Protecting Company Data From The Risks Of Remote Working

A recent Forbes Advisor survey showed that, of 1,100 respondents, 63% of worked remotely either all or some of the time. That's a major source of risk, both from external sources of attack but, more importantly, from careless erors and malicious actions from insiders. Here are nine key measure that every organisation should implemet to protect network integrity ansd stay cyber secure.

1. Provide company devices

Though it might seem obvious, providing company laptops and phones where possible allows a business to fully manage and secure the devices being used to access company data. Moreover, it is highly recommended that all your devices be updated and encrypted with SSL certificates.

If it is not possible to provide employees with devices, at the very least employers should ensure that workers have access to everything they need to secure their own devices, such as company-provided anti malware software.

2. Scan and penetration test applications

Penetration testing is one of the best ways to protect against data breaches as it simulates real-world attacks on systems, highlighting vulnerabilities that could otherwise be exploited by hackers.

It is especially critical to check for privilege escalation attacks, whereby an attacker will exploit vulnerabilities to access a system or application with limited privileges, and then elevate their access rights to access high-level, sensitive data.

Building defences against these attacks will ensure that even when a remote employee’s credentials are compromised, the access to critical applications is limited to the user’s primary role.

3. Use VPNs across the business

With data breaches costing businesses an average of £3.72 million in 2024, it is vital to invest in tools that can cover vulnerabilities.

As a defence against the risks that come with employees accessing work materials via unsafe home and public networks, all workers should be encouraged to use a virtual private network (VPN). This software is easy to implement and protects data that could otherwise be vulnerable to attacks over an open network.

4. Deploy a web application firewall

Alongside using a VPN to protect your connection and traffic, it is prudent to utilise a Web Application Firewall (WAF) to protect web applications from attacks.

Employers should deploy an AI/ML based WAF that detects anomalies and blocks illegitimate requests even if they are made through an employee’s credentials that were compromised.

5. Employ encryption software

Encryption software is able to provide some peace of mind when it comes to the data breach risks of remote working, as encrypting sensitive files means that even if someone were able to steal them, they would not be able to access the data or content.

Employers should create security policies that ensure all workers, especially remote workers, are aware of how to encrypt files and when it is necessary. Furthermore, routine checks can be done to ensure this is being followed.

6. Strict password management

Ensuring strong password management across the business is a key component in minimising the risk of data breaches, as research shows hackers rely on weak passwords when brute forcing PoS terminals.

This includes using automatic password generators to create safe and secure passwords, as well as ensuring that passwords are unique and never duplicated across multiple accounts. For sensitive data, employees should always implement multi-factor authentication (MFA), requiring users to provide multiple methods of verifying their identity.

7. Rigorous access controls

In order to control access to sensitive data and minimise the risk of a security breach, employers should apply the principle of least privilege when it comes to access control. This means only allowing users access to the specific assets that they require for their work.

Moreover, files should be removed when they are no longer needed and access should be revoked as soon as it is no longer necessary, such as when an employee leaves, or someone’s involvement in a project is over.

8. Provide employees with what they need

A major risk of remote working is that employees may implement tools, systems, or habits that are not sanctioned by the company in order to make their jobs easier. This could include using risky apps and tools, sending files via unsecure channels, or storing assets somewhere unprotected.

The most effective way to avoid this risk is to provide remote workers with all the tools they may need to do their job effectively and ensure that they are aware of all the approved platforms that they have access to.

It should be an integral part of security policies to approve web app purchases and free downloads, mitigating the risks that come with using a combination of open-source CMS and cloud-based apps.

9. Fully prepare and train remote workers

Employees can implement endless security strategies, but efforts will be futile unless remote workers fully understand what the procedures are and why they are important.

In 2023, over 352 million individuals were affected by data compromises, highlighting just how critical it is for organisations to provide employees with comprehensive training on what constitutes sensitive data and how they can protect it, as well as what is at stake if they don’t.

And training doesn’t have to be dull, for example setting up phishing email simulators to engage the team and allow them to see the potential dangers in action.

Regular training and guidance will ensure that remote workers are equipped to do everything they can to keep company data safe.

Forbes     |     Forbes     |     Palife     |     Statista

Image: Tima Miroshnichenko

You Might Also Read:

Enhancing SaaS Security: Leveraging VPNs & ITDR to Combat Identity Theft:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Attackers Can Use RAM To Steal Data From Air-Gapped Networks
Cyber Workforce Growth Slows As Tight Budgets Restrict Hiring »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Information Risk Management (IRM)

Information Risk Management (IRM)

IRM is an international consultancy dedicated to helping organisations solve key business issues. We provide strategic cyber security advice across a wide range of sectors.

Intercede

Intercede

Intercede is a cybersecurity company specializing in digital identities, derived credentials and access control, enabling digital trust in a mobile world.

AA Certification (AAC)

AA Certification (AAC)

AAC provide ISO Quality Management System certification services including ISO 27001.

Beachhead Solutions

Beachhead Solutions

Beachhead's SimplySecure is a configurable, web-based management tool allowing you to remotely secure vulnerable mobile devices in your organization.

Cambridge Intelligence

Cambridge Intelligence

Cambridge Intelligence are experts in network visualization and finding hidden trends in complex connected data. Applications include cybersecurity.

Telesoft Technologies

Telesoft Technologies

Telesoft Technologies is a global provider of cyber security, telecom and government infrastructure products and services.

NeuroChain

NeuroChain

NeuroChain is an intelligent ecosystem that is more secure, more reliable and much faster than blockchain.

Bessemer Venture Partners (BVP)

Bessemer Venture Partners (BVP)

Bessemer Venture Partners was born from innovations that literally forged modern building and manufacturing. Today, our team of investors works with people who want to create revolutions of their own.

Stamus Networks

Stamus Networks

Stamus Networks offers Scirius Security Platform solutions that marry real-time network traffic data with enhanced Suricata intrusion detection (IDS) and an advanced analytics engine.

BicDroid

BicDroid

BicDroid is a world leader in data and cyber security with innovative solutions that protect your data anywhere, anytime, against everything.

Sentinel

Sentinel

Sentinel works with governments, media and defence agencies to help protect democracies from disinformation campaigns by developing a state-of-the-art AI detection platform.

Sevco Security

Sevco Security

Sevco Delivers Real-time Asset Intelligence to Identify and Close Unknown Security Gaps.

LoughTec

LoughTec

LoughTec secure, manage and connect IT infrastructure for businesses and organisations throughout the UK and Republic of Ireland.

Cyber Octet

Cyber Octet

Cyber Octet is an IT Solution, Security, Training and Services company. We provide training and services from Web Application Security to ISO 27001 implementation.

IONIX

IONIX

IONIX (formerly Cyberpion) is the attack surface management solution that uses Connective Intelligence to shine a spotlight on exploitable risks across your supply chain.

ITRM

ITRM

ITRM are one of the UK’s top managed service providers and offer a range of award-winning IT solutions, from ad-hoc consultancy to cyber security.

Viatel Technology Group

Viatel Technology Group

Viatel Technology Group is a complete digital services provider. We have over 26 years’ experience delivering fully managed security, networking, cloud and communications services.