Home Office Security

As remote working is on the rise again, it does make the home office more vulnerable. Even though there are many ways to prevent cyberattacks, from using multifactor authentication to encrypting your data, it is key that the relevant ‘best practices’ are considered for both the employer and employee.

Best practices for the employees

1.       Implement multifactor authentication

Multifactor authentication grants access to the device and all software after the employee provides more than one form of identification. 

2.       Use strong passwords

Physical devices aren’t your only concern. If a hacker tries to access any sensitive accounts, you want to make it as difficult as possible for them to log in. Using a password manager is a great precaution, as it ensures you are only using strong passwords, like those with special characters, numbers, upper and lowercase letters, etc.

3.       Invest in antivirus software

Your employer may provide a recommended application for a company-issued device, but if you use your personal laptop for work, you need to keep your system protected.

4.       Don’t allow family members to use your work devices

The computer you work on is only for you, it’s not the family computer. So, it is not advisable you allow your children to access your computer to play games on or watch movies.

5.       Follow company policies

Your company likely has clear policies for accessing the company network outside the office. Report any suspicious behaviour to IT immediately.

6.       Use a centralised, company-approved storage solution

This becomes especially important when you’re saving and backing up files. You should store all your work data in a secure location that’s both approved by and accessible to your company, like a cloud-based storage option.

Best practices for the employers 

  1. Improve employee security awareness through internal communication and training.
  2. Inform employees about the incident handling procedures and ensure their cooperation, as the risk is shifted outside the company.
  3. Require that employees use a non-stored password to connect to the network, especially for VPN access.
  4. Limit program/file access to only those areas that are absolutely needed by that employee.
  5. Reserve the right to terminate employee access at any moment.
  6. Provide services for remote file storage and other tasks; don’t rely on individuals to use their personal programs and accounts to store your company’s data.

Leading the company in these difficult times requires a clear action plan, backed by a good IT strategy. Rito-Technologies is an IT business partner who maximises business output through technology. They enable their clients to be secure with their IT Strategic Planning, which is guaranteed to increase your accessibility, productivity, and levels of communication with the right level of technology for business and potential customers.

For more information about our IT Strategic Planning or our cyber security planning, please get in touch with us at info@rito-tech.co.za and we will gladly assist you.

If you enjoyed reading this blog and would like to receive future blogs, please register here now.