Skip to Content

Division of Information Technology

Security Guidance for Remote Working

This page describes the different security resources available to USC faculty and staff members working remotely.

How do I stay secure while working away from USC?

Handling and Processing Data

  • Data security and privacy requirements are still in effect, regardless of where data is located. Ensure that whatever device you are working from meets security requirements applicable to the types of data you are working with. For more information about these requirements please refer to the following USC information security website.

  • Do not store confidential university data on any personal device (e.g. files that may contain SSNs, backing info, health records). If you do not have a university device for accessing confidential data, leverage the university’s virtual desktops or maintain the data’s secured location (example: university’s server or desktop).

Secure Access

  • Access to Internal Resources - A user can securely connect to the university network to access internal resources by leveraging the university’s VPN (Cisco AnyConnect).  This solution can be used to access systems and network drives that are from the university network.

  • Collaboration Tools - Cloud-based collaboration tools, such as Microsoft Teams and Office365, can be used to work with other individuals in a secure manner.  Microsoft Teams can be used to communicate, host web-based meetings and share files between groups of authorized individuals.  Office365, when accessed directly through the internet or a web browser, can be used to work on documents that are saved to your Microsoft OneDrive and SharePoint.  Remember to not save confidential university data to personally owned devices.  These cloud-based solutions, unlike personally owned devices are protected with additional security controls and legal agreements.

    We are aware that many instructors are using Zoom. Be aware that many security issues have been reported with Zoom, which is not supported by the university at this time. If you choose to use Zoom, please follow these guidelines.

  • Virtual DesktopVirtual desktops can be requested and remotely accessed in a secure manner.  These desktops provide similar functionality to a university device, except that they are available through the internet and can be accessed from different devices.  Virtual desktops provide an alternative secure connection to internal resources, without requiring a university device or VPN access. 

Be Mindful of Threats and Risks

  • PhishingBe mindful of fraudulent communication attempts such as phishing emails. Bad actors will leverage current events, panic and disasters to target individuals with highly tailored and specific communication.  They will also leverage the situation to create false urgency, in the hopes of tricking their targets into rushing so that they lower their guard or even skip important validating steps before complying with whatever the bad actor requested.

  • Web SurfingBe mindful of the websites you visit. While most of the university’s security controls are still engaged and updated on university owned and managed devices, network-based security controls (example: Cisco Umbrella) will be limited when you are remote and not using the USC VPN.  Ensuring the university’s Cisco Umbrella Roaming Client is installed on your university owned and managed device will help to protect your system even when you are off the network.  This client provides protections from malware, fraudulent websites, new domains, and communications with compromised systems.  Of course, nothing beats being cautious of the websites you visit and the applications you install on your devices.

  • Public WIFIAvoid connecting to other untrusted networks or public wireless access points.  These networks can be compromised or used by hackers to monitor and access your internet traffic (email, websites access, credentials used, payment information sent).

  • Sharing DevicesUniversity devices should only be accessed and used by authorized USC faculty, staff or students. Avoid letting family or other individuals use your university device.  Lock your system or turn it off when you need to step away to prevent access from other individuals, such as children or other family members.


Quick Links

Keep Teaching
Keep Working


Additional Resouces

Privacy, Security and Practical Tips Working Remotely
Creating a Cyber Secure Home.  
Top 5 Steps to Securely Work from Home  
Security Tips for Remote Workers
Vigilance Against Coronavirus Scams 
COVID-19 Security Resource Library.   
Security Measures for Zoom


Challenge the conventional. Create the exceptional. No Limits.