Security In Remote Working

D.R CHIBS
CodeLn
Published in
4 min readJul 16, 2020
Security In Remote Working

2020 has seen many corporates, businesses, and start-ups go from working remotely as a matter of convenience to a necessity. This might not be a bad thing as a survey by PGi showed that 82% of employees who work from home are less stressed and even more productive, it is quite evident that the global work culture will change massively. Although remote work comes with its unique challenges, some of them which we discussed here, the good news is that there are tools that help to effectively manage your remote team. One very important thing to understand is that there are some security risks to manage as work generally becomes more casual, collaborative, and even comfortable. Some malicious individuals that might be seeking access to your company’s data, it becomes your obligation to ensure your data is safe and secure.

82% of employees who work from home are less stressed and even more productive.

In this article, we will be throwing some light into security in remote working. Two days ago, the bank software of Universal Bank in Ghana was hacked and over 7 million dollars was stolen. Yesterday, Dozens of high-profile Twitter accounts were hacked including Joe Biden, Barack Obama, Elon Musk, and Bill Gates. The attacker used their accounts to push a cryptocurrency scam that may have netted upwards of $100,000 in a matter of minutes. So before you say “this is not for me”, remember that big multinational companies like Google, Uber, Facebook, etc have once been hacked so anyone can be a victim.

Find below some essential security tips that we recommend you incorporate before you get comfortable with setting up and managing a remote team, please note that your chosen option may differ based on the size and data-sensitive nature of your company.

Cloud Storage

It is advisable to use secure cloud storage for file and content sharing. We do not encourage sharing and transfer of company data using flash drives or similar devices, these devices are the most common way of introducing malware into a computer. Some companies have their IT department remove this functionality from official laptops handed down to team members. You should also lock down all ports — no USB (on company-issued laptops). Google’s enterprise solutions give you the privilege to delete or lock any sensitive data should it fall into the wrong hands.

Communication and Collaboration

For best security, use corporate services for email and sensitive messaging. Depending on the data-sensitive nature of your business, you can use products from very trusted firms e.g Microsoft Teams, Slack, Outlook, One Note, SharePoint, Office 365, etc Here is an unpopular opinion: Whatsapp shouldn’t be your go-to for communication and file-sharing — use corporate tools, especially for emails, you should encrypt all important emails that are sent and received by the team.

Password Encryption

You should never distribute passwords unencrypted via emails or any other platform. You can choose to invest in a paid industry-standard password protection service like 1password or lastpass. With these services, you can simply share individual passwords with team members and they don’t ever see the actual password. Very important to note is to change passwords regularly and it is advisable to use 2FA (2 Factor Authentication) for login, this makes sure that not just passwords but OTPs sent to your device can be used to verify your identity.

Virtual Private Networks

You can choose to invest in a VPN (not the free ones) but a good one like NordVPN. Any connections made to the company can be performed through a VPN (Virtual Private Network). A VPN encrypts data in transfer, allowing personal and confidential data to tunnel from one device to the next, away from prying eyes. Basically, VPNs make you a ghost online.

WiFis

No public wifi should be allowed into your network. It is even safer to ask your team to use personal hotspots and to use strong internet passwords, this reduces risk greatly.

Make Policies

Develop a corporate policy around security and company data transfer. This policy should outline what is acceptable in the form of remote access, how data is handled, what level of authorizations are available, what devices or gadgets can be used, what questionable websites should be avoided while working on company data, and with company gadgets. All teammates should have updated Antiviruses, firewalls, VPNs, etc.

For more insights, watch a TV interview with our CEO, Elohor Thomas here as she threw some light on the topic of Cybercrime in the Society. Chances are you’re thinking of setting up a remote tech team or already have one, there is always room for improvement which is why you should know that it only takes a fraction of your time to put together a diverse talented tech team if you know where to look. Contact us at Codeln to help setup your remote workforce.

NordVPN Teams Google Cloud Office 365 Slack API

--

--