Home Safe: 20 Cybersecurity Tips for Your Remote Workers

Home Safe: 20 Cybersecurity Tips for Your Remote Workers

Schellman & Co. senior manager of PCI services, Jacob Ansari, recently shared his advice with Dark Reading on how IT departments can work with remote workers to ensure the security of their home offices. All 20 cybersecurity tips are available on the Dark Reading website.

By Ericka Chickowski

How can you protect your precious corporate endpoints from the mysterious dangers that might await when you're not by their side? Empower home office users with these tips.

According to data from Global Workplace Analytics, the population of work-at-home employees among those who work for organizations has grown by 159% since 2005. That's a growth rate 11 times faster than the workforce itself. This arrangement offers flexibility and productivity to organizations and their workers alike, but it also poses challenges for cybersecurity strategists.

"Digitization has caused a paradigm shift in where and how work is done," says Nima Baiati, global director and head of cybersecurity solutions at Lenovo. "Increasingly, work is being done from locations outside of the traditional office, with an emphasis placed on hiring the best talent and allowing the flexibility for where and how they work. As this shift accelerates, organizations need to adjust their approach to security."

A key ingredient to securing home-office workers is providing them with the knowledge and tools they need to work securely and efficiently. Dark Reading recently asked a number of security experts for the most important advice they'd tell IT departments to impart to their remote workers, whether they're working at home on the road. Here's what they had to say.

Tip #12: Segment Off Your Personal Network

"One of the easiest ways of protecting work-at-home endpoints is to put company assets on their own wireless networks. A home user can connect more than one wireless device to their cable modem or other gateway device and keep their personal devices, home automation, or other components on a separate network. Especially if the company configures and provides the device, it can minimize the risks of disclosure of WPA keys or other avenues of attack."

--Jacob Ansari, senior manager of payments industry assessment services, Schellman & Co.

About the Author

Jacob Ansari

Jacob Ansari is the Chief Information Security Officer at Schellman & Company, where he develops and manages the company-wide information security program. Jacob oversees the processes for risk and security assessment, vulnerability management, software security, awareness and education, and incident response. Jacob has also performed in a client facing role as the technical lead for Schellman’s PCI services, and represents Schellman to the payments industry. Additionally, Jacob has experience with other Payment Card Industry assessment services, namely Software Security Framework, PA-DSS, P2PE, 3DS, and PIN. Jacob has extensive technical expertise on matters of information security, compliance, application security, and cryptography, and has been performing payment card security assessments since the card brands operated the predecessor standards to PCI DSS. Over the 20 years of his career, Jacob has spoken extensively on PCI-related matters, trained and mentored assessors, and contributed to groups on emerging standards, advisory bodies, and special interest groups.

More Content by Jacob Ansari
Previous Article
Locking up the 'internet of things'
Locking up the 'internet of things'

A wide range of internet of things connected devices are now required to include reasonable and appropriate...

Next Article
Artificial Intelligence: A relative reality
Artificial Intelligence: A relative reality

To differentiate what is marketing jargon from what CISOs can do with AI-enhanced products, security leader...

Now Providing C5 Examinations

Learn about C5