01384 487 800
support@freecom.net
Customer Area
my.freecom.net LoginWebmail Loginfirst4apps LoginMicrosoft 365 LoginRemote Support
  • Home
  • Online Digital Services
    • Creative Website Design
    • Simple Website Hosting
    • Website Security
    • Search Engine Optimisation
    • Bespoke Development
    • Creative Design FAQ’s
  • Domain Names
  • Microsoft 365
  • Support
  • Contact Us
Product has been added to your basket.
Login
my.freecom.net LoginWebmail Loginfirst4apps LoginMicrosoft 365 LoginRemote Support

Keep Your Remote Workforce Safe From Hackers With These 14 Tips

Posted on 4 January 2021
Web Design West Midlands - Freecom

Online security can be tricky for a business, especially when the team is working from home. With 42% of Americans working remotely to some degree due to the COVID-19 pandemic, keeping data secure is more challenging—and more important—than ever.

Home offices often lack the security measures built into a traditional office space and thus are inevitably more vulnerable to hacking and other threats. Fortunately, your business can take steps to mitigate these risks. Below, Forbes Business Council members share 14 things you can do to ensure your remote workers and their data stay secure.

Members of Forbes Business Council share tips to help you improve cybersecurity when employees are working from home.

Photos courtesy of the individual members.

1. Be proactive about company education.

Focus on education, security training, reminders and explanations of the consequences. People will have a million things on their minds, and we all know the gut-wrenching feeling when someone throws a wrench in the system, whether intentionally or not. You have to keep in touch, keep employees updated, share new information and stay plugged into special interest groups like MS-ISAC, CISA and so on. – Mori Kabiri, Counself Inc.

2. Secure home networks and mandate VPNs.

Most home Wi-Fi networks are not secured, and risks could even come from family members sharing the same network. Mandate the use of VPNs—even for video conferencing calls. This will ensure that network traffic is encrypted. Apple and Microsoft have firewalls that can be enabled on all devices, including mobile. This prevents malicious inbound or outbound requests. – Debajyoti Ray, RivetAI Inc.

3. Rely on the experts.

Ensure company-issued computers that have security measures pre-installed by your IT team are used. Keep employees informed of any security updates or vulnerabilities that arise as more people transition to home offices and remote tools become more of a target for bad actors. Any action items should be left to the IT team or communicated in a way so that even the non-tech-savvy can follow. – Trevor Outman, Shipware, LLC

4. Clearly communicate company policies.

Establish and communicate guidelines to your employees regarding working remotely. Provide a checklist to ensure they’re following proper protocols to keep your data secure. Your staff should avoid using personal laptops for company business. Use dedicated devices and networks for managing essential systems to ensure secure operations (i.e., VPN3). Further, your team members should not utilize personal email addresses to communicate company information. – Joe Gardner, VentureDevs

5. Keep things simple.

With modern technology, there should not be a need for email attachments. Sometimes, long distribution lists can create data breaches. Keep it simple. Use shared documents and keep emails and data restricted to a “need-to-know” basis. Ensure you are clear on purpose, outcome and objectives for a task involving sensitive data. – Naeem Arif, NA Consulting

6. Don’t make critical assumptions.

People don’t have the same level of security awareness at home as they do at the office. At BHG, we continually educate staff about security through safety tips, online training modules and alerts to phishing scams. Still, we can’t assume people are retaining and practising these measures, so we’ve added an additional layer of vulnerability testing. – Eric Castro, Bankers Healthcare Group

7. Require two-factor authentication.

Ask your workers to set up two-factor authentication on all their accounts. This usually works by asking for a mobile number or email address to which a verification code or link is sent when a login is attempted. This gives an extra layer of protection to your data and is the best way to secure your accounts. – Adam Harvey, Proofed

8. Provide employees with basic security knowledge.

Create standard instruction guides and how-to documents for the software that your team will be using or for existing applications that will be used in a different way. It will help guide your staff on what to do if they have any questions or doubts. Employees need to be in possession of basic security measures. – Beth Worthy, GMR Transcription Services, Inc.

9. Teach your staff to recognize hacking attempts.

Hackers need a way to get into your system. For that, they send links, images, videos, etc. And once you click to open that link or image they get control and hack your device. That’s why you shouldn’t click on a link or image to open it right away. First, ensure that the sender is genuine—check their email address, profile, etc. Also, avoid public Wi-Fi. – Harpreet Munjal, LoudGrowth

10. Change passwords frequently.

A simple and still efficient way to curtail hackers—especially since everyone has quickly gone virtual and is working from home—is to change passwords more frequently. The “best practice” is to change passwords every 30 days on different websites—change it up to every 15 days. It is a bit exhausting and tedious, but it is something that works and is easy to implement quickly. – Silvia Mah, Ad Astra Ventures

11. Focus on people, processes and technology.

Great cybersecurity strikes a balance between securing assets and fostering operational efficiencies. At a minimum, companies need a dynamic defence of multilayered security and protection capabilities. This includes continuous training of employees on evolving cyber threats, established processes that enforce security controls and automated threat detection, identification and protection. – Byung Choi, MarcomCentral

12. Block common threats.

The most common threats are malware and phishing attempts. Behavioural-based antivirus software—which does not rely on definitions for malicious programs that already exist but instead identifies abnormal activity—will prevent the threat from executing and protect against malware. Advanced e-mail security with threat protection blocks malicious URLs and impersonations that originate from phishing emails. – Sean Vitale, vital tech Solutions

13. Remind people of the signs of phishing.

Take time during team meetings to periodically say, “No one at this company will ever ask for your password. And no one will ever ask you to buy gift cards and send the codes over email.” Spearphishing emails that look like they are coming from people’s bosses or even CEOs are on the rise. Asking for passwords and gift card codes are common scams. – Jason Richmond, Ideal Outcomes, Inc.

14. Ensure employees are only using company-controlled devices for work.

Remote work will continue for the foreseeable future, even without a public health emergency like the coronavirus. Businesses should pay as much attention to cybersecurity as productivity. If employees aren’t restricted to company-controlled devices, they could expose the business to a lot of risks, which can be incredibly costly. Additionally, strong passwords and two-factor authentication are a must. – Abigail Aboitiz, Advanced Remote Monitoring ARM LLC

 

Check out some of our other top blogs here:

How To Double You Business Page Likes From Companies On Facebook In 1 Week
How SEO Services Can Give Your Business A Strong Online Presence
6 Ways to Tell if Your Website is Healthy or Terminal
Previous Post
Are You Looking To Improve Your Success In Sales? Try Our Tips
Next Post
6 Top International SEO Tips For Expanding Businesses

Recent Posts

  • How To Create A Website 8 September 2021
  • 5 Reasons Your Website Needs An SSL 21 June 2021
  • The Sales Sweet Spot Four Stages Of The Content Marketing Sales Funnel 4 January 2021
  • Drive Real Footfall To Your Business With Local SEO 4 January 2021
  • 6 Security Tips To Protect Your Website From Hackers 4 January 2021

Popular Tags

blogs business business growth business help business leads business tips business website ecommerce facebook food google search help with sales lead generation leads more clients more customers more leads more sales plugins responsive web design sales sales help sales tips Search Engine Optimisation SEO seo help seo support seo tips skype social media tips webdesign web design web design tips website design website design tips website help website optimisation website security website support Website Tips website traffic wordpress wordpress help wordpress support Zoom

Contact Us

01384 487 800
support@freecom.net
Cradley Enterprise Centre, Maypole Fields, Halesowen. B63 2QB

Social Media

Online Digital Services

  • Creative Website Design
  • Simple Website Hosting
  • Website Security
  • Search Engine Optimisation (SEO)
  • Bespoke Development
  • Domain Names
  • Microsoft 365

Additional Services

  • Hosted Email
  • Superfast Fibre Broadband

Useful Information

  • Abuse
  • Complaints
  • Privacy Policy
  • Cookie Policy
  • Code of Practice
  • Terms of Sale
  • Terms and Conditions
  • Marketing Opt Out
  • Hosted Server SLA
Microsoft
Nominet

© 2021 Freecom Internet Services Limited

Company Reg No: 0665746461

VAT Reg No: GB 978 6092 61

Cookie Notice
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits.
By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
_GRECAPTCHA5 months 27 daysThis cookie is set by the Google recaptcha service to identify bots to protect the website against malicious spam attacks.
cookielawinfo-checkbox-advertisement1 yearSet by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Advertisement" category .
CookieLawInfoConsent1 yearRecords the default button state of the corresponding category & the status of CCPA. It works only in coordination with the primary cookie.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
CookieDurationDescription
_ga2 yearsThe _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors.
_gat_gtag_UA_369221_61 minuteSet by Google to distinguish users.
_gcl_au3 monthsProvided by Google Tag Manager to experiment advertisement efficiency of websites using their services.
_gid1 dayInstalled by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
CookieDurationDescription
_fbp3 monthsThis cookie is set by Facebook to display advertisements when either on Facebook or on a digital platform powered by Facebook advertising, after visiting the website.
fr3 monthsFacebook sets this cookie to show relevant advertisements to users by tracking user behaviour across the web, on sites that have Facebook pixel or Facebook social plugin.
test_cookie15 minutesThe test_cookie is set by doubleclick.net and is used to determine if the user's browser supports cookies.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
Powered by CookieYes Logo
Open toolbar

Accessibility Tools

  • Increase Text
  • Decrease Text
  • Grayscale
  • High Contrast
  • Negative Contrast
  • Light Background
  • Links Underline
  • Readable Font
  • Reset