Guest blog: Top Five Remote Working Security Tips 

Many of today’s public sector workers need access to data and applications wherever they are. Follow these five remote working security tips to ensure they don’t pose a security risk when they’re working outside of your organisation’s network. 

Technology is transforming the ways in which public sector organisations deliver services to the communities they support. Many public sector workers, across a broad spectrum of departments, are utilising disruptive technology to improve citizen engagement, and IT departments are actively seeking to establish the stable foundations that will allow them to adopt the latest transformative technologies. 

Remote working technology may not be the newest or the most exciting development in modern IT, but it is continually evolving and it remains a key enabler for public sector organisations when it comes to empowering their workers to operate in the most productive and collaborative manner. The likes of Citrix and VMware are continually evolving their offerings, and it is incumbent upon public sector organisations to assess their remote working security in line with the latest developments. 

Modern security threats come in many forms, from the malicious to the innocent and unintended. And with today’s stringent regulations threatening huge penalties for data breaches, now is the time to take remote working security seriously. In this blog post we’ll take you through our top five remote working security tips. 

Top Five Remote Working Security Tips 

Remote working introduces another dimension of security threat to your organisation. Your physical and system security may be robust and well-established at your headquarters, but the same can’t always be said for a busy commuter train, a coffee franchise, or your board members’ homes. 

The following five remote working security tips will help you to implement security best practices for all users who access your systems, regardless of their location: 

  • Keep your equipment safe. Your laptop, smartphone and tablet devices are all targets for criminals. If you’re working in a public space, never leave your equipment unattended. And be aware of shoulder surfers, who may be looking at confidential information that is displayed on your screen. 

  • Create a strong password. You’ll need a strong password to ensure that – if the worst happens and your equipment is stolen – criminals won’t be able to login to your profile. Strong passwords are at least eight characters long, contain uppercase letters, lowercase letters, numbers and special characters, and are changed on a regular basis. 

  • Be wary of public Wi-Fi. Unsecured public Wi-Fi services – such as those offered by coffee shops and transport providers – can present a security risk, as data transmitted through public Wi-Fi can be intercepted. Consider using your mobile phone network rather than a public Wi-Fi service. 

  • Use a secure remote access method. A VPN tunnel from your laptop to your email, file and application servers can create a backdoor for hackers to gain access to your infrastructure. Consider using a secure remote access method like Microsoft RD Web or Citrix XenApp, both of which are inherently more secure than standard VPN tunnels and also offer great management and functionality. 

  • Implement antivirus, email security and web security. Your servers and office desktops are protected by endpoint antivirus, email security and web security. What about your laptops and other devices outside the office environment? Whether you’re in the office or working remotely, you should maintain the same high security standards at all times. 

Remote Working Security Training 

Training your users in remote working security best practices is essential to protecting your organisation. Security aware users are your first line of defence against data breach or cyber-attack, and today’s public sector organisations need to promote a strong security culture throughout their staff. 

Six Degrees deliver Security Awareness Training as part of our range of offensive and defensive security services. Our Security Awareness Training service teaches users how to follow best practices and spot cyber-threats before they damage your business. Contact us if you’d like to learn more. 

Join the conversation on #procuring4growth @techUK

Share this

FROM SOCIAL MEDIA

As part of our #ConnectandProtect campaign month, Gareth Jones, VP of Intellectual Property at @benevolent_ai expla… https://t.co/KgToy71eOj
On Thursday 04 June, @BSG_Team launches its latest report "Moving to a fibre-enabled UK: International experiences… https://t.co/xJg61CEPIV
A better-connected system: Will apps change the way the #NHS operates? @CivicaUK's Steve Brain explores how the pan… https://t.co/Ofoc9cyBfK
At #COGX2020 #techUK will be chairing "The power of #supercomputing- How do we get the UK strategy right?" Hear fro… https://t.co/NUi7bsPxeG
Learn useful tips from @MicrosoftUK to help you stay motivated and avoid video conferencing fatigue whilst #WFH du… https://t.co/ic3YgCNhsX
If you operate in digital trade & tech exports, join us on 5 June to hear from UK Export Finance on their current b… https://t.co/n4SvBaZXzE
Our increasing reliance on digital platforms shows that, more than ever, it's time for an inclusive revolution.… https://t.co/uI3ZUkAspf
What's the business case for private network investment? Understand the trials and triumphs in deployments and the… https://t.co/6gxzdqnHfT
Did you know techUK were partnering with @cognition_x at #CogX2020 to run five panels as part of the Next Gen Infra… https://t.co/2KAv3asmMZ
techUK Cyber's Zero Trust Working Group launches tomorrow. If you'd like to be part of the discussion on all things… https://t.co/7p4kEGLZQC
Become a Member
×

Become a techUK Member

By becoming a techUK member we will help you grow through:

Click here to learn more...