SlideShare a Scribd company logo
1 of 3
Download to read offline
Checklist: How to Reduce Security
Risks for Your Remote Workers
Cybersecurity
Ensure laptops/devices have hardware
encryption.
Make 2 factor authentication (2FA) mandatory
for all remote workers, including email and
when accessing any critical systems and
applications.
Where possible, ask that screen filters are used
to make shoulder-surfing harder.
Encourage staff to use password managers.
Ask staff NOT to defer critical updates to
software.
Staff must not visit sites like illegal movie
websites as they pose a risk of ransomware
and malware infection.
Remind staff that surfing explicit sites,
amongst other things, is illegal.
Remind staff NOT to lend their machines to
their children or other members of the family.
Privileged Users
Ensure you inform all IT & business privileged users
and:
Remind them of their responsibilities.
Insist that they DO NOT log DAILY tasks with
high privileges.
Remind staff that it´s ok to make a mistake
and that they should own up if they have:
Accidentally clicked on a suspicious file
or link.
Identified a malware/ransomware infection and
should report it immediately.
1
© SoftwareONE | Security Checklist for IT Admins
Stress the IMPORTANCE of NOT sharing
passwords (remote working can lead to more
password sharing).
Demand that they REPORT all errors/confess to
mistakes immediately.
Phishing Emails
Opened a suspicious PDF or Word, excel
file with macro.
Remote working can provide a significant
advantage for your company and employees but
there are risks. In order to ensure the security
of your company, its data, and and that of your
employees, you need to lay a solid foundation.
This checklist helps you to improve security for all
of your remote workers.
Checklist: How to Reduce Security Risks for Your
Remote Workers
Online Meetings & Calls
Remind staff to MUTE the microphone when
they are not speaking in a conference call.
Remind the staff NOT to leave their machines
UNLOCKED, especially during a call or when
taking a break.
Educate all staff to ensure webcams are
blocked by default.
Ask staff NOT to work from coffee shops or
public places (if possible) – especially if they are
on confidential calls or working on confidential
documents.
Expectations
If you don’t have one yet, create an exceptions
register.
Where possible, have a “No way this is an
exception” list.
Create a review by date and put multiple
calendar reminders for you/your team to review
them.
Cyber Attack & Incident Response
Constantly remind staff to be alert for phishing
emails and other attempts to compromise/steal
account details.
Staff must report these emails and malicious
activity.
Encourage staff to reach out to the IT team if
necessary.
Ask IT and security staff (including outsourcers)
to pick up the phone and call if it‘s important
rather than solely relying on email. Use a
separate out-of-band app or something as
simple (not very secure) as WhatsApp groups
for urgent communications.
Keep a printed copy of your procedures and
checklists at home AND make sure they are not
easily accessible.
Remind all staff that it‘s ok to make mistakes
(like sending emails to wrong recipients,
clicking on a malicious link, causing an outage
etc.) and that they MUST own up immediately.
Stress that in most cases there will be NO
repercussions
Security staff must be extra vigilant and
actively seek out suspicious activity ( given the
remote working habits of users this may be
operationally expensive).
Privacy
Remind all staff of their responsibility to respect
the privacy of your clients and your staff.
Staff must be reminded NOT to email personal
information via email OR store personal
information in non-approved locations.
Remind IT and cybersecurity folks to be extra
vigilant for possible malicious activities on user
accounts.
Staff members might exchange personal
phone numbers or email addresses. Avoid
this if possible, or add a note to delete the
information after use.
2
© SoftwareONE | Security Checklist for IT Admins
Checklist: How to Reduce Security Risks for Your
Remote Workers
Backup
Provide staff software to ensure their critical
documents are backed up.
Ask staff to back up their data on an approved
external hard disk that is NOT permanently
connected to the device.
Ask staff NOT to use external cloud storage
services.
Ask staff to reach out to discuss any cloud
storage or cloud service solution that they want
to use.
Disclaimer - The information provided in this advisory is provided “as is” without warranty of any kind. The use of this information is totally the responsibility of the user
and SoftwareONE disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall
SoftwareONE or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, claims arising out of negligence and/or misuse,
loss of reputation, loss of business profits or special damages, even if SoftwareONE or its suppliers have been advised of the possibility of such damages.
Copyright © 2020 by SoftwareONE AG. All Rights Reserved. SoftwareONE is a registered trademark of SoftwareONE AG. All other trademarks, service marks or trade
names appearing herein are the property of their respective owners. The content has been compiled with meticulous care and to the best of our knowledge. However,
SoftwareONE cannot assume any liability for the up-to-dateness, completeness or accuracy. Photo © Adobe Stock
How can we help you?
Get in touch to find out more about how
to plan your Future Workplace!
SoftwareONE AG
Find us online at:
https://www.softwareone.com/en/topics/
future-workplace
If you’re unsure of where to begin, consider the
advice of our Security experts. When you partner with
SoftwareONE, you’ll know exactly where your risks are
and how to protect your assets. We’ll work with you to
stay ahead of potential threats so you can tailor your
work from home strategy to your specific business
needs and better articulate to your team members
what exactly needs to happen moving forward.
Having said this we invite you to have a look at our
additional Work from Home resources.
Keen to learn more?
Security Checklist for Remote Workers
Monthly Cybersecurity Updates
Future Workplace Content Hub
Source: Cyber Management Alliance, 2020

More Related Content

What's hot

ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slidesjubke
 
Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security Penntech IT Solutions
 
Cybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesCybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesSlideTeam
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwaresanthnyq
 
Disaster Proofing Your Computer Systems
Disaster Proofing Your Computer SystemsDisaster Proofing Your Computer Systems
Disaster Proofing Your Computer Systemsandrewcahill
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityTorian Group
 
Reasons you may be at risk
Reasons you may be at riskReasons you may be at risk
Reasons you may be at riskAngelaMcAdoo
 
Infosec IQ - Anti-Phishing & Security Awareness Training
Infosec IQ - Anti-Phishing & Security Awareness TrainingInfosec IQ - Anti-Phishing & Security Awareness Training
Infosec IQ - Anti-Phishing & Security Awareness TrainingDavid Alderman
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT SecurityAjay Jassi
 
Do not run business without protection!
Do not run business without protection!Do not run business without protection!
Do not run business without protection!Thomas Miller
 
Smartphone security
Smartphone securitySmartphone security
Smartphone securityMuthu Kumar
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyJan Wong
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employeesPriscila Bernardes
 
Security Breaches from Compromised User Logins
Security Breaches from Compromised User LoginsSecurity Breaches from Compromised User Logins
Security Breaches from Compromised User LoginsIS Decisions
 

What's hot (18)

ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security
 
Cybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesCybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation Slides
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
SECURITY AWARENESS
SECURITY AWARENESSSECURITY AWARENESS
SECURITY AWARENESS
 
Disaster Proofing Your Computer Systems
Disaster Proofing Your Computer SystemsDisaster Proofing Your Computer Systems
Disaster Proofing Your Computer Systems
 
Information security for small business
Information security for small businessInformation security for small business
Information security for small business
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Reasons you may be at risk
Reasons you may be at riskReasons you may be at risk
Reasons you may be at risk
 
Infosec IQ - Anti-Phishing & Security Awareness Training
Infosec IQ - Anti-Phishing & Security Awareness TrainingInfosec IQ - Anti-Phishing & Security Awareness Training
Infosec IQ - Anti-Phishing & Security Awareness Training
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT Security
 
Do not run business without protection!
Do not run business without protection!Do not run business without protection!
Do not run business without protection!
 
Smartphone security
Smartphone securitySmartphone security
Smartphone security
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and Privacy
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
Security Breaches from Compromised User Logins
Security Breaches from Compromised User LoginsSecurity Breaches from Compromised User Logins
Security Breaches from Compromised User Logins
 

Similar to Checklist to reduce security risk for your remote workers

Working from home- How secure is it.pdf
Working from home- How secure is it.pdfWorking from home- How secure is it.pdf
Working from home- How secure is it.pdfFiyona Nourin
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guideNguyen Xuan Quang
 
Student NameCYB110Playbook Runbook Parts 1-3S.docx
Student NameCYB110Playbook  Runbook Parts 1-3S.docxStudent NameCYB110Playbook  Runbook Parts 1-3S.docx
Student NameCYB110Playbook Runbook Parts 1-3S.docxdeanmtaylor1545
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
How to Ensure Complete Data Protection at Work?
How to Ensure Complete Data Protection at Work?How to Ensure Complete Data Protection at Work?
How to Ensure Complete Data Protection at Work?XNSPY
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight BackMTG IT Professionals
 
How Can You Maintain Data Privacy in the Cloud.pdf
How Can You Maintain Data Privacy in the Cloud.pdfHow Can You Maintain Data Privacy in the Cloud.pdf
How Can You Maintain Data Privacy in the Cloud.pdfJose thomas
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnumARUN REDDY M
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Ajay Jassi
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
Protecting Personal Information A Guide for Businesses Small Bu.docx
Protecting Personal Information A Guide for Businesses Small Bu.docxProtecting Personal Information A Guide for Businesses Small Bu.docx
Protecting Personal Information A Guide for Businesses Small Bu.docxbriancrawford30935
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
CTM360 Advisory: Remote Work Guidelines
CTM360 Advisory: Remote Work GuidelinesCTM360 Advisory: Remote Work Guidelines
CTM360 Advisory: Remote Work GuidelinesCTM360
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19Dharmendra Rama
 

Similar to Checklist to reduce security risk for your remote workers (20)

Working from home- How secure is it.pdf
Working from home- How secure is it.pdfWorking from home- How secure is it.pdf
Working from home- How secure is it.pdf
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Student NameCYB110Playbook Runbook Parts 1-3S.docx
Student NameCYB110Playbook  Runbook Parts 1-3S.docxStudent NameCYB110Playbook  Runbook Parts 1-3S.docx
Student NameCYB110Playbook Runbook Parts 1-3S.docx
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
How to Ensure Complete Data Protection at Work?
How to Ensure Complete Data Protection at Work?How to Ensure Complete Data Protection at Work?
How to Ensure Complete Data Protection at Work?
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Secure End User
Secure End UserSecure End User
Secure End User
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
 
Are you the next target?
Are you the next target?Are you the next target?
Are you the next target?
 
How Can You Maintain Data Privacy in the Cloud.pdf
How Can You Maintain Data Privacy in the Cloud.pdfHow Can You Maintain Data Privacy in the Cloud.pdf
How Can You Maintain Data Privacy in the Cloud.pdf
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnum
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Protecting Personal Information A Guide for Businesses Small Bu.docx
Protecting Personal Information A Guide for Businesses Small Bu.docxProtecting Personal Information A Guide for Businesses Small Bu.docx
Protecting Personal Information A Guide for Businesses Small Bu.docx
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
CTM360 Advisory: Remote Work Guidelines
CTM360 Advisory: Remote Work GuidelinesCTM360 Advisory: Remote Work Guidelines
CTM360 Advisory: Remote Work Guidelines
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19
 

Recently uploaded

A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdftbatkhuu1
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 

Recently uploaded (20)

unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdf
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 

Checklist to reduce security risk for your remote workers

  • 1. Checklist: How to Reduce Security Risks for Your Remote Workers Cybersecurity Ensure laptops/devices have hardware encryption. Make 2 factor authentication (2FA) mandatory for all remote workers, including email and when accessing any critical systems and applications. Where possible, ask that screen filters are used to make shoulder-surfing harder. Encourage staff to use password managers. Ask staff NOT to defer critical updates to software. Staff must not visit sites like illegal movie websites as they pose a risk of ransomware and malware infection. Remind staff that surfing explicit sites, amongst other things, is illegal. Remind staff NOT to lend their machines to their children or other members of the family. Privileged Users Ensure you inform all IT & business privileged users and: Remind them of their responsibilities. Insist that they DO NOT log DAILY tasks with high privileges. Remind staff that it´s ok to make a mistake and that they should own up if they have: Accidentally clicked on a suspicious file or link. Identified a malware/ransomware infection and should report it immediately. 1 © SoftwareONE | Security Checklist for IT Admins Stress the IMPORTANCE of NOT sharing passwords (remote working can lead to more password sharing). Demand that they REPORT all errors/confess to mistakes immediately. Phishing Emails Opened a suspicious PDF or Word, excel file with macro. Remote working can provide a significant advantage for your company and employees but there are risks. In order to ensure the security of your company, its data, and and that of your employees, you need to lay a solid foundation. This checklist helps you to improve security for all of your remote workers.
  • 2. Checklist: How to Reduce Security Risks for Your Remote Workers Online Meetings & Calls Remind staff to MUTE the microphone when they are not speaking in a conference call. Remind the staff NOT to leave their machines UNLOCKED, especially during a call or when taking a break. Educate all staff to ensure webcams are blocked by default. Ask staff NOT to work from coffee shops or public places (if possible) – especially if they are on confidential calls or working on confidential documents. Expectations If you don’t have one yet, create an exceptions register. Where possible, have a “No way this is an exception” list. Create a review by date and put multiple calendar reminders for you/your team to review them. Cyber Attack & Incident Response Constantly remind staff to be alert for phishing emails and other attempts to compromise/steal account details. Staff must report these emails and malicious activity. Encourage staff to reach out to the IT team if necessary. Ask IT and security staff (including outsourcers) to pick up the phone and call if it‘s important rather than solely relying on email. Use a separate out-of-band app or something as simple (not very secure) as WhatsApp groups for urgent communications. Keep a printed copy of your procedures and checklists at home AND make sure they are not easily accessible. Remind all staff that it‘s ok to make mistakes (like sending emails to wrong recipients, clicking on a malicious link, causing an outage etc.) and that they MUST own up immediately. Stress that in most cases there will be NO repercussions Security staff must be extra vigilant and actively seek out suspicious activity ( given the remote working habits of users this may be operationally expensive). Privacy Remind all staff of their responsibility to respect the privacy of your clients and your staff. Staff must be reminded NOT to email personal information via email OR store personal information in non-approved locations. Remind IT and cybersecurity folks to be extra vigilant for possible malicious activities on user accounts. Staff members might exchange personal phone numbers or email addresses. Avoid this if possible, or add a note to delete the information after use. 2 © SoftwareONE | Security Checklist for IT Admins
  • 3. Checklist: How to Reduce Security Risks for Your Remote Workers Backup Provide staff software to ensure their critical documents are backed up. Ask staff to back up their data on an approved external hard disk that is NOT permanently connected to the device. Ask staff NOT to use external cloud storage services. Ask staff to reach out to discuss any cloud storage or cloud service solution that they want to use. Disclaimer - The information provided in this advisory is provided “as is” without warranty of any kind. The use of this information is totally the responsibility of the user and SoftwareONE disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall SoftwareONE or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, claims arising out of negligence and/or misuse, loss of reputation, loss of business profits or special damages, even if SoftwareONE or its suppliers have been advised of the possibility of such damages. Copyright © 2020 by SoftwareONE AG. All Rights Reserved. SoftwareONE is a registered trademark of SoftwareONE AG. All other trademarks, service marks or trade names appearing herein are the property of their respective owners. The content has been compiled with meticulous care and to the best of our knowledge. However, SoftwareONE cannot assume any liability for the up-to-dateness, completeness or accuracy. Photo © Adobe Stock How can we help you? Get in touch to find out more about how to plan your Future Workplace! SoftwareONE AG Find us online at: https://www.softwareone.com/en/topics/ future-workplace If you’re unsure of where to begin, consider the advice of our Security experts. When you partner with SoftwareONE, you’ll know exactly where your risks are and how to protect your assets. We’ll work with you to stay ahead of potential threats so you can tailor your work from home strategy to your specific business needs and better articulate to your team members what exactly needs to happen moving forward. Having said this we invite you to have a look at our additional Work from Home resources. Keen to learn more? Security Checklist for Remote Workers Monthly Cybersecurity Updates Future Workplace Content Hub Source: Cyber Management Alliance, 2020