Home Safe: 20 Cybersecurity Tips for Your Remote Workers

Home Safe: 20 Cybersecurity Tips for Your Remote Workers

Schellman & Co. senior manager of PCI services, Jacob Ansari, recently shared his advice with Dark Reading on how IT departments can work with remote workers to ensure the security of their home offices. All 20 cybersecurity tips are available on the Dark Reading website.

By Ericka Chickowski

How can you protect your precious corporate endpoints from the mysterious dangers that might await when you're not by their side? Empower home office users with these tips.

According to data from Global Workplace Analytics, the population of work-at-home employees among those who work for organizations has grown by 159% since 2005. That's a growth rate 11 times faster than the workforce itself. This arrangement offers flexibility and productivity to organizations and their workers alike, but it also poses challenges for cybersecurity strategists.

"Digitization has caused a paradigm shift in where and how work is done," says Nima Baiati, global director and head of cybersecurity solutions at Lenovo. "Increasingly, work is being done from locations outside of the traditional office, with an emphasis placed on hiring the best talent and allowing the flexibility for where and how they work. As this shift accelerates, organizations need to adjust their approach to security."

A key ingredient to securing home-office workers is providing them with the knowledge and tools they need to work securely and efficiently. Dark Reading recently asked a number of security experts for the most important advice they'd tell IT departments to impart to their remote workers, whether they're working at home on the road. Here's what they had to say.

Tip #12: Segment Off Your Personal Network

"One of the easiest ways of protecting work-at-home endpoints is to put company assets on their own wireless networks. A home user can connect more than one wireless device to their cable modem or other gateway device and keep their personal devices, home automation, or other components on a separate network. Especially if the company configures and provides the device, it can minimize the risks of disclosure of WPA keys or other avenues of attack."

--Jacob Ansari, senior manager of payments industry assessment services, Schellman & Co.

About the Author

Jacob Ansari

Jacob Ansari is a Senior Manager at Schellman & Company. Jacob performs and manages PCI DSS assessments. Additionally, Jacob oversees other Payment Card Industry assessment services, namely PA-DSS, P2PE, and 3DS. Jacob's career spans nearly 20 years of information security consulting and assessment services, including network and application security assessments, penetration testing, forensic examinations, security code review, and assessment of cryptographic systems. Jacob has performed payment card security compliance assessments since the payment card brands operated their own standards prior to the advent of PCI DSS.

More Content by Jacob Ansari
Previous Article
Locking up the 'internet of things'
Locking up the 'internet of things'

A wide range of internet of things connected devices are now required to include reasonable and appropriate...

Next Article
Artificial Intelligence: A relative reality
Artificial Intelligence: A relative reality

To differentiate what is marketing jargon from what CISOs can do with AI-enhanced products, security leader...

Now Providing C5 Examinations

Learn about C5