Tuesday, September 29, 2020
Home Cybersecurity News 10 network security considerations when remoting employees

10 network security considerations when remoting employees

What is Network Security?

Corporate network security is a term that describes measures taken to ensure the safety and privacy of company data and information. It encompasses the protection of devices, technologies, processes, locations and employees. Good network security ensures that proprietary data and information is protected physically and digitally from hacking and cyber threats.

How to Keep Your Corporate Network Secure

Network security is important when employees work remotely, particularly if they need access to the corporate intranet. Here are things to consider when designing a network security system:

  1. Employee education: Employees must understand the processes involved in keeping data and information secure. This includes the personal and corporate legal ramifications if security is breached.
  2. Social engineering: In the context of network securiy, social engineering involves human interaction and psychological manipulation to trick users into making security errors or giving away sensitive information, for example passwords.
  3. Physical security: Devices (laptops, tablets, smart phones, flash drives) containing proprietary company information should never be left in an unsecure or easily accessible location.
  4. Remote Locations: Security measures may need to vary for remote employees who work at another office, at home, another city in the same country or abroad.
  5. Data access: How do employees access data and information? Do they take copies when at work? If accessed remotely can they see just the data they need or all company data?
  6. Device ownership: Who owns the devices use for company work? In the event of a data breach could you recall all devices immediately for investigation? If employee-owned, do you have an agreement to this?
  7. Device security: Do devices use meet company security standards for antivirus and antimalware? Are they ever left unattended at home or in a public place? How easy would it be to get access if someone were in physical possesion of the devices?
  8. Phishing: This involves tricking a user into clicking a malicious link, which installs malware or freezers the device. Users are then forced to reveal login information to unfreeze. Can lead to the theft of or unlimited access to company data.
  9. Malware: Malicious software including viruses, ransomware and spyware. Typically, they exploit security vulnerabilities to spread themselves across computers and networks to damage or allow unauthorised access to data and information.
  10. Wireless Network Security: Wireless security prevents unauthorised access over wireless netoworks, such as WiFi networks. Devices operated over an unsecured WiFi network may be accessible. Excellent WiFi security addresses many of the other considerations.

VPN for Better WiFi Network Security

VPN (Virtual Private Network) technology allows remote employees to access company data safely, even over an unsecured WiFi.

Sources

 

Advertisement
Katrina Boydon
Business owner, web content and media strategist, writer, advisor.

Stay Connected

Join Our Newsletter

Must Read

Deep learning AI stuns scientists with poetry and journalism

Seven years ago, my student and I at Penn State built a bot to write a Wikipedia article on Bengali Nobel laureate Rabindranath Tagore’s...

Spooky quantum breakthrough could change physics forever

MIP* = RE is not a typo. It is a groundbreaking discovery and the catchy title of a recent paper in the field of...

Our solar system’s four most promising worlds for alien life

The Earth’s biosphere contains all the known ingredients necessary for life as we know it. Broadly speaking these are: liquid water, at least one...

Tragic visions of tech billionaires are shaping the human world

In the 20th century, politicians’ views of human nature shaped societies. But now, creators of new technologies increasingly drive societal change. Their view of...

Related News

Deep learning AI stuns scientists with poetry and journalism

Seven years ago, my student and I at Penn State built a bot to write a Wikipedia article on Bengali Nobel laureate Rabindranath Tagore’s...

Spooky quantum breakthrough could change physics forever

MIP* = RE is not a typo. It is a groundbreaking discovery and the catchy title of a recent paper in the field of...

Our solar system’s four most promising worlds for alien life

The Earth’s biosphere contains all the known ingredients necessary for life as we know it. Broadly speaking these are: liquid water, at least one...

Tragic visions of tech billionaires are shaping the human world

In the 20th century, politicians’ views of human nature shaped societies. But now, creators of new technologies increasingly drive societal change. Their view of...

‘I choose to be a cyborg’: Why I implanted computer chips in my hands

I have computer chips in my hands. The tiny (two millimetre by 12 millimetre) glass ampules are nestled just under the skin on the back...

This site uses Akismet to reduce spam. Learn how your comment data is processed.