fbpx

Your IT Support Experts

We partner with many types of businesses, and strive to eliminate IT issues before they cause expensive downtime.

Home

Stores

About Us

IT Services

Understanding IT

News

Blog

Contact Us

Support

Free Consultation

Interested in seeing what we can do for your business? Contact us to see how we can help you! Sign Up Today

JensenIT Blog

What You Need to Consider to Securely Permit Remote Work

What You Need to Consider to Securely Permit Remote Work

At any given time, a business needs to consider its security, but this need only exacerbates when its employees are working remotely. With the coronavirus pandemic still in play, the likelihood is that your employees are in this situation has risen dramatically. In order to maintain  your organizational security, you need to consider the many factors that a remote workforce can introduce.

Let’s review some of these factors.

Personally-Owned Technology

Just as in the workplace itself, personal devices are a major risk factor when an employee is working from home.

Consider the activities that are typically done on a workstation, as compared to those that are typically done on the personal computer. They are very different. While a workstation generally requires access to a relatively limited number of resources, websites, and programs, a lot more is comparatively done on a personal device. Online shopping, casual browsing, and social networking are far more common, which can all open up a system to more threats.

You also have to consider that the average employee isn’t going to be prone to securing their own devices… at least, not in comparison to how their workplace devices should be secured.

Furthermore, because many employees are likely to use a personal device, they will need to have some means of accessing your company’s resources. This is commonly accomplished through the use of remote access software. However, this software is frequently targeted by cybercriminals, putting the company at risk.

Insecure Connections

On a related note, your employees are going to need access to your network in order to work remotely (or access to the Internet, at the very least). Yet, the same issue with personally-owned technology bleeds over into the connections that your employees use. Network connections in the home, as we’ve already established, simply aren’t going to be nearly as secure as the ones that are accessible in the office as the same standards aren’t being enforced. Budget routers and modems will typically feature a lack of integrated security and support from the manufacturer, as do the connected devices that are found everywhere nowadays. 

If this inherent insecurity isn’t resolved by additional measures and best practices, attackers can take advantage of it. Publicly-accessible hotspots and some home networks feature minimal protections, and are therefore insufficient for professional use as well. Fake Wi-Fi networks are common amongst attackers as a means of fooling their targets into leaving themselves vulnerable.

User Behaviors

Finally, you also need to consider how your employees are treating their security. The concept of phishing attacks and spoofing aren’t exactly top-of-mind when someone is at home, but the threats are still there. You need to be sure that your team understands that all the same security policies and procedures are going to be in place while they work remotely, and actually become even more important.

Unfortunately, while it is less common than one might initially assume, employee misconduct is something that needs to be considered whenever remote work is implemented. Whether an employee is slacking off throughout the day, or even going rogue, you need to be sure that your employees are sufficiently monitored to catch (and ideally mitigate) these threats.

As a managed service provider, JensenIT is here to assist your business. That doesn’t change just because your team may not be in the office. For help in putting the solutions in place that can minimize these risks, reach out to our team at (847) 803-0044.

Be More Productive by Following a Routine
Coronavirus is Shifting the Communications Industr...
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Saturday, May 30, 2020

Captcha Image

Customer Login

Latest Blog

If you consider it, it’s amazing how much trust people have in Internet-based companies. They not only believe that these companies will fulfill their expectations, but that they will work to provide protection for some of their most valuable and sensitive information. Let’s take a look at some of the data collection practices that companies use and what they do with that data. 

Contact Us

Learn more about what JensenIT can do for your business.

JensenIT
1689 Elk Blvd
Des Plaines, Illinois 60016

Sign up for our Newsletter!

Hey! Before you go, subscribe to our newsletter for IT tech tips and advice!