Submit Search
Upload
Checklist to reduce security risk for your remote workers
•
0 likes
•
20 views
P
Peter Hagen
Follow
Grab this free checklist to reduce security risk for your remote workers
Read less
Read more
Business
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
10 Components of Business Cyber Security
10 Components of Business Cyber Security
Comodo SSL Store
Security Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by Pedraza
Atlantic Training, LLC.
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
Nordic Backup
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Enterprise Management Associates
End-User Security Awareness
End-User Security Awareness
Surya Bathulapalli
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Heimdal Security
Isa Prog Need L
Isa Prog Need L
R_Yanus
Small Business Cyber Security Checklist
Small Business Cyber Security Checklist
Gabriel Friedlander
Recommended
10 Components of Business Cyber Security
10 Components of Business Cyber Security
Comodo SSL Store
Security Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by Pedraza
Atlantic Training, LLC.
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
Nordic Backup
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Enterprise Management Associates
End-User Security Awareness
End-User Security Awareness
Surya Bathulapalli
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Heimdal Security
Isa Prog Need L
Isa Prog Need L
R_Yanus
Small Business Cyber Security Checklist
Small Business Cyber Security Checklist
Gabriel Friedlander
ICT and end user security awareness slides
ICT and end user security awareness slides
jubke
Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security
Penntech IT Solutions
Cybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation Slides
SlideTeam
Tips to remove malwares
Tips to remove malwares
anthnyq
User security awareness
User security awareness
K. A. M Lutfullah
SECURITY AWARENESS
SECURITY AWARENESS
Felix Jumamoy
Disaster Proofing Your Computer Systems
Disaster Proofing Your Computer Systems
andrewcahill
Information security for small business
Information security for small business
BDPA Charlotte - Information Technology Thought Leaders
Mobile Device Security
Mobile Device Security
Torian Group
Physical security.ppt
Physical security.ppt
Faheem Ul Hasan
Reasons you may be at risk
Reasons you may be at risk
AngelaMcAdoo
Infosec IQ - Anti-Phishing & Security Awareness Training
Infosec IQ - Anti-Phishing & Security Awareness Training
David Alderman
Managing IT Security
Managing IT Security
Ajay Jassi
Do not run business without protection!
Do not run business without protection!
Thomas Miller
Smartphone security
Smartphone security
Muthu Kumar
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and Privacy
Jan Wong
Cybersecurity tips for employees
Cybersecurity tips for employees
Priscila Bernardes
Security Breaches from Compromised User Logins
Security Breaches from Compromised User Logins
IS Decisions
Working from home- How secure is it.pdf
Working from home- How secure is it.pdf
Fiyona Nourin
Document safer online for nonprofits guide
Document safer online for nonprofits guide
Nguyen Xuan Quang
Student NameCYB110Playbook Runbook Parts 1-3S.docx
Student NameCYB110Playbook Runbook Parts 1-3S.docx
deanmtaylor1545
Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
More Related Content
What's hot
ICT and end user security awareness slides
ICT and end user security awareness slides
jubke
Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security
Penntech IT Solutions
Cybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation Slides
SlideTeam
Tips to remove malwares
Tips to remove malwares
anthnyq
User security awareness
User security awareness
K. A. M Lutfullah
SECURITY AWARENESS
SECURITY AWARENESS
Felix Jumamoy
Disaster Proofing Your Computer Systems
Disaster Proofing Your Computer Systems
andrewcahill
Information security for small business
Information security for small business
BDPA Charlotte - Information Technology Thought Leaders
Mobile Device Security
Mobile Device Security
Torian Group
Physical security.ppt
Physical security.ppt
Faheem Ul Hasan
Reasons you may be at risk
Reasons you may be at risk
AngelaMcAdoo
Infosec IQ - Anti-Phishing & Security Awareness Training
Infosec IQ - Anti-Phishing & Security Awareness Training
David Alderman
Managing IT Security
Managing IT Security
Ajay Jassi
Do not run business without protection!
Do not run business without protection!
Thomas Miller
Smartphone security
Smartphone security
Muthu Kumar
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and Privacy
Jan Wong
Cybersecurity tips for employees
Cybersecurity tips for employees
Priscila Bernardes
Security Breaches from Compromised User Logins
Security Breaches from Compromised User Logins
IS Decisions
What's hot
(18)
ICT and end user security awareness slides
ICT and end user security awareness slides
Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security
Cybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation Slides
Tips to remove malwares
Tips to remove malwares
User security awareness
User security awareness
SECURITY AWARENESS
SECURITY AWARENESS
Disaster Proofing Your Computer Systems
Disaster Proofing Your Computer Systems
Information security for small business
Information security for small business
Mobile Device Security
Mobile Device Security
Physical security.ppt
Physical security.ppt
Reasons you may be at risk
Reasons you may be at risk
Infosec IQ - Anti-Phishing & Security Awareness Training
Infosec IQ - Anti-Phishing & Security Awareness Training
Managing IT Security
Managing IT Security
Do not run business without protection!
Do not run business without protection!
Smartphone security
Smartphone security
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and Privacy
Cybersecurity tips for employees
Cybersecurity tips for employees
Security Breaches from Compromised User Logins
Security Breaches from Compromised User Logins
Similar to Checklist to reduce security risk for your remote workers
Working from home- How secure is it.pdf
Working from home- How secure is it.pdf
Fiyona Nourin
Document safer online for nonprofits guide
Document safer online for nonprofits guide
Nguyen Xuan Quang
Student NameCYB110Playbook Runbook Parts 1-3S.docx
Student NameCYB110Playbook Runbook Parts 1-3S.docx
deanmtaylor1545
Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
How to Ensure Complete Data Protection at Work?
How to Ensure Complete Data Protection at Work?
XNSPY
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
WeSecureApp
Secure End User
Secure End User
Muhammad Salahuddien
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
MTG IT Professionals
08 pdf show-239
08 pdf show-239
#TheFraudTube
Are you the next target?
Are you the next target?
Strategic Insurance Software
How Can You Maintain Data Privacy in the Cloud.pdf
How Can You Maintain Data Privacy in the Cloud.pdf
Jose thomas
Cyber pledge infoMagnum
Cyber pledge infoMagnum
ARUN REDDY M
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
Atlantic Training, LLC.
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
Ajay Jassi
Employee Security Awareness Training
Employee Security Awareness Training
Denis kisina
Cyber Security
Cyber Security
Adeel Younas
Protecting Personal Information A Guide for Businesses Small Bu.docx
Protecting Personal Information A Guide for Businesses Small Bu.docx
briancrawford30935
Information security awareness - 101
Information security awareness - 101
mateenzero
CTM360 Advisory: Remote Work Guidelines
CTM360 Advisory: Remote Work Guidelines
CTM360
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19
Dharmendra Rama
Similar to Checklist to reduce security risk for your remote workers
(20)
Working from home- How secure is it.pdf
Working from home- How secure is it.pdf
Document safer online for nonprofits guide
Document safer online for nonprofits guide
Student NameCYB110Playbook Runbook Parts 1-3S.docx
Student NameCYB110Playbook Runbook Parts 1-3S.docx
Employee Security Training[1]@
Employee Security Training[1]@
How to Ensure Complete Data Protection at Work?
How to Ensure Complete Data Protection at Work?
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
Secure End User
Secure End User
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
08 pdf show-239
08 pdf show-239
Are you the next target?
Are you the next target?
How Can You Maintain Data Privacy in the Cloud.pdf
How Can You Maintain Data Privacy in the Cloud.pdf
Cyber pledge infoMagnum
Cyber pledge infoMagnum
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
Employee Security Awareness Training
Employee Security Awareness Training
Cyber Security
Cyber Security
Protecting Personal Information A Guide for Businesses Small Bu.docx
Protecting Personal Information A Guide for Businesses Small Bu.docx
Information security awareness - 101
Information security awareness - 101
CTM360 Advisory: Remote Work Guidelines
CTM360 Advisory: Remote Work Guidelines
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19
Recently uploaded
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
anilsa9823
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
noida100girls
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
ankitnayak356677
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
noida100girls
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
IlamathiKannappan
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
lizamodels9
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
Newman George Leech
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
pollardmorgan
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Tina Ji
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
KeppelCorporation
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
christinemoorman
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
lizamodels9
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
Recruitment Process Outsourcing Association
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Apsara Of India
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Dipal Arora
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Dipal Arora
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
Neil Kimberley
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
Ravindra Nath Shukla
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
lizamodels9
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
lizamodels9
Recently uploaded
(20)
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Checklist to reduce security risk for your remote workers
1.
Checklist: How to
Reduce Security Risks for Your Remote Workers Cybersecurity Ensure laptops/devices have hardware encryption. Make 2 factor authentication (2FA) mandatory for all remote workers, including email and when accessing any critical systems and applications. Where possible, ask that screen filters are used to make shoulder-surfing harder. Encourage staff to use password managers. Ask staff NOT to defer critical updates to software. Staff must not visit sites like illegal movie websites as they pose a risk of ransomware and malware infection. Remind staff that surfing explicit sites, amongst other things, is illegal. Remind staff NOT to lend their machines to their children or other members of the family. Privileged Users Ensure you inform all IT & business privileged users and: Remind them of their responsibilities. Insist that they DO NOT log DAILY tasks with high privileges. Remind staff that it´s ok to make a mistake and that they should own up if they have: Accidentally clicked on a suspicious file or link. Identified a malware/ransomware infection and should report it immediately. 1 © SoftwareONE | Security Checklist for IT Admins Stress the IMPORTANCE of NOT sharing passwords (remote working can lead to more password sharing). Demand that they REPORT all errors/confess to mistakes immediately. Phishing Emails Opened a suspicious PDF or Word, excel file with macro. Remote working can provide a significant advantage for your company and employees but there are risks. In order to ensure the security of your company, its data, and and that of your employees, you need to lay a solid foundation. This checklist helps you to improve security for all of your remote workers.
2.
Checklist: How to
Reduce Security Risks for Your Remote Workers Online Meetings & Calls Remind staff to MUTE the microphone when they are not speaking in a conference call. Remind the staff NOT to leave their machines UNLOCKED, especially during a call or when taking a break. Educate all staff to ensure webcams are blocked by default. Ask staff NOT to work from coffee shops or public places (if possible) – especially if they are on confidential calls or working on confidential documents. Expectations If you don’t have one yet, create an exceptions register. Where possible, have a “No way this is an exception” list. Create a review by date and put multiple calendar reminders for you/your team to review them. Cyber Attack & Incident Response Constantly remind staff to be alert for phishing emails and other attempts to compromise/steal account details. Staff must report these emails and malicious activity. Encourage staff to reach out to the IT team if necessary. Ask IT and security staff (including outsourcers) to pick up the phone and call if it‘s important rather than solely relying on email. Use a separate out-of-band app or something as simple (not very secure) as WhatsApp groups for urgent communications. Keep a printed copy of your procedures and checklists at home AND make sure they are not easily accessible. Remind all staff that it‘s ok to make mistakes (like sending emails to wrong recipients, clicking on a malicious link, causing an outage etc.) and that they MUST own up immediately. Stress that in most cases there will be NO repercussions Security staff must be extra vigilant and actively seek out suspicious activity ( given the remote working habits of users this may be operationally expensive). Privacy Remind all staff of their responsibility to respect the privacy of your clients and your staff. Staff must be reminded NOT to email personal information via email OR store personal information in non-approved locations. Remind IT and cybersecurity folks to be extra vigilant for possible malicious activities on user accounts. Staff members might exchange personal phone numbers or email addresses. Avoid this if possible, or add a note to delete the information after use. 2 © SoftwareONE | Security Checklist for IT Admins
3.
Checklist: How to
Reduce Security Risks for Your Remote Workers Backup Provide staff software to ensure their critical documents are backed up. Ask staff to back up their data on an approved external hard disk that is NOT permanently connected to the device. Ask staff NOT to use external cloud storage services. Ask staff to reach out to discuss any cloud storage or cloud service solution that they want to use. Disclaimer - The information provided in this advisory is provided “as is” without warranty of any kind. The use of this information is totally the responsibility of the user and SoftwareONE disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall SoftwareONE or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, claims arising out of negligence and/or misuse, loss of reputation, loss of business profits or special damages, even if SoftwareONE or its suppliers have been advised of the possibility of such damages. Copyright © 2020 by SoftwareONE AG. All Rights Reserved. SoftwareONE is a registered trademark of SoftwareONE AG. All other trademarks, service marks or trade names appearing herein are the property of their respective owners. The content has been compiled with meticulous care and to the best of our knowledge. However, SoftwareONE cannot assume any liability for the up-to-dateness, completeness or accuracy. Photo © Adobe Stock How can we help you? Get in touch to find out more about how to plan your Future Workplace! SoftwareONE AG Find us online at: https://www.softwareone.com/en/topics/ future-workplace If you’re unsure of where to begin, consider the advice of our Security experts. When you partner with SoftwareONE, you’ll know exactly where your risks are and how to protect your assets. We’ll work with you to stay ahead of potential threats so you can tailor your work from home strategy to your specific business needs and better articulate to your team members what exactly needs to happen moving forward. Having said this we invite you to have a look at our additional Work from Home resources. Keen to learn more? Security Checklist for Remote Workers Monthly Cybersecurity Updates Future Workplace Content Hub Source: Cyber Management Alliance, 2020
Download now