passwords and ensure that I can use unique, strong passwords.

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
9

Social Engineering

I am knowledgable about social engineering

?

I have a basic understanding of how social engineering works.

I review emails carefully before clicking links or opening attachments and verify before clicking or opening if I have any doubts as to authenticity of the message. 

If I get phone calls or visitors claiming to require personal information from me (like my credit card or social security number) or asking me to give access to my computer or smart phone, I treat these with skepticism and know how to verify before complying with these kinds of requests. 

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
10

Covering Your Webcam

I have considered whether to cover my webcam(s) when not using them for video conferencing, recording, or other activities. 

?

Webcams (whether separate devices or built-in to notebook computers) can often be compromised and used to capture private or otherwise sensitive video and audio information. 

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
11

Credit Freeze

I have reviewed information about putting a "freeze" in place for my credit report at the four credit bureaus. 

?

Putting a credit freeze in place is recommended as an effective means of preventing identity theft. If you are not planning to apply for credit in the foreseeable future (e.g. credit cards, auto loan, mortgage, etc.) then you may wish to put in place a credit freeze with the four bureaus (Experian, Equifax, Transunion and Innovis)

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
12

Secure Communication

I have reviewed my communications and take appropriate precautions to ensure privacy when engaged in communications that are sensitive and require security. 

?

For example, I have installed Signal on my smartphone and use Signal for chat or voice communications that are sensitive and require privacy. I know how to encrypt emails that contain sensitive information.

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
13

Review Habits

Do you periodically review your personal cybersecurity habits? 

?

For example, do you take time once a year to review your online accounts, passwords, and security practices to determine whether or not you need to make changes?

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree

Contact Information

* Answer required