10 Fundamental Work From Home Cyber Security Tips

A recent informal survey conducted on our Twitter profile asked security and risk leaders what their biggest concerns were when considering the protection of a predominantly remote workforce due to the COVID-19 pandemic, and 71% of respondents identified personal devices and VPN issues as their biggest concern. This is in part a reflection of the fast transition to work from home operations and the reality that most information security teams had little to no time to adequately prepare. However, the impact can be just as profound for workers who have to adapt to new processes and often, new equipment. 

To help information security and risk management teams educate their workers, we compiled a list of 10 fundamental work from home cyber security tips into the infographic below. A high-resolution PDF is also available for download and we encourage its dissemination across your workforce as part of an ongoing effort to build a strong security culture

Work From Home Cyber Security Tips

10 Fundamental Work From Home Cyber Security Tips  

As indicated in the infographic, steps to protect remote workers must begin with strengthening their credentials, and multi-factor authentication (MFA) is crucial. Most platforms now offer MFA options, and your company should enforce its use for all sensitive applications. 

These efforts are part of a comprehensive security culture program that helps employees internalize a cyber security and data privacy mindset and “own” their role in keeping data safe. Kroll offers Security Culture as a Service, which can be implemented remotely and customized to your specific industry, department or stakeholder roles. Get in touch today. 

10 Fundamental Work From Home Cyber Security Tips 2020-05-08T00:00:00.0000000 /en/insights/publications/cyber/10-fundamental-work-from-home-cyber-security-tips /-/media/kroll/images/publications/featured-images/2019/10-wfh-cyber-security-tips-feature.png publication {78D3F940-BF08-40FB-A7F6-B55FB2D9165B} {41C2B883-4E8E-4CB3-8774-5F5B9AEC0582} {144A7548-A9F0-4228-93CC-9A86304CD5E8} {8DDC49CA-1D0A-451A-A649-F026824A6638}

Other Areas We Can Help

Cyber Risk

Cyber Risk

End-to-end cyber security services provided by unrivaled experts.

Cyber Risk
Cyber Risk

Cyber Risk Assessments

Delivering actionable recommendations using the best technology and expertise available.

Cyber Risk Assessments

Insights

Cyber Risk

CyberClarity360 Express Helps Fortune 25 Technology Client Identify and Prioritize Legal Vendor Cyber Risk

Cyber Risk
The Monitor

Telerik Vulnerability (CVE-2019-18935) Creates Surge in Web Compromise and Cryptomining Attacks - The Monitor, Issue 14

The Monitor
Cyber Risk

Cybersecurity Breaks Out of Its Silo

Cyber Risk