Best practices for ‘Work from Home’

Share This Item

Work From Home best practices

In this era of Covid-19, Work from Home has become the new normal.

Now that many companies are announcing permanent work from home policies, the practice maybe the norm for the foreseeable future.  This opens the door to many substantial security concerns. Establishing work from home best practices is critical.

Here are some guidelines that employers should consider when allowing their employees to work outside of the office.

  1. Always issue a company owned computer, if possible.  It is never a good idea to allow company owned data to find its way onto an employee owned computer.  There are many reasons that this could become a serious issue. Among them:
  • Control of Data – If an employee chooses to leave the company, there is no way to police the data that resides on an employee owned disk drive. This can be particularly damaging if the employee accesses HIPAA regulated information.
  • Security – There is no way to ensure that an employee owned computer meets security compliance requirements. Is there appropriate antivirus software installed? Are the definitions current?  Is the device infected with Malware?
  • Software updates – Software updates are released by providers on a regular basis. It is not possible to ensure that the critical updates and patches are installed if the device is not on your company infrastructure.
  1. Never allow open Wi-Fi connections –

An open access Wi-Fi is a major security risk to your company’s data.  Open access will allow anyone to actually access to your Company’s network.  With no firewall between the computer and anyone else connected, a threat actor is granted unfettered access to the network.  This would allow any interested party to monitor traffic on the network.

  1. Use an adequate Virtual Private Network (VPN) –

VPN connections should always be used to transmit data between the assigned Work from Home employees and the Company’s network to ensure that all of the data between the remote network and the company networks rides securely on an encrypted tunnel, protecting all information from any prying eyes.

  1. Home work areas should be private –

When working from home an employee should always choose an area that is private.  The area should have a door with a lock to prevent unauthorized access.  It should be free from distractions and all screens should have obscured line of sight from other people in the household.

  1. Always lock your device –

If not behind their device, employees should always ensure that it is locked.  This is a best practice, not only in the home, but in all work environments.   It is never a good idea to leave a device in a state that someone could possibly view confidential information.  This can be easily accomplished by simply pressing the Windows key and ‘L’ key, simultaneously.

  1. Never leave your device in your vehicle –

This seems like a no-brainer, however it happens.  Even if you lock the vehicle, your device can disappear.

  1. Ensure that home routers are secure –

Prior to authorizing a user to work from home, the home router should be checked to ensure that it meets security protocols.  The router should be checked to ensure that it does not use default passwords and that there are no risky port forwards setup.

  1. Adequate antivirus should be installed –

This is true of all company devices, but particularly in a work from home environment.  You should use reliable Antivirus on all workstations to confirm function and up to date antivirus definitions.

For an assessment of your work from home security controls, and assistance establishing your work from home best practices, Please contact us!

Subscribe To Our Newsletter

Get updates and learn from the best

More To Explore

Business Backup and Disaster Reccovery
Tech

Business Continuity After a Ransomware Attack: Managed Backup and Disaster Recovery for the Alabama Gulf Coast

Ransomware attacks are a growing threat to businesses everywhere, including those along the Alabama Gulf Coast. These cyberattacks can paralyze operations by encrypting critical data, demanding hefty ransoms for its release, and leaving companies struggling to recover. For small and medium-sized businesses (SMBs) in Mobile, Pensacola, and surrounding Gulf Coast

IT Health Check Pensacola
Tech

Do You Need an IT Health Check? Here’s How to Know

Your business’s technology infrastructure is the backbone of its operations, and an IT Health Check ensures it’s secure, efficient, and running at full capacity. Whether you’re in Pensacola, Mobile, or Baldwin County, Baychester Associates is here to help you keep your IT systems in excellent condition. In this post, we’ll