As a community, as news organizations, and as individual journalists, we are experiencing sweeping changes in how our workplaces are organized, with a mind to public health, and shifting economics in newsrooms. Remote work is a necessary part of the strategy. As newsrooms consider how to support remote work, we need to also think through our plan to work securely beyond the corporate firewall.
Most news organizations already have some policies in place for handling sensitive data, or accessing compartmentalized newsroom resources remotely. But often, much shared infrastructure is lacking. It’s time to make some changes.
At Freedom of the Press Foundation we have some thoughts about practical ways to work together securely as a distributed team, but we also want to learn from, and call attention to the community’s wisdom. Send us a message on Twitter at @FreedomofPress or contact us here to let us know what practices your newsroom has adopted to enable remote work securely. We may ask if we can expand this article with your tips.
In our ideal world this would include some shared infrastructure, and some basic training for all newsroom employees to use the following…
- Virtual private networks (VPNs). A VPN is a great way to securely tunnel your computer’s internet traffic through a remote location. Many newsrooms have internal newsroom resources only accessible within their building, and will use VPNs to allow workers to connect remotely. If your newsroom has resources only accessible through a specific range of IP addresses, an internal VPN could help ensure everyone has continued access. If you're interested in learning about some strong options, we wrote you a guide.
- A shared password management solution. We know that many newsrooms have shared docs full of passwords, and other fun/concerning ways to keep track of their passwords. However, if you haven’t done so, consider investing in a team-friendly password manager — a piece of software designed to securely store passwords, and give selective access to others in the organization. For teams, good choices include 1Password and Bitwarden. Consider reading about choosing a password manager to learn how we came to those recommendations.
- Two-factor authentication for shared accounts. To make accounts more secure when logging into a website, many sites allow you to set up a second piece of information — a second “factor” — beyond the password. When you enable two-factor authentication, typically you will be asked to enter a short-lived code (e.g., a six-digit number) sent to a device you own, such as your phone. This is great for individuals, but isn’t ideal for teams, because not everyone can access the device.
If you’ve already set up a shared password management solution, you’re in a good position to add two-factor authentication to accounts shared by more than one person. Some password managers will allow you to store two-factor authentication codes, allowing anyone on the team to access them remotely. For example, 1Password will provide this functionality, making logins simpler for everyone. Consider reading about the security trade-offs of on-device and remote two-factor authentication solutions.
Work at home means you can’t assume the same security benefits of sitting at the office. Your newsroom may have stronger digital and physical security practices in place than your home office, so it might be time for some adjustments.
- If applicable, keep tabs on IT team guidance. Your IT team may provide software (e.g., password managers, VPNs) to help maintain remote access to newsroom resources at a distance. They are likely scrambling to keep your day as simple as possible, so keep tabs on any guidance they provide.
- Tighten your wireless security. At home, you might have to be your own IT department. To ensure you have the safest network possible, it’s time to think about updating your Wi-Fi router’s firmware, and ensuring the Wi-Fi and router administrator passwords are complex and unique. Updating your router’s firmware will help defend against many remotely exploitable vulnerabilities common in household routers. Likewise, weak Wi-Fi router passwords can be picked right out of the air without too much effort, but a complex and unique passcode is much harder to steal. Again, a password manager is a great way to generate, and keep track of these unique passwords. Learn how to secure your home Wi-Fi router.
- Update your connected devices. Every device connected to your network may have vulnerabilities that place the entire home network (and your work) at risk. While maintaining updates is generally a good practice, it’s now more critical than ever. Take an inventory of your connected devices — phones, tablets, voice assistants, computers, internet-connected cameras — and check to see if they have any available updates.
Note that while some connected “Internet of Things” devices (e.g., Amazon’s Alexa) have a big security team to push updates, many more devices (e.g., connected cameras, lightbulbs) will never get updates. It’s safer to avoid putting out-of-date devices on your network, but if you’re going to use them, consider placing them on a guest Wi-Fi network with a unique, complex password to keep these devices quarantined from the rest of the network. This will prevent them from making network-based connections to other devices.
- Be vigilant — now’s an opportune time for phishing attacks. One of the most common ways hackers steal credentials is through phishing messages, typically deceptive emails crafted to trick you into clicking a link to a file laced with malware, or to a phony login page. Sometimes a phish will manufacture a sense of urgency (e.g., “We need you to sign this immediately.”) Why? People with “stress brain” aren’t critically looking at what comes into the inbox, and hackers are taking advantage with phishing emails about COVID-19 emergency and health notices.
If you receive a link in your email to an apparent login page, hit pause and consider navigating directly to the page yourself rather than clicking the link. Remain vigilant, and consider learning more about phishing hygiene. The Electronic Frontier Foundation also released a primer on identifying COVID-19 phishing scams.
- When you are away, shut computers all the way down. Stepping out for a breath of fresh air? Power down your computer so it’s encrypted. Hopefully your work laptop has full disk encryption enabled with FileVault for Macbooks, or BitLocker for Windows users. But disk encryption won’t stop someone from taking data off the device once you’ve decrypted the device upon startup with your password. It’s important to shut the device all the way down when not in use, especially if it contains data on confidential sources or any other highly sensitive data. (e.g., anything related to your SecureDrop instance).
- Learn about security tradeoffs between video conferencing tools. Sometimes you won’t get to choose the video chat tools for your meetings (e.g., when your colleagues choose a specific platform, such as Google Workspace or Office 365). But in your personal capacity you’ll nonetheless join remote meetings with many different needs. Sometimes you’ll need support for dozens of participants. Sometimes this is less important, and in sensitive conversations, you’ll need end-to-end encryption. There’s no “right” way; only what’s right for you, your sources, and your colleagues. Consider learning about security and usability tradeoffs between several video chat tools.
- Tighten your protocols for accepting leaks at home. When you’re at home, you may not have access to your desk phone, and potentially other newsroom tip channels. With that in mind, you may need to take steps to accept tips more securely from home. First things first: If you haven’t already, your newsroom should ensure one or more people can bring home the relevant hardware, and triage tips over Signal, SecureDrop and other channels from home. It might be a good time to read about how to lock down Signal or upgrade WhatsApp security for your personal and newsroom communications. Freedom of the Press Foundation has released a remote working advisory with recommendations for SecureDrop administrators.
- Share this with your colleagues. Consider also sharing these resources with your colleagues. It’s not sufficient to immunize only yourself. We also need to ensure our colleagues operate safely.
And as always, please reach out to our digital security training team if you need any help.
We’d love to help others learn from your experience by adding your tips above! What are some long-standing practices your organization has employed to protect journalists working remotely? How about new practices you’ve never had to consider until now? Contact us privately here or reach out at @freedomofpress (DMs open). We look forward to learning from, and working with you.
- Freedom of the Press Digital Security Training Team