Remote work. In theory it sounds like a win-win for all involved:
But, as we all know, there’s always a catch (or few). For this post we’re focusing on cyber security and the related challenges posed by employees working remotely.
At first glance, working remotely seems straight forward enough. Just get a laptop with an internet connection, and start sending emails and files. But in today’s world where information is valuable currency, remote work presents a host of challenges for companies that are new to the process.
Let’s look at some of the challenges and how to mitigate their associated risks.
Challenge 1: Your business has gone from one secure network access point to multiple potentially unsecure access points.
For the sake of clarity, let’s start with the assumption that your business network in the office is setup with all of the current cyber security best practices: firewalls on all in-house devices, automatically updated virus protection, strong password requirements with regular reset intervals, pop-up blockers, locked and encrypted wifi networks, and automated data backups to onsite and offsite locations. If your office network is not setup with those basics, or you’re unsure, now would be a good time to contact your IT vendor to make sure you’re setup properly!
So your office network is secure, but now you have previously in-house employees working remotely. Are their home networks as secure as your office network? Is their data still backed up automatically? Are they using a work provided computer or their own private computer?
First step for your remote workers’ equipment:
Challenge 2: In-office employees are used to responding to most digital communications without thinking they could be malicious.
In most office settings, we’re used to the routine and pace of the office and its associated communication patterns. But with the massive shift to remote work, bad actors have increased the frequency of attacks via email and other electronic communications. They know that more people are more dependent on electronic communication than ever before, and are attempting to take advantage of the situation.
Do you have training in place for your employees on how to identify potentially malicious emails? Do you have antivirus software installed on all devices that access your work networks?
Second steps for your remote workers:
Challenge 3: Equipment will be transported back and forth between the office, employees’ homes, and other remote locations.
Now that people are working remotely, whether full time or limited days each week, they are transporting expensive hardware with access capability to your work network. What happens if that equipment gets broken? Stolen? Lost?
Third steps for your remote workers:
In conclusion, there are several straightforward steps you can take to protect your networks and business information. And these steps are much easier to take now than they are after a network breach!
If you have a preferred IT provider, reach out to them for support on implementing any improvements you need for your network. If you don’t currently have a preferred IT provider and live in the Evansville, IN, Tri-State area, some excellent local IT service providers include:
If you’d like to build out your own plan for cyber resilience, reach out through our Contact links to setup a free Business Impact Analysis session for your company, and let’s get started improving your own company’s resilience.