Skip to main content

5 Tips for Enabling Secure Remote Work for Your Organization

By October 19, 2020August 16th, 2021Security
Remote work & collaboration

Remote work is booming this year, with a large portion of the workforce considering or attempting to work remotely for the first time. One of the alarming side effects of this that OXEN has seen is the deliberate weakening of security protocols to make remote work possible or easier for workers. Granting external access into your network and systems means circumventing or drilling a hole through security protections, even if it’s for good reasons.

Here we want to provide some basic tips for safely and securely enabling remote work.

1) Use and enforce strong passwords

This should go without saying now, but it’s more important than ever. Here are some quick tips on everyday password security practices. But in general, remember that longer, complex, and unique passwords are the best. Consider implementing a secure password manager like LastPass to help your employees develop and remember complex passwords.

2) Develop and enforce a remote access security & Network Access Policies.

These policies should define:

  • What types of remote access you permit
  • How permission is granted to devices
  • Levels of access and permission granted to users

Tiered levels of access will help you control who can access what, and on which devices. We have some more advice on best practices concerning BYOD in corporate networks here. Developing security and technology policies is also large undertaking, which a Shared CIO consultant can help you with.

3) Determine if your remote workers need VPN connections

VPNs are a hot topic right now, and you may find it’s the best way for your secure remote connections to your network. A VPN creates a private network from a public network connection. This means traffic and data is encrypted when transferred between a worker’s home office network and your corporate network. Not all users need this, but you should consider it for any workers needing sensitive data transfer.

What’s a VPN? And how do you know if you need one?

4) Require multi-factor authentication (MFA)

You should enable multi-factor authentication for all apps and services that support this security measure. MFA consist of three things that when combined verify someone’s identity. This is often summarized as “something you know, something you have, and something you are”.

MFA makes your current authentication procedures even stronger. And it can help against identity theft, brute force attacks, and phishing. Learn more about MFA, and why it’s important.

5) Secure all work devices against common threats

This means all devices: desktop and laptop computers, smartphones, and tablets. Install anti-virus and anti-malware solutions, or endpoint protection, which is more effective and better for mobile workers.

Make sure software and operating system updates and security patches are quickly and regularly applied. Viruses and ransomware aren’t the only threats – so are theft, loss, and social engineering. You need to be able to remotely manage these devices.

Looking for solutions to help you maintain and secure your devices? OXEN’s Essentials managed services bundle includes remote monitoring and maintenance, as well as endpoint security. You can learn more about the cybersecurity benefits of managed IT services here.

And That’s Not All…

Looking for more? October is National Cybersecurity Awareness Month, and there are many resources available for securing a remote workforce. You can find more resources at places like the Cyber Readiness Institute, the National Cybersecurity Alliance, and the Cybersecurity & Infrastructure Security Agency.


Recent Posts / View All Posts

social engineering tactics

How Hackers Use Social Engineering Tactics in Phishing Scams

| Business Productivity, Security | No Comments
Social engineering is quite a buzzword these days in the world of cybersecurity. But what is it, and why are businesses so afraid of it? It is a form of hacking that uses deception and manipulation to get victims to divulge information. Companies have reason to be fearful because social engineering tactics have led to a lot of destruction and millions of dollars in losses for businesses worldwide. Phishing is one of the most rampant types of attacks these days. It has been highly successful because it uses tried-and-tested social engineering techniques to hoodwink potential victims. What are these Social…
spot social engineering

Training Employees to Spot Social Engineering

| Security, Tech Tip | No Comments
Social engineering is one of the newest methods hackers use to access sensitive information. Rather than attacking a system directly, this technique relies on human psychology to gain information. This method is brilliant when you think about it because it does not have to deal with going past ironclad network security. If hackers can manipulate even a single employee, they might hand over sensitive information on a silver platter, and the hackers can take control of the organization’s entire system. This is why its important for your employees to learn how to spot social engineering. Companies must understand that if…
Phishing Scam Tactics

Top 8 Phishing Scam Tactics and How to Identify Them

| Business Productivity, Security, Tech Tip | No Comments
Phishing has been a common hacking method for over two decades now. You would think that everyone would already know how it works and how to avoid becoming a victim, right? Sadly, that is not the case for these Phishing Scam Tactics. There are more victims now than ever. In 2022, there were more than 300,000 victims in the US alone, with damages amounting to over $52 million! The thing is that phishing scams have evolved over the years. Hackers are now more adept at hoodwinking unsuspecting victims, and they also have easy access to modern technology that helps elevate…