Back to top

10 Cyber Security Tips For A Remote Workforce

BYOD

Over the last 15 years, there has been a significant increase in at home or remote workers within organizations around the world. A big reason for this increase in remote workers is the digitization of the workplace and the evolution of business processes. This trend will continue in the coming years and requires businesses to be diligent when it comes to cyber security and remain flexible in order to adjust along with changes in technology.

 

Companies that hire or work with remote workers must be sure to provide these individuals with the right tools and information to ensure that they are working securely and effectively. The following list contains informative pieces of advice to relay to your remote staff while they work on the road, or from the comfort of their home.

 

Make Use of the Tools Provided To You

 

IT teams exist in order to help all team members remain secure in their use of technology. Strong IT teams select the tools that are utilized by vetting and assessing what is on the market and selecting the tools that are the best fit for their particular organization. This is why all team members, especially remote workers, should make proper use of the tools that their leadership provides them with. If unvetted, outside tools are in use, any number of vulnerabilities may arise.

 

Utilize a VPN

 

An encrypted VPN that is managed by corporate should always be in use by remote workers. This VPN should be utilized whenever accessing the company’s data. Additionally, it can be very effective to disable split tunneling, which will help businesses avoid the bridging of data across both the non-encrypted and encrypted connections.

 

Incorporate Two Machines

 

The division of personal and professional tasks between separate computers is important. When both the personal and professional mix, it becomes much more likely that data will become less secure, or for contamination to occur.

 

Avoid Public Wi-Fi

 

Public Wi-Fi is much less secure than a private network. Quite often, these networks are not secure and result in vulnerabilities. These networks are perfect environments for hackers to utilize in order to gain access to unsecured machines. Always be wary of public Wi-Fi and avoid it whenever possible.

 

Router Selection & Configuration

 

The router that you choose makes a big difference when it comes to security. It is common for home routers to be ineffective from a security standpoint. Make sure that your at-home workers know which routers are the best when it comes to security so that they don’t choose one that is easily compromised.

 

Additionally, it is crucial that routers and firewalls are configured properly, and in line with the instructions provided by the manufacturer. This includes outbound filtering, non-default administrative credentials, and no remote management.

 

Utilize a Password Manager

 

Passwords are often the first line of defense against hackers, and poor password decisions lead to massive vulnerabilities. A strong password manager protects users against issues commonly associated with weak passwords and makes the act of memorization much easier.

 

Regular System & Software Updates

 

Updates often exist not only to improve user experience and fix bugs but also to address security threats. Installing updates on your software and system improves your defense against malware and viruses. Virus writers are always adapting and adjusting their methods to try and gain access to your data or infect your machine, which is why the installation of updates helps users avoid basic vulnerabilities.

 

Incorporate Multi-Factor Authentication

 

Multi-factor authentication should be enabled on all professional and personal accounts as a way to thwart phishing attempts. This tool helps ensure that your credentials are protected and can be augmented through the use of strong password selection. This means avoiding the reuse of passwords or using the same passwords for both personal and professional accounts.

 

Be Wary of Browser Extensions

 

When browser extensions become compromised, it becomes easy for hackers to gain access to credentials and data. For remote workers, this means implementing a policy that limits the use of extensions, as these plugins are very difficult to vet.

 

Harden Wireless Access Points

 

Businesses should always make sure that all wireless access points on their network are properly hardened. In order to augment this, wireless beaconing should be turned on. This makes it necessary for you to know your SSID before any connection is made. The most common wireless attacks are carried out against targets that are easy, so when you stop broadcasting your SSID, you limit your wireless footprint. This way, only individuals who know your SSID can connect to you.

If you find yourself losing sleep about keeping your employees devices secure, Aqueity can help! Please contact us to learn more.

Contact Us