Preparing Employees to Be Cybersafe when Working from Home

Preparing Employees to Be Cybersafe when Working from Home

As companies across sectors encourage—and even mandate—that their employees work from home to protect themselves and others from the spread of coronavirus, IT professionals are tasked with the increasingly complex and challenging responsibility of cyber safety for employees’ devices and companies’ networks.




Individuals and organizations are likely to face increased cyberthreats from malicious actors attempting to target weakened network security as a result of more people teleworking.


For organizations that already offer work-from-home options for all or many of their employees, their network infrastructure and institutional awareness are most likely prepared to protect them from outside cyberthreats. But for companies and employees where the option to work from home is new, it is important that IT professionals and individual employees take the steps necessary to prevent attacks.


Infoblox recommends that businesses implement the following guidelines and best practices to ensure the security of their networks and corporate data while employees are working from home.


Develop and communicate clear and consistent cyber safety policies It is essential that employees have clearly defined IT policies and protocols in place for working from home. These cyber safety guidelines should include, but are not limited to:• Making sure that employees use only approved devices to access and store corporate data, where possible• Mandating the use of strong passwords—at least 12 characters—when accessing corporate networks; and• Implementing multi-factor authentication—ideally with hardware tokens instead of text messages (which can be spoofed).


Leverage technological solutions for cyber safety


Companies most likely already have a robust security infrastructure in place to ensure the cyber safety of their corporate networks. With users increasingly working from home, the traditional corporate security perimeter has vanished and VPNs are often no longer necessary to get work done. In ..

Support the originator by clicking the read the rest link below.