Returning to Work - Actions to take returning to the office after your summer holidays

I hope you’ve had a great summer break and are feeling refreshed and ready to get back to work.

Before you dive into your inbox, which I’m sure it full of fires that need your attention, it’s worth taking a moment to check your digital hygiene. Operating outside your usual work environment, especially on unfamiliar networks, can introduce inefficiencies on your return, as well as a few cyber risks to boot.

Here's a quick checklist to help you return to work securely and smoothly:

1. Clean Up Your Devices – Get Back to Business 

Holiday mode often means mixing personal and work use on your devices. Now’s the time to do a quick tidy-up.

Remove personal data and apps from work machines. If you logged into Netflix or other personal accounts on work devices, log out and clear the data.

I recommend also deleting temporary logins for services or apps you used during your time away from the office. Any credentials saved during travel should be removed to avoid accidental access or exposure.

2. Patch and Update – Stay Protected

Software updates often roll out while you’re away. Don’t skip them when you get back because you’re busy and want to get stuck in. When you get your morning coffee, set those updates to run and restart your device.

Make sure to install critical OS and software patches, especially for Microsoft Office and your operating system. These are usually the ones that require a restart to complete.

Also pay attention to any security tools on your devices, e.g., antivirus. They will often prompt you, but it only takes a few seconds to open them up and click the ‘update’ button.

3. Audit Your Access – Check for Odd Behaviour

Your IT team is your ally here. A quick check-in can go a long way. Ask your team to do a quick system audit, including your email, CRM and any other core systems to look for unusual activity.

Share your travel history, so they can discount the relevant locations. That odd login on your account from South America when you were visiting Europe is not something to be ignored.

As a bonus tip, I also recommend checking your finances. Digital payments are convenient, but they’re also vulnerable, and it’s easy to miss fraudulent transactions mixed in between ice-cream shops, restaurants and duty-free shop at airports. Review your credit card statement and look for any suspicious transactions, especially on Apple Pay or Android Pay. Flag anything odd. If something doesn’t look right, report it to your bank or credit card company immediately.

Once you’ve done the above, please also share this list with colleagues so they can do the same.  Security is a team sport. A few minutes of effort now can prevent hours of stress and lost productivity later.

If you’d like help reviewing your systems or want to chat through any of the points above, please feel free to reach out. I’m here to help make your return to work smooth, secure, and stress-free.

Now, let’s get back to that inbox…

Jordan Gall

Jordan Gall is a passionate technologist with extensive experience supporting businesses across Europe, Asia, and Australasia. He has a strong foundation in cybersecurity, holding a Bachelor of Information Technology from Griffith University in Australia. Jordan has dedicated his career to bridging the gap between technology and business efficiency.

In 2020, Jordan joined Buchanan Technology, a global cybersecurity firm, where he serves as Head of Cyber. His vision is to establish Buchanan Technology as a worldwide leader in accessible cybersecurity services for small and medium businesses.

Jordan recently relocated back to Australia in 2024 to get away from the hustle-and-bustle city lifestyle, allowing him to focus on some personal goals (a lot of which will be immortalised in LinkedIn) and spend time with his family.

When he's not leading cybersecurity initiatives, Jordan engages in emerging innovations and eagerly awaits a contact lens version of the Apple Vision Pro. Outside of tech, you can find him on the tennis court, cricket field or playing the drums and composing music.

Previous
Previous

Cybersecurity slipping down your to-do list...You’re not alone

Next
Next

Technology Trends for an Agile Workplace