Schellman & Co. senior manager of PCI services, Jacob Ansari, recently shared his advice with Dark Reading on how IT departments can work with remote workers to ensure the security of their home offices. All 20 cybersecurity tips are available on the Dark Reading website.
By Ericka Chickowski
How can you protect your precious corporate endpoints from the mysterious dangers that might await when you're not by their side? Empower home office users with these tips.
According to data from Global Workplace Analytics, the population of work-at-home employees among those who work for organizations has grown by 159% since 2005. That's a growth rate 11 times faster than the workforce itself. This arrangement offers flexibility and productivity to organizations and their workers alike, but it also poses challenges for cybersecurity strategists.
"Digitization has caused a paradigm shift in where and how work is done," says Nima Baiati, global director and head of cybersecurity solutions at Lenovo. "Increasingly, work is being done from locations outside of the traditional office, with an emphasis placed on hiring the best talent and allowing the flexibility for where and how they work. As this shift accelerates, organizations need to adjust their approach to security."
A key ingredient to securing home-office workers is providing them with the knowledge and tools they need to work securely and efficiently. Dark Reading recently asked a number of security experts for the most important advice they'd tell IT departments to impart to their remote workers, whether they're working at home on the road. Here's what they had to say.
Tip #12: Segment Off Your Personal Network
"One of the easiest ways of protecting work-at-home endpoints is to put company assets on their own wireless networks. A home user can connect more than one wireless device to their cable modem or other gateway device and keep their personal devices, home automation, or other components on a separate network. Especially if the company configures and provides the device, it can minimize the risks of disclosure of WPA keys or other avenues of attack."
--Jacob Ansari, senior manager of payments industry assessment services, Schellman & Co.
About the AuthorMore Content by Jacob Ansari