Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cloud
    • Cybersecurity
    • Mobile
    • Networking

    Five Ways to Ensure WFH Employees Keep Company Data Secure

    Written by

    Chris Preimesberger
    Published July 29, 2020
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      The COVID-19 pandemic reshaped our workplaces in the blink of an eye, with social distancing mandating many employees to take their work home with them. This quick shift forced IT teams to cobble together work-from-home policies aimed at securing business’ data and devices regardless of location, while still enabling employees to maintain productivity. Particularly for those new to any employees working remotely, this has been no easy task.

      But effective policies aren’t just essential for navigating businesses through this current predicament. Many expect they’ll remain crucial to data security and productivity as distributed offices likely represent a new normal in the future. 

      As a longtime data and device encryption provider, Beachhead Solutions has seen firsthand how businesses get into trouble without a thorough security strategy. In this eWEEK Data Points article, VP Cam Roberson of Beachhead Solutions uses industry information he’s gathered to highlight five ways to put data security policies in place for the long-term WFH era. 

      Data Point No. 1: Ramp up employee training to teach workers self-defense in an environment that’s dangerous to data.

      It remains unfortunate but accurate that employee behavior is the single greatest threat to a business’ data security. Whereas infiltrating systems through software exploits or similar avenues requires technological ingenuity to bypass security measures, the successful exploitation of an employee means they’ll simply (and usually unwittingly) prop open the door.

      That’s not to say attacks targeting employees aren’t clever; phishing techniques have become quite sophisticated and difficult to detect. Even more dangerous are spearphishing attacks that leverage detailed information to more effectively target specific individuals. For example, an employee might receive what appears to be an email from his/her boss, directing them to divulge login credentials, or to refund a customer charge by wiring money. These attacks succeed often enough under normal circumstances. But they’re that much more potent under the current work-from-home conditions, where tricks can’t be sorted out with a simple desk-side conversation in the shared office.

      Data Point No. 2: Beware the family.

      Another risk area arises from computer sharing, where an employee will allow family members (often children) to use their business devices with credentials entered. This practice exponentially increases the risks to data and systems accessible from the device. Unfortunately, untrained employees with work devices in the home and kids to entertain find this high-risk convenience all too tempting. It’s also interesting to remember that criminal attackers are also more likely working from home, giving them experiences to draw from in refining their tactics and exploiting the specific vulnerabilities of work-from-home employees.

      To counter these increased risks, organizations must implement more intensive employee training regimens–as well as more secure policies that disallow a single employee from unilaterally putting data or company funds in jeopardy. Available training management tools can be used to train and certify employees in recognizing phishing attacks. Some training solutions will even send employees benign spear-phishing emails to test their behavior in realistic scenarios. This focused training will make employees better caretakers of sensitive data, equipping them to weather the current influx of COVID-19 email scams. 

      Data Point No. 3: Utilize a VPN and other security tools to provide access that’s both seamless and secure.

      The most common hesitation organizations have implementing a distributed office environment is concern over how to protect devices at large from becoming compromised (and thus opening them up to data breaches). However, safeguards to establish secure work-from-home environments are readily available. 

      First of all, businesses should introduce a VPN as part of its remote work policies to ensure that communications within the distributed office are secure. At the same time, be aware that recent infamous VPN software vulnerabilities have increased the risk of compromise. Make sure that your VPN of choice is fully up to date. Also verify that all employee-used remote work devices have the most recent security patches, and that anti-virus software is present and turned on.

      Data Point No. 4: Harden systems by streamlining software down to what employees need, and nothing else.

      Each piece of software running on an employee-used device carries a degree of risk. Applications that aren’t accessed frequently and don’t contribute to productivity should be removed to limit the attack surface to only the tools actually needed. Applications should also be kept up-to-date to ensure they have the latest security fixes.

      Data Point No. 5: Protect data with encryption, remote access controls and remote deletion capabilities.

      Data on employee-used devices – especially sensitive company data – must be protected by encryption that can immediately render it inaccessible to anyone without the proper credentials. That said, there are scenarios where encryption still isn’t enough to guarantee data security (employees sharing company computers with family members comes to mind). If a device is lost or stolen from a remote employee during an active session, or login credentials are compromised, then data may be as well. Organizations should have data encryption and access control tools–SimplySecure being one of them–in place. This strategy will ensure data security by remotely deleting data from devices if necessary.

      Guided by these methods, businesses can make smoother transitions to running efficient distributed offices – where employees can work from home productively while keeping company data secure. Given that the return to the office may not come soon – and offices may in fact never be the same again – these security strategies and policies will set up a remote workforce for the long term.

      Photo by Daria Shevtsova, Pexels

      If you have a suggestion for an eWEEK Data Points article, email [email protected].

      Chris Preimesberger
      Chris Preimesberger
      https://www.eweek.com/author/cpreimesberger/
      Chris J. Preimesberger is Editor Emeritus of eWEEK. In his 16 years and more than 5,000 articles at eWEEK, he distinguished himself in reporting and analysis of the business use of new-gen IT in a variety of sectors, including cloud computing, data center systems, storage, edge systems, security and others. In February 2017 and September 2018, Chris was named among the 250 most influential business journalists in the world (https://richtopia.com/inspirational-people/top-250-business-journalists/) by Richtopia, a UK research firm that used analytics to compile the ranking. He has won several national and regional awards for his work, including a 2011 Folio Award for a profile (https://www.eweek.com/cloud/marc-benioff-trend-seer-and-business-socialist/) of Salesforce founder/CEO Marc Benioff--the only time he has entered the competition. Previously, Chris was a founding editor of both IT Manager's Journal and DevX.com and was managing editor of Software Development magazine. He has been a stringer for the Associated Press since 1983 and resides in Silicon Valley.
      Linkedin Twitter

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×