Cybersecurity considerations both for businesses and employees while working from home

Apr 2, 2020

2 min

William "Bill" Rials

William “Bill” Rials, an expert and associate director in the Tulane University School of Professional Advancement Information Technology Program, is available to speak about cybersecurity tips for both businesses and their employees as the majority of the nation’s workforce is now working from home. For interviews, contact pr@tulane.edu or Roger Dunaway at 504-542-2906. 



People working remotely or from home/other during the health emergency should be aware of cybersecurity, as no one wants to add a cyber breach to the current health concerns. Here are tips to help people work from home in a more cyber-safe manner:

  • If possible, keep a work device separate from a personal device/computer.
  • For personal devices, be sure to run endpoint protection (anti-virus).
  • For personal devices, ensure the device is updated (OS updates, Office software updates
  • HIPPA/FERPA etc. regulations remain in effect even when working from home. Be careful when printing sensitive material, and risk of over-the-shoulder leaks.
  • Router/Access Point should require embedded software updates and strong passwords to prevent hackers crawling the net looking to brute force attack routers.
  • Zoom crashing – with publicly posted zoom URLs, uninvited folks join for malicious/eavesdropping/criminal/IP stealing reasons – be sure you know how to kick folks out of your Zoom session as the leader. A solution would be to add a password to Zoom meetings, monitor who has joined and ask for unknowns. Kick out those who are not known to be invited.


Here are tips for businesses to operate effectively during the pandemic and help their employees avoid malware and phishing attacks:

  • Cybersecurity measures should be smooth and painless for employees as poorly implemented burdensome solutions drive employees to circumvent needed measures.
  • Businesses should have a remote work policy for all employees. If possible, provide secure devices with VPN software installed.
  • Require VPN connections to access the corporate network. It is highly recommended to have multi-factor authentication for a virtual private network.
  • Use cloud data storage instead of having employees save files to their personal offsite hard drives.
  • Require any device that connects to company server have a minimum level of security, and in-lifecycle operating systems.
Connect with:
William "Bill" Rials

William "Bill" Rials

Associate Director, Professor of Practice, Information Technology

Bill is a nationally recognized subject matter expert on information technology.

You might also like...

Check out some other posts from Tulane University

1 min

Expert: Historic password breach creates public urgency for better password protection

Cybercriminals recently executed a significant breach, stealing the world’s most extensive collection of passwords. These stolen credentials, a staggering 10 billion unique passwords, have been uploaded to the notorious RockYou2024 database, a hub for cybercriminal activity. Tulane University cybersecurity expert Demetrice Rogers says the stolen passwords are a significant vulnerability for most users and underscore the need for strong password management. With malicious actors now armed with an extensive database of nearly 10 billion unique passwords, the risk of successful hacks on unsuspecting users is significantly higher. "The massive growth of the RockYou2024 password list shows just how tough it’s getting to keep our accounts safe. Hackers will love this list, making it a go-to tool for breaking into accounts. We need strong, unique passwords and multi-factor authentication to stay one step ahead. Think of it like locking your doors and setting the alarm—essential steps to keep the cybercriminals out." Rogers can cover: • How users can check to see if their information and passwords are included in the leak. • The importance of creating strong, unique passwords for each account and using reputable password managers to generate and store them securely. (Many users use the same password across multiple websites, making an attacker’s job much easier.) • Why adopting multi-factor authentication is increasingly important to ensure account security.

2 min

Are soaring home insurance rates in Gulf Coast states coming for the rest of the country?

The Gulf Coast faces an expected active 'above-normal' hurricane season, with many insurance carriers withdrawing from the market. Homeowners are left with skyrocketing rates and dwindling coverage options. Louisiana bore the brunt with four major hurricanes in 2020 and 2021, causing $75 billion in combined damage. The state passed a series of insurance reforms to attract more insurance companies, following in the footsteps of Florida. Insurance woes for homeowners aren’t just a coastal issue. Homeowners in the Midwest are struggling with insurance carriers because of damage from the record amount of tornadoes. Wildfires in the US are also a growing threat to insurance carriers, accounting for an annual total cost between $394 billion and $893 billion. Christopher Otten, an insurance and legal expert at Tulane University’s A. B. Freeman School of Business, is available to speak about the impact of new hurricane insurance regulations in several states, the challenges of holding insurance carriers accountable from state to state and the difficulties property owners face in finding hurricane insurance. Christopher can also discuss: • Why insurance markets differ among the states in the Gulf Coast region. • The Fortified Roof incentive programs • Affordability and the need for more carriers to improve competition and pricing risk. Christopher Otten Quote: “The Gulf States are the canaries in the coal mine right now for insurance markets,” Otten said. “It’s probably going to get worse before it gets better. A quiet hurricane season, as unlikely as that is, will help things some – but that doesn’t mean rates will not go up or down. They may increase less than they otherwise would have. With these new laws, particularly in Louisiana, it will take a hurricane for us to know how the new regulations are shaping out.” Contact Roger Dunaway, assistant director of media relations, for interviews at roger@tulane.edu.

2 min

Vulnerability exposed: Car dealerships grapple with fallout from cybersecurity attacks

Nearly 15,000 car dealerships across North America are still struggling to operate after a massive cyberattack has crippled their software systems. As more vehicles become connected to the Internet and reliant on digital systems, cyberattacks pose a serious risk to businesses and consumers. Tulane University cybersecurity expert Demetrice Rogers is available to discuss the next steps in auto industry recovery efforts and what other industries can learn from the incident to avoid repeat attacks. Professor Rogers can speak about: 1. The implications for data security and privacy and the possible compromise of sensitive customer data, including personal information and financial details. 2. Specific cybersecurity weaknesses within the automotive industry that made these car dealerships targets for the cyberattack. 3. Offer insights into effective cybersecurity measures and best practices that car dealerships can implement to strengthen their defenses against future cyber threats. Quote from Demetrice Rogers: “The preliminary reports indicate that the attack on CDK Global was a ransomware incident. Their systems will essentially be held hostage until specific demands, likely monetary, are fulfilled. Initial reports indicate CDK plans to pay the ransom, which could be tens of millions of dollars, to the attackers. I would expect systems to slowly come back online, with some data and processes unavailable until they have fully recovered.” “This situation highlights the critical need for an effective backup and disaster recovery program. Organizations should routinely test their recovery capabilities to ensure preparedness for such incidents. Additionally, it is generally recommended not to comply with hackers' demands or pay the ransom. While it is true that some companies opt to pay (though this is rarely publicized), it is usually more prudent to activate a well-prepared disaster recovery plan.” Contact Roger Dunaway, assistant director of media relations, for interviews at roger@tulane.edu.

View all posts