Safe Remote Computing

Today’s workforce has evolved from the traditional office setting to many employees that work remotely and on the go through mobile devices. 

Secure Devices

There are many benefits to be gained from these options. Meetings and presentations can be conducted virtually anywhere without being tied to a conference room. Support requests can be handled without being tied to a single call center. Telework can be offered as a quality of life benefit. While the emergence of the mobile workforce has many benefits, it also comes with a new set of security risks. In the office or out of the office – liabilities still apply to the data in use. Using a public or personal Internet service is not the same as the internal corporate network. Have to realize there are significant security differences. Some best practices follow to keep your personal and corporate data safe while outside the home or office. For example:
  1. WiFi hotspots – always consider public WiFi an at risk environment. Expect that your transmissions will be monitored by someone you do not approve of. Without question WiFi is needed, so be sure your web surfing provides encrypted transmissions. Look for a secure pad lock in the address bar. Only use HTTPS connections. Anything HTTP is plain text and can be read by others. Company data should always employ a Virtual Private Network (VPN) connection. This ensures that company data will always be encrypted during transmission.
  2. Remain aware – data in remote locations often has a greater risk. The comforts of home or abroad frequently lead to oversight. Loss, theft, unauthorized third party access – all realities. Treat the off-site location with the same respect as being in the office. Office policies still apply. Prevent shoulder surfing and safeguard desk content.
  3. Mobile phones – easiest way in is through a mobile phone. Consider checking with your Security team before adding that next App on your mobile phone. Many App’s share memory and storage. One or more undisciplined App’s could compromise your clients, their contact information. Even your financial or company data.
  4. Disable Bluetooth – Bluetooth is “great”, but most forget to turn it off when they’re not using it. Leaving Bluetooth on permits drive by data theft. They call it Blue Jacking, and it’s just like leaving your front door open after leaving for work. Not a good idea.
  5. PINs and Passwords – it may seem like a burden, but PIN codes today should be no less than six characters. Biometric access is not as secure as you may think – favor PIN codes. Computing passwords should be no less than 12 characters. In today’s world, the bad guy doesn’t necessarily need your keypad…
Zenith American Solutions, Inc. is not offering legal advice.  
Please consult with your legal counsel for legal guidance or legal recommendations.