News

What we're talking about… Categories / Cybersecurity

Top Five Remote Working Security Tips

Remote Working Security Blog

Today’s workplace extends far beyond your business headquarters. Follow these five remote working security tips to ensure that your users don’t pose a security risk when they’re away from the office.

The recent ‘Beast from the East’ weather front brought snow and freezing temperatures to much of the UK, affecting transport networks throughout Britain. With trains brought to a standstill and cars stuck in driveways, thousands of users were unable to reach their offices and forced to find alternative working arrangements.  From local coffee shops to home offices, users dusted off their laptops and set to work as best they could away from their desks.

The Beast from the East may have passed, but with fresh weather warnings issued by the Met Office we may well be set for more travel chaos in the weeks ahead. With yet more users likely to opt to work remotely to avoid the treacherous conditions, it’s essential that you consider your firm’s posture when it comes to remote working security.

Modern security threats come in many forms, from the malicious to the innocent and unintended. And with new regulations incoming that will issue huge penalties for data breaches, now is the time to take remote working security seriously. In this blog post we’ll take you through our top five remote working security tips.

Top Five Remote Working Security Tips

Remote working introduces another dimension of security threat to your firm. Your physical and system security may be robust and well-established at your headquarters, but the same can’t always be said for a busy commuter train, a coffee franchise, or your Finance Director’s home.

The following five remote working security tips will help you to implement security best practices for all users who access your systems, regardless of their location: –

  • Keep your equipment safe. Your laptop, smartphone, and tablet devices are all targets for criminals. If you’re working in a public space, never leave your equipment unattended. And be aware of shoulder surfers, who may be looking at confidential information that is displayed on your screen.
  • Create a strong password. You’ll need a strong password to ensure that – if the worst happens and your equipment is stolen – criminals won’t be able to login to your profile. Strong passwords are at least eight characters long, contain uppercase letters, lowercase letters, numbers, and special characters, and are changed on a regular basis.
  • Be wary of public Wi-Fi. Unsecured public Wi-Fi services – such as those offered by coffee shops and transport providers – can present a security risk, as data transmitted through public Wi-Fi can be intercepted. Consider using your mobile phone network rather than a public Wi-Fi service.
  • Use a secure remote access method. A VPN tunnel from your laptop to your email, file, and application servers can create a backdoor for hackers to gain access to your infrastructure. Consider using a secure remote access method like Microsoft RD Web or Citrix XenApp, both of which are inherently more secure and also offer great management and functionality.
  • Implement antivirus, email security, and web security. Your servers and office desktops are protected by endpoint antivirus, email security, and web security. What about your laptops and other devices outside the office environment? Whether in you’re in the office or remote working, you should maintain the same high security standards at all times.

Remote Working Security Training

Training your users in remote working security best practices is essential to protecting your business. Security aware users are your first line of defence against data breach or cyber-attack, and modern businesses need to promote a strong security culture throughout their staff.

Capital Support deliver Security Awareness Training as part of our suite of Managed Security services. Our Security Awareness Training service teaches employees how to spot cyber-threats before they damage your business. Contact us if you’d like to learn more.

Toby Shackleton
Toby Shackleton