FileVault for Mac External Link
BitLocker for Windows External Link
If you can’t afford to offer a company device to each staff member, prioritize giving devices to staff members who access more sensitive systems first.
If employees can use their own laptop, consider what rules you would like to put in place before they can access company systems. For example, you may tell them they need to:
- keep their operating system up-to-date
- use hard-drive encryption and a strong password to unlock it
- upload any documents they have saved locally to the network, and
- run their antivirus software regularly (and keep that up-to-date as well).
Accessing business systems
Remote access software
You will need to use remote access software, like a virtual private network (VPN), to connect to your organization’s network. This creates an encrypted tunnel between your computer and your work’s network protecting the files and data you’re accessing from your home network. See our advice on which remote access software will work best for your needs.
Which remote access software is right for my business?
Strong passwords are the first line of defense in systems that are accessible on the internet. Reinforce to staff the importance of keeping passwords unique and long for every system and device.
Create a password policy for your business
Enable two-factor authentication
Systems that require access from the internet, particularly important ones such as work-related systems, email or messaging apps, need to be protected. Enabling two-factor authentication makes sure that attackers can’t get in if they’ve guessed your password or stolen your credentials. Make it mandatory when accessing away from the network.
Using 2FA to secure your business
Advise your staff to use their home internet network for accessing business networks and systems. Not all WiFi and internet networks are secured in the same way. The best way to stay safe is the use the one that they have set up at home.
Travelling to and from destinations introduces security risks. Make sure work devices are encrypted. The hard drive of your device adds an extra layer of security should it be lost or stolen. The password to unlock the device should be strong and unique.
If they need to work out and about, consider offering a privacy screen to these staff which makes shoulder surfing a lot harder. When having a phone call, check who’s within hearing range and avoid talking about confidential information. Don’t leave your devices unattended when you are in public spaces. When you leave it unattended at work or at home, make sure to lock it.
If they lose their device, be sure they have an easy way to contact you or your IT provider. Mistakes happen, and it’s better to know immediately so the impact can be managed.
When your staff members are located across multiple locations, being able to easily communicate with your team and others is essential. Look for options have end-to-end encryption before choosing a tool to use. This applies for both your messaging options and any video conferencing you need to use for meetings. If the system you use doesn’t offer this – consider changing or make sure everyone knows to avoid sharing or talking about sensitive information. This is any information you wouldn’t want made public.
Sometimes people working from home may want to be a little more flexible in their working hours due to childcare arrangements, family needs, and personal appointments. Make sure there is someone they can contact if they need IT support, especially if they need to report an incident.
When you’ve got a moment, record these remote working decisions into a policy. This can be the go-to place for staff to understand how your organization operates remotely. It’s also a good time to remind staff of any other related policies you have.
Create a cyber security policy
Create a password policy