Cybersecure in a minute Blog
- Written by Michael A. Alicea, vCxO Michael A. Alicea, vCxO
- Created: 03 May 2020 03 May 2020
The largest concern with the rush in allowing people to work from home is that they are by themselves, not likely able to properly secure their computing network. As a result, businesses now have many potentially insecure points of entry into their data and systems. Businesses need to start protecting their information by ensuring remote workers have some basic cybersecurity understanding and measures in place. Additional protection can be added later depending on the type and value of the data being remotely processed.
To begin, organizations need to take workers through the organization’s home office cybersecurity requirements step-by-step. Workers need to know and understand what safeguards are to be implemented as well as the timing to have the safeguards in place. The tech team will need to know what equipment is being used at the worksite so that direct support or guidance can be provided to ensure the appropriate equipment settings are set. The team, whether it's internal or outsourced, also has to be available to respond to issues that may come up as workers try to comply with the requirements. If properly planned and with good training documents and support, securing remote networks can actually be a low-resource effort.
Part 2 will offer some basic starting points for securing home networks remotely. It’s important to note that although somewhat basic, some items will be outside the technical capabilities of most home users. Businesses will need to formulate a comprehensive plan to protect corporate data and systems now that there are many new points of entry for cybercriminals.
Follow #cybersecureinaminute on LinkedIn for related posts.
About the Author
Michael has more than 20 years of working with a wide range of businesses and technologies and creatively working with teams and implementing solutions in regulated environments. See full bio here.
All Syntricity services provided under the direction of a Certified Chief Information Security Officer (C|CISO) and a Certified HIPAA Compliance Officer (CHCO).
|We love to talk about what we do.||CONTACT US|