6 tips for improving work-from-home security

by | Jun 26, 2020 | Analysis, Covid-19, Public Relations

Many businesses are increasingly exploring the option of working from home. Some are even considering switching to entirely remote models. However, one of the biggest questions about remote work is how to ensure optimal security, especially for data.

The following security tips will help you ensure that your team is practicing good cybersecurity while working from home.

1. Require drive encryption

When people are working remotely, they may be a little more cavalier with their technology. For example, people like to work from coffee shops. If someone loses their computer, it could be susceptible to a very low-skill attack from an unscrupulous party.

One simple solution is to require drive encryption. This makes reading the contents of a hard drive or solid-state drive significantly more challenging. Without the credentials to decrypt the data, it is more or less worthless.

2. Use a VPN

Every business that allows remote work should be using a virtual private network. This is a great way to give your people more secure access to your digital assets without exposing them to other parties. By making your data and applications only accessible through the VPN, you can improve your security.

Plus, VPNs are very easy to use, especially with modern interfaces. Teams only need to open up an application and connect. Your IT team can handle most of the configuration in advance to minimize the possibility of user error.

3. Use strong network tech

When you have people connecting to your resources remotely, you need to make sure those servers are as secure as possible. If you have good visibility and control of the traffic interacting with your network, you will be able to ensure it is safe.

The right answers are different for each organization. For example, you may wonder why IDS vs IPS and which is best for your network. In many cases, both can add value. However, the right mix is different depending on your unique circumstances.

4. Set up a simple IT support system

People are central to your team’s success. They are also are the greatest vulnerability in your IT systems. When they switch to working remotely, you need to make sure that they have the necessary support to help them address any issues that may come up.

One of the main differences between WFH and working in an office is that IT personnel cannot be called over to help. So, you will need to set up remote desktop control and a simple way to submit requests for support. All of these can be solved easily if you remember to make support simple for non-techy people.

5. Establish clear policies

Again, people tend to be one of the main vulnerabilities in a system. They make mistakes like opening links in phishing emails. They also set bad passwords. Create clear policies that are easy to understand and follow. Consider helping people with tools such as password managers.

Setting up your policies and resources to make them as user-friendly as possible is a great way to ensure better security. If something needs a complex configuration, have your IT team handle it. Bad setups and management of resources is the pathway to security vulnerabilities.

6. Provide company technology

You can help achieve all of the above by providing people with company technology. This may seem obvious, but a lot of teams that move towards working remotely like to implement bring-your-own-device policies. While BOYD has some advantages, it can be very insecure. The problem stems from the fact that users have more control over their settings.

Give people laptops and mobile devices if necessary. Have them preconfigured by your IT team. This is a great way to make sure there will be fewer human errors.

Learn more

Setting up remote work has a lot of benefits. So, it is worth learning more about how to overcome the challenges. The above tips and more can help you keep your resources secure.

Walter Bodell


How to use customer data to personalize guerrilla marketing

How to use customer data to personalize guerrilla marketing

Flash mobs, massive art installations, and wild stunts. What do they all have in common? Well, they grab tons of attention. That's because they're all forms of guerrilla marketing. A tactic that relies on surprise, creativity, and bold moves to make a splash.  But...

How to generate leads for small and medium-sized businesses

How to generate leads for small and medium-sized businesses

In the ever-evolving landscape of digital marketing, lead generation stands as a pivotal strategy for businesses seeking growth. By capturing interest and inquiries from potential customers, companies can nurture relationships that drive sales and revenue....