University employees may have the need to access the University’s information systems from computing devices and locations other than their regular workspace or outside the University’s network. Remote access puts systems at higher risk of attacks and unauthorized access, which represents a higher risk to the confidentiality, integrity, and availability of University information. Additional precautions should be taken by employees when working remotely.
If you access University information systems remotely, the Office of Information Security (OIS) encourages you to consider the following:
- Keep systems up to date by enabling automatic updates in the operating system and applications.
- Use anti-virus software and configure it to automatically update.
- Protect passwords and consider using a password manager.
- Don’t share passwords used to access University information and systems.
- Don’t use the “remember my password” feature when accessing University information.
- Use UW devices and systems when working with UW information whenever possible.
- If you can avoid it, don’t store University information on non-UW devices.
- Delete sensitive UW information that is accidentally downloaded onto personal devices.
- Delete locally saved files on public or shared computers.
- Lock the screen when away from the computer to prevent unauthorized access.
- Keep others from viewing the screen on devices when accessing University information.
- Physically protect devices from theft or inappropriate access.
- Use anti-virus software to scan portable storage devices, e.g., thumb or external hard drives that contain University information.
- Use encryption whenever possible when storing University information on portable devices, such as laptops.
- Connect to UW desktops via remote desktop connections from personally owned computers.
- Use eduroam to connect to WiFi on the UW campus and from participating campuses and institutions around the world.
- All faculty, staff, and students can use the Husky OnNet VPN Service for connecting to the UW network from remote locations.
- You should not consider your online activity to be private when using public or shared Wi-Fi or computers.
- If a device containing University information is lost, stolen, or compromised report the incident to the appropriate delegated authority.
This list is not exhaustive. Other information security settings may apply to the particular operating system, information system, network, or device you are using.
Working Remotely online training
Working Remotely infographic
Mobile Devices online training
Emotet Malware online training
More tips about working remotely:
National Security Agency: Best Practices for Securing Your Home Network
For additional information, consult your department IT support person or email@example.com.