{"id":1611,"date":"2020-03-27T10:21:12","date_gmt":"2020-03-27T09:21:12","guid":{"rendered":"http:\/\/65.108.60.219\/?p=1611"},"modified":"2020-04-01T12:57:43","modified_gmt":"2020-04-01T10:57:43","slug":"safe-remote-work","status":"publish","type":"post","link":"https:\/\/cyberforces.com\/en\/safe-remote-work","title":{"rendered":"Gearing up for safe remote work"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Given the current COVID-19 pandemic, many people are considering working from home. Some of them will probably take home a business laptop, which has been prepared by the IT Department. From a cybersecurity standpoint, this is the best option: the employee takes home a ready-to-use device, with all software pre-configured and a VPN client to connect to the business environment. In such a situation, all security measures are already taken care of by the employer, and all the employee has to do, is to plug the machine into a home network and get online.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The other option is to utilize a personal computer in order to work remotely. As much as it seems quite easy to get up and running \u2013 as it\u2019s only a VPN connection away \u2013 it\u2019s a good idea to get yourself properly set up before your computer ends up being the one which infects others at the office.<\/span><\/p>\n<h2><b>The basics<\/b><\/h2>\n<p><b>Always try to separate business and private environments.<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The best way to achieve this, of course, is by using a separate computer for business and private use.\u00a0<\/span><\/p>\n<h3><b>Separate devices support privacy<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">First, utilizing such setup will save you from various privacy-oriented mishaps, such as accidentally attaching a personal document to an email, having private messages show up in the middle of a presentation, or your browser history popping up at the least fortunate time \u2013 such as during a webinar. Even if you remove your browsing history, the <\/span><i><span style=\"font-weight: 400;\">autocomplete<\/span><\/i><span style=\"font-weight: 400;\"> as well as <\/span><i><span style=\"font-weight: 400;\">Open Recent Documents<\/span><\/i><span style=\"font-weight: 400;\"> functions show up in various programs and can be quite revealing. Operating systems are designed to be automated and ergonomic, so a list of recently opened pictures or contents showing up at the most unexpected moment \u2013 in theory, to make your life easier \u2013 can expose a lot of private information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Second, keeping private software off company records is in your best interest. A typical home computer is littered with various software downloaded from numerous sources all over the Internet. Some software may be legitimate. Other software, however, may appear to be functional, however, in the background it may contain a malicious function \u2013 such as keylogging, taking screenshots or allowing remote control. In fact, this is a common way for hackers to spread malware.<\/span><span style=\"font-weight: 400;\"> When typing a corporate password on a personal computer, unknowingly, you may be transferring this password to cybercriminals. Moreover, ransomware, which has wreaked havoc in government and in business sectors, can stay dormant until it detects a certain environment \u2013 such as a Windows Server machine. In the meantime, ransomware can quietly stay on your computer, slowly encrypting files, or waiting for a good moment to reproduce.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Last, but not least, there\u2019s the software licensing issue. While installing software (or even turning on the computer for the first time), the user is presented with lengthy software license agreements (often abbreviated <\/span><i><span style=\"font-weight: 400;\">EULA<\/span><\/i><span style=\"font-weight: 400;\">) for nearly all pieces of software. Most users have probably never read the agreement \u2013 and that\u2019s the problem. A sizable amount of free-to-use software is only free for personal or educational use. Utilizing the same software for business often constitutes a break of the license agreement and can have various repercussions: from legal action by the vendor to having the license suspended. This brings us to the second point:<\/span><\/p>\n<p><b>Don\u2019t cut corners. Invest in legitimate software.<\/b><\/p>\n<p><span style=\"font-weight: 400;\">There are countless sites out there that host copies of pirated business software \u2013 such as Microsoft Office. Moreover, they usually have a license key attached, ready to be activated. Given that a fresh copy of Microsoft Office can cost a few hundred USD, this may seem like a great way to save money.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Not necessarily so. When downloading software from unverified channels, the user has absolutely no guarantee of what the software really contains. The file user thinks is Microsoft Office may flat-out be a virus. Even if the file is indeed a Microsoft Office installer, there\u2019s no guarantee what other types of code the installer is laced with. The user might end up with a working version of the said Office suite, plus a few pieces of malware to go along with that.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Utilizing online-found license keys for paid software is also not a good idea. As most paid software today is activated online, it\u2019s apparent to the vendor who is legitimately activating their product. During the activation, the computer contacts the vendor\u2019s servers send a copy of the license key used to activate the software, as well as additional supporting information. This supporting information can be your environment information (such as operating system version), user information (entered during the setup process or during Windows installation process) and your IP address, which can be used to track down your location. In the best-case scenario, if the vendor is suspicious, they might not activate the product. In the worst-case scenario, the vendor can take legal action against the user for alleged software piracy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Then there are the updates. Most software, when not properly registered and activated, loses the ability to download updates, which in many occasions defeats the point of having such software to begin with. A great example of this is antivirus software, which relies on daily updates of virus definition files. As the definition file lets the software know how to define a virus and what to look for, having an outdated definition file renders the software nearly useless.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Of course, there is a legal way around this situation: utilizing open-source software. As open-source software is free to use in a personal and business environment, it\u2019s worth taking a look at open-source alternatives to common commercial programs. <\/span><a href=\"https:\/\/ben.balter.com\/open-source-alternatives\/\"><span style=\"font-weight: 400;\">This list<\/span><\/a><span style=\"font-weight: 400;\"> provides a good starting point.<\/span><\/p>\n<h2><b>Building up your security<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Since most computers sold around the world are pre-loaded with one of the versions of Windows 10 (Home, Education, Pro or Enterprise), let\u2019s focus on Windows 10 basic <\/span><i><span style=\"font-weight: 400;\">security hardening<\/span><\/i><span style=\"font-weight: 400;\"> and good practices for safe Internet usage.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you\u2019re already set up with a computer and legitimate, functioning software, here are some steps to make your remote work more secure:<\/span><\/p>\n<h3><b>Regularly update your software to the latest version<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">If your software has an auto-update function, enable it. If your software requires manual updates (such as drivers), periodically check in on the vendor website for possible updates. Keep in mind that software updates do not necessarily bring in new features, and in fact, sometimes visually, absolutely nothing will change. However, updates often address performance and security issues, which are strictly under the hood.<\/span><\/p>\n<h3><b>Create a separate, underprivileged account for everyday use<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Upon installing, Windows 10 automatically creates a user for the computer. By default, this user can install software and change certain security settings. In theory, this is a good idea, as the user can customize and install software to his desire. However, from a security standpoint, it\u2019s always best to utilize the <\/span><i><span style=\"font-weight: 400;\">least privilege principle<\/span><\/i><span style=\"font-weight: 400;\">: if you don\u2019t need to use the computer as the Administrator, run as the least-privileged user account. By utilizing an underprivileged user account for everyday use you guard your computer against accidentally installing software that might pop up on your screen.<\/span><\/p>\n<h3><b>Always use two-factor authentication, whenever available<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">With time, software vendors and service providers realized that password protection is not a sufficient method of protecting data. Computers can be hacked, they may contain malware and can be physically stolen. A password entered on a compromised computer offers virtually no data protection. As such, the industry has been moving to utilize two ways to authenticate a user. Most commonly, it\u2019s done with the help of a second device, such a smartphone. The idea is simple: it\u2019s much more difficult to steal or hack into two separate machines at once, so a confirmation of a login \u2013 such as by receiving a text message with a unique code to type in \u2013 offers a much improved way of verifying the true identity of a user.<\/span><\/p>\n<h3><b>Conduct an audit of your installed software and turn off unnecessary services<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Just like smartphone manufacturers, computer hardware manufacturers sometimes pre-load their computers with a certain trial or freeware programs. It\u2019s a good idea to verify what each piece of software does, what\u2019s its function and whether or not it sends any data to the Internet (such as a cloud backup service). Additionally, turning off certain services, such as <\/span><i><span style=\"font-weight: 400;\">Remote Desktop<\/span><\/i><span style=\"font-weight: 400;\">, if not used, is advisable.<\/span><\/p>\n<h3><b>If you\u2019re working on a laptop, encrypt your hard drive<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The unfortunate thing about mobile systems is the fact, that they can be easily stolen. This is why in Windows 10, Microsoft introduced hard drive encryption into every version of the operating system. Windows 10 Pro, Education and Enterprise can utilize BitLocker. Users with Windows 10 Home can utilize the Device Encryption utility, as long as their hardware meets <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4502379\/windows-10-device-encryption\"><span style=\"font-weight: 400;\">Microsoft\u2019s guidelines<\/span><\/a><span style=\"font-weight: 400;\">. Step-by-step instructions can be found <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4028713\/windows-10-turn-on-device-encryption\"><span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h2><b>To sum up<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Windows 10 is a significant step-up in terms of Windows operating systems security. In comparison to some of the previous versions, it comes with a built-in firewall, antivirus program, and hard drive encryption features, which used to be added manually in previous versions. Out of the box, it\u2019s a fairly safe system, and as long as we utilize best practice security advice, it can be safely used to work remotely. Regardless of its relative security, however, it\u2019s best practice to keep the business and private environments as separate as they possibly can be, and that would be my number one advice to anyone considering working remotely.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Given the current COVID-19 pandemic, many people are considering working from home. Some of them will probably take home a business laptop, which has been prepared by the IT Department. From a cybersecurity standpoint, this is the best option: the employee takes home a ready-to-use device, with all software pre-configured and a VPN client to [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":1613,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[29,37],"tags":[],"class_list":["post-1611","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-guide"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Gearing up for safe remote work - all you need to know - CyberForces<\/title>\n<meta name=\"description\" content=\"We&#039;ve prepared for you a couple of advice on how to keep your cybersecurity and privacy while working at home (especially on your own devices).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberforces.com\/en\/safe-remote-work\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gearing up for safe remote work - all you need to know - CyberForces\" \/>\n<meta property=\"og:description\" content=\"We&#039;ve prepared for you a couple of advice on how to keep your cybersecurity and privacy while working at home (especially on your own devices).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberforces.com\/en\/safe-remote-work\" \/>\n<meta property=\"og:site_name\" content=\"CyberForces\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TestArmyCyberForces\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-27T09:21:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-04-01T10:57:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberforces.com\/wp-content\/uploads\/remote-work.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Pawe\u0142 Wa\u0142uszko\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pawe\u0142 Wa\u0142uszko\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cyberforces.com\/en\/safe-remote-work#article\",\"isPartOf\":{\"@id\":\"https:\/\/cyberforces.com\/en\/safe-remote-work\"},\"author\":{\"name\":\"Pawe\u0142 Wa\u0142uszko\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/person\/12153b64ec1142a80a25bcc96b281a8e\"},\"headline\":\"Gearing up for safe remote work\",\"datePublished\":\"2020-03-27T09:21:12+00:00\",\"dateModified\":\"2020-04-01T10:57:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cyberforces.com\/en\/safe-remote-work\"},\"wordCount\":1584,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cyberforces.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/en\/safe-remote-work#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/remote-work.png?wsr\",\"articleSection\":[\"Security\",\"Guide\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cyberforces.com\/en\/safe-remote-work#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberforces.com\/en\/safe-remote-work\",\"url\":\"https:\/\/cyberforces.com\/en\/safe-remote-work\",\"name\":\"Gearing up for safe remote work - all you need to know - CyberForces\",\"isPartOf\":{\"@id\":\"https:\/\/cyberforces.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyberforces.com\/en\/safe-remote-work#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/en\/safe-remote-work#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/remote-work.png?wsr\",\"datePublished\":\"2020-03-27T09:21:12+00:00\",\"dateModified\":\"2020-04-01T10:57:43+00:00\",\"description\":\"We've prepared for you a couple of advice on how to keep your cybersecurity and privacy while working at home (especially on your own devices).\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberforces.com\/en\/safe-remote-work#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberforces.com\/en\/safe-remote-work\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberforces.com\/en\/safe-remote-work#primaryimage\",\"url\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/remote-work.png?wsr\",\"contentUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/remote-work.png?wsr\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberforces.com\/en\/safe-remote-work#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/cyberforces.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gearing up for safe remote work\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberforces.com\/#website\",\"url\":\"https:\/\/cyberforces.com\/\",\"name\":\"CyberForces\",\"description\":\"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!\",\"publisher\":{\"@id\":\"https:\/\/cyberforces.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberforces.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyberforces.com\/#organization\",\"name\":\"TestArmy Group S. A.\",\"url\":\"https:\/\/cyberforces.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png\",\"contentUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png\",\"width\":1210,\"height\":173,\"caption\":\"TestArmy Group S. A.\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TestArmyCyberForces\/\",\"https:\/\/www.linkedin.com\/company\/cyberforcescom\/\",\"https:\/\/www.instagram.com\/cyberforces__\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/person\/12153b64ec1142a80a25bcc96b281a8e\",\"name\":\"Pawe\u0142 Wa\u0142uszko\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/06\/Pawel_Waluszko-7-2-100x100.png?wsr\",\"url\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/06\/Pawel_Waluszko-7-2-100x100.png?wsr\",\"contentUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/06\/Pawel_Waluszko-7-2-100x100.png?wsr\",\"caption\":\"Pawe\u0142 Wa\u0142uszko\"},\"description\":\"Business Development Manager i Ekspert ds. Bezpiecze\u0144stwa. Do\u015bwiadczony mened\u017cer w bran\u017cy IT, kt\u00f3ry swoje do\u015bwiadczenie zdobywa\u0142 m.in. w Dolinie Krzemowej; entuzjasta oprogramowania open - source.\",\"url\":\"https:\/\/cyberforces.com\/en\/author\/pwaluszko\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gearing up for safe remote work - all you need to know - CyberForces","description":"We've prepared for you a couple of advice on how to keep your cybersecurity and privacy while working at home (especially on your own devices).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberforces.com\/en\/safe-remote-work","og_locale":"en_US","og_type":"article","og_title":"Gearing up for safe remote work - all you need to know - CyberForces","og_description":"We've prepared for you a couple of advice on how to keep your cybersecurity and privacy while working at home (especially on your own devices).","og_url":"https:\/\/cyberforces.com\/en\/safe-remote-work","og_site_name":"CyberForces","article_publisher":"https:\/\/www.facebook.com\/TestArmyCyberForces\/","article_published_time":"2020-03-27T09:21:12+00:00","article_modified_time":"2020-04-01T10:57:43+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/cyberforces.com\/wp-content\/uploads\/remote-work.png","type":"image\/png"}],"author":"Pawe\u0142 Wa\u0142uszko","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Pawe\u0142 Wa\u0142uszko","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cyberforces.com\/en\/safe-remote-work#article","isPartOf":{"@id":"https:\/\/cyberforces.com\/en\/safe-remote-work"},"author":{"name":"Pawe\u0142 Wa\u0142uszko","@id":"https:\/\/cyberforces.com\/#\/schema\/person\/12153b64ec1142a80a25bcc96b281a8e"},"headline":"Gearing up for safe remote work","datePublished":"2020-03-27T09:21:12+00:00","dateModified":"2020-04-01T10:57:43+00:00","mainEntityOfPage":{"@id":"https:\/\/cyberforces.com\/en\/safe-remote-work"},"wordCount":1584,"commentCount":0,"publisher":{"@id":"https:\/\/cyberforces.com\/#organization"},"image":{"@id":"https:\/\/cyberforces.com\/en\/safe-remote-work#primaryimage"},"thumbnailUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/remote-work.png?wsr","articleSection":["Security","Guide"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cyberforces.com\/en\/safe-remote-work#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cyberforces.com\/en\/safe-remote-work","url":"https:\/\/cyberforces.com\/en\/safe-remote-work","name":"Gearing up for safe remote work - all you need to know - CyberForces","isPartOf":{"@id":"https:\/\/cyberforces.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberforces.com\/en\/safe-remote-work#primaryimage"},"image":{"@id":"https:\/\/cyberforces.com\/en\/safe-remote-work#primaryimage"},"thumbnailUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/remote-work.png?wsr","datePublished":"2020-03-27T09:21:12+00:00","dateModified":"2020-04-01T10:57:43+00:00","description":"We've prepared for you a couple of advice on how to keep your cybersecurity and privacy while working at home (especially on your own devices).","breadcrumb":{"@id":"https:\/\/cyberforces.com\/en\/safe-remote-work#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberforces.com\/en\/safe-remote-work"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/en\/safe-remote-work#primaryimage","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/remote-work.png?wsr","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/remote-work.png?wsr","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/cyberforces.com\/en\/safe-remote-work#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/cyberforces.com\/"},{"@type":"ListItem","position":2,"name":"Gearing up for safe remote work"}]},{"@type":"WebSite","@id":"https:\/\/cyberforces.com\/#website","url":"https:\/\/cyberforces.com\/","name":"CyberForces","description":"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!","publisher":{"@id":"https:\/\/cyberforces.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberforces.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberforces.com\/#organization","name":"TestArmy Group S. A.","url":"https:\/\/cyberforces.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","width":1210,"height":173,"caption":"TestArmy Group S. A."},"image":{"@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TestArmyCyberForces\/","https:\/\/www.linkedin.com\/company\/cyberforcescom\/","https:\/\/www.instagram.com\/cyberforces__"]},{"@type":"Person","@id":"https:\/\/cyberforces.com\/#\/schema\/person\/12153b64ec1142a80a25bcc96b281a8e","name":"Pawe\u0142 Wa\u0142uszko","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/06\/Pawel_Waluszko-7-2-100x100.png?wsr","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/06\/Pawel_Waluszko-7-2-100x100.png?wsr","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/06\/Pawel_Waluszko-7-2-100x100.png?wsr","caption":"Pawe\u0142 Wa\u0142uszko"},"description":"Business Development Manager i Ekspert ds. Bezpiecze\u0144stwa. Do\u015bwiadczony mened\u017cer w bran\u017cy IT, kt\u00f3ry swoje do\u015bwiadczenie zdobywa\u0142 m.in. w Dolinie Krzemowej; entuzjasta oprogramowania open - source.","url":"https:\/\/cyberforces.com\/en\/author\/pwaluszko"}]}},"_links":{"self":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/1611","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/comments?post=1611"}],"version-history":[{"count":3,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/1611\/revisions"}],"predecessor-version":[{"id":1616,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/1611\/revisions\/1616"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/media\/1613"}],"wp:attachment":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/media?parent=1611"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/categories?post=1611"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/tags?post=1611"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}