The Agile Office – How to secure remote working | Part 2/4
One key element of developing a remote working strategy is ensuring it can be managed securely.
This was the focus of one of the speakers at our recent webinar. James Field, strategy director at charity-focused IT services provider Smartdesc, highlighted some of the best practices his team have encountered while helping thousands of workers in the sector get set up for home working in recent weeks.
He also highlighted some of the key security settings firms should be putting in place to protect their remote workers, as well as how to spot some of the most common scams and fraud attempts that are aimed at these workers.
You can watch James’ full advice below, or follow the links to see the rest of the webinar. Check back in the coming days to learn more about what our partners had to say.
Part 2: James Field, Strategy Director at Smartdesc
One of the biggest issues for many companies when moving to a more agile way of working will be keeping all the various devices in use under control. Many workers will be using personal devices, ranging from desktop and laptop PCs to tablets or even smartphones to handle their activities. At the same time, the number of apps in use is also on the rise as people look for services that fit into their new way of working.
James explained staff are exploring tools such as Dropbox, Slack and Microsoft Teams on their own, which makes it very difficult for IT teams to keep control of how data is being used.
He added: “What we’ve seen is a real explosion in the number of tools that are suddenly available to everyone. The risk that comes with that is one of data sprawl, where your organisational data just leaks out over the internet.”
The best way to deal with this challenge is to focus on policy and governance – in other words, ensuring workers have clear guidance and policies from their company on what activities and apps are and aren’t acceptable.
When it comes to technology many users may not have used before, such as videoconferencing, it’s also vital for workers to ensure they have the right settings in place. For example, ensuring that only the host is able to share their screen can prevent the problem of ‘Zoom-bombing’, which many people may have experienced during video calls, while turning off file transfers is also essential.
It’s also important to ensure all tools and devices are fully up-to-date – and this is especially true when dealing with large numbers of personally-owned devices. James noted it’s incredible how many people simply ignore prompts for patches like Windows Updates, so reminding users about these simple steps is essential.
Looking out for fraud
A major challenge for home workers at the current time is the risk of fraud, as criminals are eager to take advantage of any changes in policies or uncertainties caused by a shift in working habits.
One of the most common threats is phishing. James noted that Smartdesc has seen a huge rise of coronavirus-related scams such as emails purporting to be from the World Health Organization seeking to take advantage of people’s fears. Therefore, it’s important that users know how to spot these and who to notify about suspicious communications.
James said: “If you get one [of these phishing emails] in your organisation, share that knowledge around. So popping a note on Slack or Teams saying ‘I’ve just got a spam email. Watch out if anyone else gets it, it’s fake.”
Indeed, James noted that boosting user education is vital in keeping remote working secure. There are a range of resources that can be used to help with this, such as advice from the National Cyber Security Centre, which offers a range of easy-to-understand tips that can be shared with home workers.
Share This Post, Choose Your Platform!
With over 25 years in the business telecoms industry and an unrivalled reputation of delivering excellent, personal customer service, Arrow is one of very few companies in the UK able to provide a full telecoms, IT and energy consultancy and service proposition.
Savings through automation, scale, improved service. We’ve got that covered. But the true value comes with empathy, through empowerment, collaboration. It’s connecting people that drives us forward. It’s people that make tomorrow happen.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.