[Posted on Behalf of  Gabriel Friedlander Wizer - Free Security Awareness Training | Founder]
Like many others, you may have been caught off guard by the Coronavirus and your entire team is now required to work from home. I posted the following question on LinkedIn,

``What can companies do to address the risk of people using their personal computers and home networks to access sensitive data?”
Security Mindset
Before we begin, there are a few common beliefs that have to do more with mindset than technology.

Get up, it’s time to go to work
You are at home but you are actually at work, so don’t work from bed… find a place and make it your office. Let your family know that this is your office and it’s not to be shared with others while you are working. And remember, Starbucks is not your home… home is where you wake up every morning and not a public place. Make sure confidential information is not laying around and lock your computer when you are not next to it. Don’t email documents to your home printer or to your personal email just to make it easy to print.

Smile, you are on camera
Communication and collaboration is another big topic and technology will play a major role. You will probably need to over communicate using tools like Teams, Slack, or Zoom (so get out of your PJs…) and don’t use WhatsApp, Facebook, LinkedIn, or any other personal or social app to communicate. Only use the tools approved by your organization and apply even stricter security measures than for email (for example, don’t share passwords on Slack).

Polices, Procedures, and Awareness
Before we talk about technology, it’s important employees understand what is expected from them. Work with your HR/Training department on putting together a mini orientation on remote work.

Update your security policies
Time to refresh your BYOD and Remote Work policies. If you don’t have anything… create a list of the most critical security Policies/Rules and share it with all remote users. This is a great reason to revise your existing security policies and train your team.

Security awareness starts at home
Your manager is not sitting next to you anymore, so it‘s important now more than ever to refresh your security awareness training and reinforce some of the basic security rules, such as call over the phone and verify any request to share confidential data or transfer funds. In addition to standard training, also provide home security awareness, e.g. don't have work sensitive conversations near IOT devices like Siri, Alexa, or Google Home in case they're listening. Devices are not to be shared with other family members and they must have a unique password and a lock screen timeout. There are some great paid and free security awareness solution that include both business and home user training such as https://wizer-training.com (this is our solution...)

Now Let’s Talk Technology
Because this is a quick guide, I focused on the “quick wins” that organizations can achieve in a short amount of time with an affordable budget. Obviously there is much more that can be done depending on the budget and maturity of the organization (Monitoring, Logging, Network Segregation, Identity Management etc...), but I think this is a good starting point.

Provide an isolated environment to work from
Since you’re most likely unable to control remote worker devices, you’ll want to isolate work related activities from the home network as much as possible. If available, provide employees with company laptops that are hardened (VPN, endpoint security, patched and the items listed below). These devices should be used strictly for organizational work only. If this is cost prohibitive or too time consuming, then provide them with pre-configured Virtual Desktops. You can either have these virtual desktops run on their personal computers (assuming their hardware supports it…) or consider azure-based virtual desktops users can remotely connect to. In any case, avoid a solution where employees share a computer for both work and personal usage, and only use the Admin account when authorized and not for routine work.

Support Hotline - Non-technical people should not perform technical tasks; this could lead to even greater risk. So set up a hotline and make sure users know who to contact in the event of technical issues. Maybe it’s time to upgrade the ticketing system…

VPN - Set up a company VPN and require it to access the office network and resources. And make sure the firewall and infrastructure can handle all the "new" inbound traffic.

MFA - Many times MFA is enabled but not enforced, so make sure it is enforced for all users and apps. If hardware tokens are too expensive, use an Authentication App on a smartphone rather than 2FA (Text messages).

WiFi - Wifi must have WPA-2 security and don't publish your SSID / Wifi Name. Never use shared/public Wifi, and if possible avoid using Wifi all together and use a wired network. Also create a guest network to separate your work computer from all other devices. Some routers have this functionality built-in or purchase an additional router just for work.

Complex Passwords - Do not under any circumstances save your passwords to your browser. Use long and complex pass-phases and don’t reuse them. Use a unique password for your Wifi, Apps, Router, etc...

Safe Browser - It’s advised to use a secure browser like Brave Browser, which is also faster.

Keep your device updated - Apply the latest security patches (OS and Apps) and avoid outdated Operating Systems like Windows 7 or XP across both Virtual Desktops and Personal computers. Keep only apps that were approved by the organization (uninstall all others) and turn on Automatic updates.

Endpoint protection - Use a NextGen anti-virus solution on all remote devices.

Firewall - Make sure the built-in firewall is properly configured and always enabled on remote devices.

Backup - Direct users how and where to backup their data, don’t rely on them to come up with a solution. Preferably an encrypted offline back up.

Encryption - Encrypt files stored on devices. Many options exist for protecting files including encrypting individual files or folders, volumes, and hard drives, and avoid using removable devices such as USB sticks.
E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform