Here’s how to Command your remote worker’s device security

Here’s how to manage your remote worker’s device security

One of the biggest consequences of COVID-19 for enterprises beyond 2020 is going to be the acceleration of the trend to working the majority of the working week from your home.

Already organizations were invited to look to it on the promise that every employee working at home would, on average, work an additional 1.4 days per month, which there would be greater productivity due to a perceived improvement in work/life equilibrium.

This working from home percentage was raised in an accelerated fashion as a result of the COVID-19 situation. With lockdown effectively mandating that many people in professional careers work at home, as we come back to’normal’ it is very likely that the dominant trend going forward is that workers will want to continue working from home into the future. Indeed, research indicates that as much as 41 percent of employees will likely continue to work at home to at least some extent after the pandemic.

Changing to operate from the house has been large. Some ISPs watched a surge of up to 25 percent in bandwidth usage, and also the underpinning reason behind this growth is home office usage. For instance, the video conferencing platform Zoom has seen a leap from 10 million consumers to 200 million users as people look to tackle their required meetings online.

Organizational concerns about the increase in working from home

Device safety: As beneficial as working from home has been in assisting businesses to continue being productive and workers stay participated, there are safety issues with allowing work from house, and this has become the reason that all these organizations have been reluctant to do so.

VPNs: One key concern is that the organization should open up the network so that it can be accessed over residential net connections — and without having firm control on your inner BYOD security policy, this can quickly end in disaster.

One solution to this that all companies should make standard when enabling work from home would be to mandate that employees use a VPN support from a reputable supplier (not all VPNs are equal, so be sure to do your due diligence to find one that you can trust). This immediately makes it more difficult to target a house worker with malicious attacks, as it hides the IP address of the consumer, encrypts all information sent out of that user’s devices, also masks the user’s physical location.

Cloud storage: Next, the corporation should provide protected cloud solutions so that employees do not have to save anything anyplace or distribute it to other workers through insecure ways (such as through email). An agency such as Microsoft Office 365 provides each employee with loads of cloud-based storage for all types of files and then allows them to collaborate online, in a secure environment, in real-time.

Device copies: Another crucial step is to get the organization to support backups across apparatus. This doesn’t mean maintaining local storage drives in worker’s homes, but rather using management software across the cloud surroundings, and mobile devices to maintain another cloud backup of the surroundings.

Among the locations that IT can overlook when dealing with a highly distributed, remote working surroundings, is the requirement to have a backup plan in place for your remote devices and their information.

In addition to implementing two-factor authentication and other password security greatest policies, organizations should help employees understand the significance of getting powerful passwords, how to recognize a phishing attempt over email, along with other best practices.

Businesses should also guide workers on how to change the admin password in their modem/routers, and understand the risk profile of functioning within a residential internet connection. A large proportion of security risks come from human error, and if employees are working remotely, it’s more important to help them to know how to accept personal responsibility for their safety.

The dangers of public WiFi

Finally, as lockdowns simplicity and folks start getting out and about again, remote work will even become traveling work. Perhaps a worker enjoys taking their notebooks to the local café for a morning coffee. They may travel to meet with clients or wish to check-in while overseas on a holiday. There’s nothing inherently wrong with some of this, however by the same token it is important to bolster safety best practices in people.

For example, public WiFi hotspots shouldn’t be utilized to get the corporate network. The organization should also have remote access management (RAC) installed on any device that is utilized for work. This way, in case a device is stolen and lost, the organization can lock down the information on the device and tackle recovery steps.


On the other hand, the advent of COVID-19 pushed their hands, and those very same organizations were granted the choice of enabling remote working or closed down throughout the pandemic.

Now, however, the solutions and technology are set up to allow remote working following the pandemic, and employees will expect it. Moving forward, remote working safety will be a continuing priority for every company, together with the good news being — once implemented — the productivity gains that include remote working will be well worth the effort.

But we also go over the evil side of technology, the darker consequences of new tech, and what we will need to be on the lookout for. You can read the original article here.

Written by
Aiden Nathan

Aiden Nathan is vice growth manager of The Tech Trend. He is passionate about the applying cutting edge technology to operate the built environment more sustainably.

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles

Data Breaches

Preventing Data Breaches: A Guide for Businesses

Data breaches are a grim reality that can wreak havoc on the...

Modern Cybersecurity

Beyond Prevention: The Role of DDR in Modern Cybersecurity Strategies

In today’s connected world, businesses have to deal with massive volumes of...

Vendor Risk

Vendor Risk Scorecards: Developing a Comprehensive Assessment System

In today’s interconnected business landscape, organizations rely heavily on third-party vendors to...

Security Risk Registers

Continuous Improvement of Security Risk Registers: Strategies for Iterative Enhancements

In the dynamic landscape of cybersecurity, the importance of robust security risk...