Many of today’s public sector workers need access to data and applications wherever they are. Follow these five remote working security tips to ensure they don’t pose a security risk when they’re working outside of your organisation’s network.
Technology is transforming the ways in which public sector organisations deliver services to the communities they support. Many public sector workers, across a broad spectrum of departments, are utilising disruptive technology to improve citizen engagement, and IT departments are actively seeking to establish the stable foundations that will allow them to adopt the latest transformative technologies.
Remote working technology may not be the newest or the most exciting development in modern IT, but it is continually evolving and it remains a key enabler for public sector organisations when it comes to empowering their workers to operate in the most productive and collaborative manner. The likes of Citrix and VMware are continually evolving their offerings, and it is incumbent upon public sector organisations to assess their remote working security in line with the latest developments.
Modern security threats come in many forms, from the malicious to the innocent and unintended. And with today’s stringent regulations threatening huge penalties for data breaches, now is the time to take remote working security seriously. In this blog post we’ll take you through our top five remote working security tips.
Top Five Remote Working Security Tips
Remote working introduces another dimension of security threat to your organisation. Your physical and system security may be robust and well-established at your headquarters, but the same can’t always be said for a busy commuter train, a coffee franchise, or your board members’ homes.
The following five remote working security tips will help you to implement security best practices for all users who access your systems, regardless of their location:
Keep your equipment safe. Your laptop, smartphone and tablet devices are all targets for criminals. If you’re working in a public space, never leave your equipment unattended. And be aware of shoulder surfers, who may be looking at confidential information that is displayed on your screen.
Create a strong password. You’ll need a strong password to ensure that – if the worst happens and your equipment is stolen – criminals won’t be able to login to your profile. Strong passwords are at least eight characters long, contain uppercase letters, lowercase letters, numbers and special characters, and are changed on a regular basis.
Be wary of public Wi-Fi. Unsecured public Wi-Fi services – such as those offered by coffee shops and transport providers – can present a security risk, as data transmitted through public Wi-Fi can be intercepted. Consider using your mobile phone network rather than a public Wi-Fi service.
Use a secure remote access method. A VPN tunnel from your laptop to your email, file and application servers can create a backdoor for hackers to gain access to your infrastructure. Consider using a secure remote access method like Microsoft RD Web or Citrix XenApp, both of which are inherently more secure than standard VPN tunnels and also offer great management and functionality.
Implement antivirus, email security and web security. Your servers and office desktops are protected by endpoint antivirus, email security and web security. What about your laptops and other devices outside the office environment? Whether you’re in the office or working remotely, you should maintain the same high security standards at all times.
Remote Working Security Training
Training your users in remote working security best practices is essential to protecting your organisation. Security aware users are your first line of defence against data breach or cyber-attack, and today’s public sector organisations need to promote a strong security culture throughout their staff.
Six Degrees deliver Security Awareness Training as part of our range of offensive and defensive security services. Our Security Awareness Training service teaches users how to follow best practices and spot cyber-threats before they damage your business. Contact us if you’d like to learn more.
Join the conversation on #procuring4growth @techUK