How to keep your business secure with remote workers


In the wake of the unprecedented pandemic, many companies are mandating social distancing through remote work and are striving to ensure business as usual across their operations to minimise impact on their employees and customers. This new way of working highlights the importance of implementing procedures to avoid cybersecurity risks and business interruptions.
As employees continue to migrate from in-office to remote locations, the shift in the working environment will pose new challenges. This is where guidelines and best practices are needed to ensure remote employees are working securely.
Improve security with VPN
While companies may have taken in-house precautions such as firewalls, Domain Name System (DNS) and Intrusion Detection Systems/Intrusion Prevention Systems (IDS/IPS), these may not provide the level of security a business needs as the workforce becomes more distributed. In fact, due to the increasing number of remote workers, the Cybersecurity and Infrastructure Security Agency (CISA) is encouraging organisations to adopt a heightened state of cybersecurity – and this includes establishing a virtual private network (VPN) to enable remote workers to securely connect to the company’s network.
VPN guidance by the CISA includes:
● Update VPNs, network infrastructure devices, and devices being used to remote into work environments with the latest software patches and security configurations.
● Alert employees to an expected increase in phishing attempts.
● Ensure IT security personnel are prepared to ramp up the following remote access cybersecurity tasks: log review, attack detection, and incident response and recovery.
● Implement multi-factor authentication (MFA) on all VPN connections to increase security. If MFA is not implemented, require teleworkers to use strong passwords.
● Ensure IT security personnel test VPN limitations to prepare for mass usage and, if possible, implement modifications – such as rate limit – to prioritise users that will require higher bandwidths
Use best practices to stay secure while working remotely
Adjusting to working remotely is more than just finding a suitable office location within the home. Remote workers need to take into consideration the possibility of cyber-attacks and take the necessary precautions. The following list of best practices will help remote workers protect their new work environment, as well as the business.
● Stay connected to the company’s VPN: The additional security protection provided by the VPN is critical to prevent malicious attacks.
● Use a secure Wi-Fi network: Business work should always take place on the employee’s secure, private home network and not public network access points. When data is sent via an unsecured Wi-Fi connection, the user loses their privacy, making it possible for cybercriminals to intercept data. Not only is personal information at risk, but business data can also be compromised.
● Secure home workstations: Employees need to make sure that they have fully patched and updated antivirus and antimalware software. In addition, their in-home Wi-Fi should be secured with Wi-Fi Protected Access (WPA2 or WPA3). They also need to disable insecure features such as Universal Plug and Play (UPnP), as well as change Internet of Things (IoT) default logins.
● Follow in-office best practices: Remote workers need to continue to follow the same best practices they did in the office such as avoiding non-reputable websites or links, and promptly report any suspicious activity or concerns to their internal IT or Managed Service Provider (MSP).
● Work with cloud applications: When possible, teleworkers should have access to cloud applications to ensure data is being backed up.
● Remain vigilant: With the increasing number of attacks using COVID-19-based content as a delivery mechanism for malware, remote workers need to be especially alert when reading emails, messages and web browsing.
● Disconnect unknown devices: Devices such as USB sticks and peripherals should not be connected to the company’s hardware.
● Use strong passwords: This may sound basic, but it is important in reducing cyber-attack opportunities.
● Limit the family’s bandwidth usage: As everyone knows, the more devices in use such as phones, tablets, game consoles, etc., the slower the connection, which can hinder the employee’s ability to effectively work remotely.
While it’s highly recommended that remote employees are provided with company hardware, this may not always be possible. If this is the case, the installation of a reputable antivirus and firewall should be installed on the devices being used remotely for work. These tend to be provided at no charge through the employee’s internet service provider (ISP).
In addition to the applicable best practices listed above, employees using their own devices should:
● Ensure that the latest operating system and web browser updates are installed.
● Avoid the use of file sharing (P2P) and other high-risk applications.
● Use the business email only to conduct company business.
Although these security measures will help to promote a secure work environment while an increasing number of employees begin to work from home, there are other considerations.
Human resource policies and practices should be reviewed to ensure that they are consistent with the Centers for Disease Control and Prevention (CDC). The CDC has put in place recommended strategies for employers, which include exploring flexible worksites such as telework or staggering shifts to increase the physical distance among employees.
As the COVID-19 situation continues to escalate, putting best practices in place now will help to ensure a seamless and secure migration of in-office workers to remote workers.
Ryan Weeks is CISO at Datto
In the wake of the unprecedented pandemic, many companies are mandating social distancing through remote work and are striving to ensure business as usual across their operations to minimise impact on their employees and customers. This new way of working highlights the importance of implementing procedures to avoid cybersecurity risks…
Recent Posts
- Quordle hints and answers for Wednesday, February 19 (game #1122)
- Facebook is about to mass delete a lot of old live streams
- An obscure French startup just launched the cheapest true 5K monitor in the world right now and I can’t wait to test it
- Google Meet’s AI transcripts will automatically create action items for you
- No, it’s not an April fool, Intel debuts open source AI offering that gauges a text’s politeness level
Archives
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010