Keeping Remote Work Secure Beyond the Current Crisis

Keeping Remote Work Secure Beyond the Current Crisis

With the widespread adoption of work-from home as a way of life these past two months, there's no doubt it will continue to be part of our future even after the current crisis is behind us. So it’s appropriate that we are planning on how adapt to it on an ongoing basis without compromising productivity or data and device security.  

Here are some important things to consider:

  • Remote devices, such as home computers, are outside the organization’s managed security boundary and don’t always have the same protections in place
  • If employees are working from home computers, they need to make sure they're working on supported, modern operating systems with security updates applied
  • Home computers often lack quality antivirus software. Organizations should be prepared to provide antivirus software to employees if they expect them to use personal devices
  • Home computers are often shared with others who may not follow safe computing practices
  • Personal email is subject to phishing attacks and often doesn’t have the same protections as enterprise email solutions
  • A compromised home computer can be just as much of a threat to your data as a system sitting on the network
  • Employees should be encouraged to make sure home WiFi, routers, and firewalls are running the latest updates

Fortunately, there are many things that businesses can do to limit risk throughout the coronavirus pandemic, such as:

  • Ensure cybersecurity policies, guidelines and programs are in place to secure data and systems
  • Make sure all collaboration and productivity software in use are company-approved and all security settings are in place and being followed by all
  • Teach employees how to identify and respond to phishing attacks
  • Do not allow workers to share computers or other devices
  • Encrypt data and virtual private network (VPN) traffic
  • Apply regular security updates across all business devices
  • Require two-factor or multi-factor authentication on all business devices
  • Leverage mobile device management and mobile application management solutions.

For a quick-reference guide on the top things to keep in mind regarding remote work, take a look at this checklist and share it with your users where appropriate.

Interested in a Work-from-Home Assessment and planning a longer-term strategy, or learning more about IT Solutions’ recommendations and best practices? Contact your vCIO or our sales team and we’ll set up a time to discuss.

© 2020 IT Solutions Consulting, Inc.. All rights reserved. Privacy Statement  |  Site Map