Saturday, April 4 2026

Tag: Infosecurity

Episode 5: Protecting Your Home Office From Your Smart Home

Freelancer's Guide to Cybersecurity
Freelancer's Guide to Cybersecurity
Episode 5: Protecting Your Home Office From Your Smart Home
Loading
/

The FBI has described the surge in IoT devices as giving bad actors—the formal term for hackers—“a virtual drive-by of your digital life.” These devices are vulnerable to bad actors and open all devices in the home to hacking. If you work from home, you need to protect your home office from your smart home.

Episode 6: Are Your Consultants & Employees Broadcasting Your Company Secrets From Their Home Offices?

Freelancer's Guide to Cybersecurity
Freelancer's Guide to Cybersecurity
Episode 6: Are Your Consultants & Employees Broadcasting Your Company Secrets From Their Home Offices?
Loading
/

On today’s podcast, we address the question: Are your consultants and employees broadcasting your company secrets from their home offices? Are your contractors, consultants, and employees adequately protecting your sensitive information and intellectual property when they work from home? As we have reported before, smart home devices with speakers—for example, Siri, Alexa, Amazon Echo, Google

Secure sensitive data with encryption

How to Protect Sensitive Files: A Guide to Passwords & Encryption

Do you work with sensitive client data? Have you signed an NDA requiring you to secure clients’ information? Here’s how to properly secure your computer and safeguard the intellectual property entrusted to you.