Security News > 2020 > March > How to maintain safe cybersecurity practices while transitioning workers from the office to remote workstations

How to maintain safe cybersecurity practices while transitioning workers from the office to remote workstations
2020-03-05 19:15

"From a security perspective," said Javvad Malik, security awareness advocate for KnowBe4, "The first things a company should look into are whether there is enough capacity for employees to work from home at the same time. It is also important to ensure the right policies and tools are put in place to enable employees to work remotely. Not having the right tools in place can lead to employees using unapproved or insecure apps, tools, or methods to try and get their job done. Most of all, expectations should be set as to how the organization expects its employees to operate under remote conditions and how to raise any issues."

A Veritas Technologies spokesperson warned, "Many employees are habitual in the way they store data, saving to local drives on laptops or to the public cloud when working remotely. If large percentages of employees shift towards remote work over time, it could create a pool of unstructured data that would become invisible to the business-causing a new wave of data protection and compliance concerns." Given how quickly the coronavirus has spread, corporations may not have had time to implement necessary protocols.

"Two-factor authentication is critical for a remote group, said Justin Cappos, an associate professor at NYU Tandon School of Engineering."It's easier for an attacker to appear to be a remote employee, than a person sitting next to you in an office.

" Some experts insist on remote workers using only company-issued devices to ensure the safest security measures in addition to two-factor sign-in.

For remote access to your work computer, use a VPN. A Virtual Private Network connection is essential for maintaining full end-to-end encryption when connecting to a remote computer.


News URL

https://www.techrepublic.com/article/how-to-maintain-safe-cybersecurity-practices-while-transitioning-workers-from-the-office-to-remote-workstations/#ftag=RSS56d97e7