By accepting you will be accessing a service provided by a third-party external to

Is Security in Telework a Myth?

Is Security in Telework a Myth?

With so many people working from home due to the COVID-19 outbreak, organizational IT security is stretched thin. It is important that you know how to maintain operational integrity while prioritizing security when your whole staff is working from home. 

Here are three variables you should consider when deploying a remote workforce. 

Employee-Owned Devices

Deploying employee devices to meet your business demands is a risky proposition unless you have the right security measures in place. You will want to give your employees the technology that will give them the best chance to succeed; and, won’t cause any unnecessary problems for your data and network security. This is largely because of the way people utilize their personal PCs. 

On a workstation, people are told which software to use and stick to those titles, but on a person’s personal PC they have all types of software that your network administrator is unfamiliar with. This software, on a personal PC may not be updated and patched, leaving open vulnerabilities that could, very easily become major problems for your company.

Since most people that work from home are using a personal device, you need a way to protect your company’s assets from the quagmire some personal PCs present. One way is to provide remote access software. This will allow users to actually remote into their workstation at work and use the resources like they would if they were sitting at their desks. The one problem with remote software is that it is often targeted by cybercriminals. You will want to ramp up network security and demand authentication procedures be enhanced when allowing computers to access business resources remotely.

Insecure Connections

In the same vein, when working remotely, some employees will be using shared networks. This can cause your IT administrator a lot of headaches. Most users haven’t set up network and cybersecurity resources that are as comprehensive as the ones that the business has. For this reason your employees’ networks are typically much less secure. Even the networking hardware that they use, often people’s only line of defense, is lacking as the software that runs on it isnt always updated.

User Behaviors

Probably most importantly here is the user. At home, on their home PC, they are much more likely to do things that they would never think of doing on their workstation in the office. Adding to that, without the constant security reminders they get at work, they are less apt to follow best practices as their workplace enters their homespace. You need to ensure that you make the point that just because they are working at home doesn’t mean that any of the practices that they've been drilled on can be ignored. Remind them the dangers of phishing attacks and how it is even more important to be vigilant about what they click on. 

The last thing we need to talk about is employee misconduct. Some employees, if given a foot, will take a mile. It is important to monitor your employee’s productivity well enough to ensure that they are doing their work, and that the work is in line with what you expect from that position. Some people won’t take to it as well as others, but by-in-large, workers that work remotely work with an ease that allows the work to be better and for productivity to not dip so much as it will cost your business.

BNMC knows it’s a difficult time for New England businesses. We’re here to help. Call us today at 978-482-2020 to talk to one of our consultants about remote workforce management and security.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, June 07 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Productivity Business Computing User Tips Privacy Cloud Email Network Security Microsoft Hosted Solutions Software Hackers Computer Malware Business Efficiency Communication Data Google Small Business Workplace Tips IT Services IT Support Mobile Devices Hardware Cloud Computing Tech Term Internet Managed IT Services Data Recovery Innovation Ransomware Backup Smartphone Outsourced IT Users Windows Smartphones Upgrade Android Mobile Device Saving Money Information Data Backup Miscellaneous Disaster Recovery VoIP Server Facebook Phishing communications Microsoft Office Business Management Browser Windows 10 Business Continuity Productivity Cybersecurity Office 365 Managed IT Services Social Media Network Windows 10 Passwords Data Management Internet of Things Word Vulnerability Remote Monitoring Gadgets Gmail App Managed Service Encryption Apps Chrome Artificial Intelligence Quick Tips Mobile Office Infrastructure Money IT Support Tip of the week Remote Workers Information Technology Save Money Networking Settings Employer-Employee Relationship Managed Service Provider Virtual Reality Access Control Analytics VPN Applications Router BYOD Company Culture Website Employee-Employer Relationship Display Office Tips Collaboration Firewall WiFi Maintenance Avoiding Downtime Robot Big Data Antivirus Development Google Drive Bandwidth Automation Content Filtering HIPAA BDR Education Apple IT Management Data Security Paperless Office Storage Government YouTube Virtual Private Network Computers Unified Threat Management Risk Management Hacker Data storage desktop Managed Services Augmented Reality Spam Computing MSP Outlook Laptop Two-factor Authentication Managing Stress Bring Your Own Device Operating System OneNote Monitors LiFi Managed IT Service Vendor Management The Internet of Things Social Chromebook Hosted Solution Document Management Humor Data Breach Customer Relationship Management Scam Administration Best Practice Windows 7 IT Downtime Solid State Drive Mouse Software as a Service Break Fix Social Network Wireless End of Support Marketing Search Going Green Training Remote Computing Hard Disk Drive Mobile Security Printing Server Management Business Technology SaaS Password Touchscreen Business Intelligence iOS Wi-Fi Virtualization Managed IT Holiday Tablet Data loss Telephone Systems Retail Alert Conferencing Updates VoIP Unified Threat Management Peripheral Mirgation Recycling Buisness Utility Computing Shortcut Distributed Denial of Service Politics IoT Digital Payment Shadow IT K-12 Schools Sports Disaster Device Reducing Cost Bluetooth Comparison Work/Life Balance Cookies Virtual Desktop Digital Alt Codes Mixed Reality Firefox Superfish Customer Service Professional Services LED Threats Office Samsung Social Networking Migration Consulting Address Permissions Health Private Cloud Memes Computing Infrastructure PowerPoint User Error Chatbots eWaste Budget Laptops Patch Management Tech Support Star Wars Gamification Wearable Technology Network upgrade Uninterrupted Power Supply Mobility Batteries Specifications Nanotechnology Spyware Typing Alerts USB File Sharing Current Events Co-Managed IT Heating/Cooling Multi-Factor Security Social Engineering Motherboard Cables Computer Care IBM Onboarding GDPR Time Management Printer Identity Continuity Managed Services Provider Websites Fraud Cost Management Cybercrime COVID-19 Smart Office Print Toner Myths Black Friday Screen Reader Charging Identity Theft Cryptocurrency Slack Hard Disk Drives Licensing Dongle IT solutions Content Huawei Servers Google Calendar Safety Wires Corporate Profile Google Docs Messaging Emergency Holidays Hacks Digital Signage Data Warehouse Network Management Solar G Suite Entertainment Vendor Dark Web Distribution Assessment Automobile Network Congestion Remote Work Work Dell Google Wallet Shortcuts Mobile Management Cyber Monday Smart Tech Bitcoin Monitoring Solid State Drives Payment Card Cooperation Service Level Agreement Halloween Cabling Streaming Processor Legislation Voice over Internet Protocol WannaCry Business Growth Employee-Employer Relationships Google Maps Troubleshooting Business Analysis SharePoint Writing Compliance Legal Hybrid Cloud Microsoft Excel Logistics Hotspot Internet Exlporer National Security Techology IT Technicians Optimization Unified Communications Drones Security Cameras Profiles Smart Technology Connectivity Windows 8 Spying Inventory Staff Leominster Scary Stories Human Error Memory Statistics Modem FinTech Analysis Students How To Lenovo Dark Data Update Mobile Device Management Virus Downloads Regulations Deep Learning Scalability Mail Merge Blockchain Asset Management Language Value Running Cable Cameras Mobile Data Recovery Meetings How To Tracking Mobile Computing Cleaning Black Market CCTV Webcam Law Enforcement Financial Notifications Electronic Medical Records Twitter Physical Security Error Emoji Point of Sale Ben McDonald shares Upgrades Gadget Travel Crowdsourcing Personal Information Botnet Cortana 3D Printing Regulation Supercomputer CrashOverride Motion Sickness Staffing Processors Taxes Machine Learning Administrator Web Server what was your? Unsupported Software IT Budget GPS Printers IT Consultant Computer Repair Relocation

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3